FREE GAMES

Get free games here, just download and play on your computer .

M0BILE ZONE

Download mobile games, Software, Tricks and much more.

FREE MOVIES

Free Movies Download for Mobile and PC Direct Link in 3gp Mp4 HD HQ AVI MKV Bluray Format high quality.

PC ZONE

Get the Best Tips and Trick for your PC.

FREE SOFTWARE

Download free antivirus software, office, multimedia, burning, OS etc.

Sunday 10 February 2013

Alex Gordon

Alex Gordon

 Games (28.9 Mb)

Alex Gordon is the game exactly for those madly in love with adventures and treasures. Why? Simply because Alex Gordon - the main character - is a treasure hunter. This time he is travelling together with his sister willing to find something on a small deserted island. They'd better haven't done this! As soon as the brother and sister dig out the precious jewelry mysterious things start. Like a bolt from the blue the guardians of the treasure appear taking Alex Gordon's sister away. And he can't even move a whisker (yes, Alex Gordon is a cat)! Now you are the one to help the main character find his beloved relative. You have to explore numerous locations around the island searching for hidden places. While occupied with the task don't forget to collect endless coins, crystals and hearts as well as jump on the guards not to lose your life. While progressing in the game you'll acquire more and more skills and try to use and adopt the landscape to your needs. For example, there are numerous ropes to climb up and down or the horizontal ones which make it easy to fall down on the head of your enemies. It's impossible not to mention the sound effects and the music surrounding you while playing. Birds signing, creatures' voices, thread sounds - all this brighten up the game process and enrich the atmosphere. By the way, some words about the creatures that are eager to help you. Funny penguins teach you new skills and provide with some information about the plot while sexy squirrels save the game on the exact stage. You can't but download the Alex Gordon game for free right now and help the cat find his sister!
Screenshots
Download Alex Gordon - Download cat games
Features
Numerous exiting levels
Different landscapes
Additional stages to get bonuses
Download cat games - Absolutely FREE
System Requirements
Windows 98/ME/2000/XP/Vista/7
Processor 600 Mhz or better
256 Mb RAM
DirectX 8.0
 

Saturday 9 February 2013

All Media Player

VLC Media Player 2.0.5 (32-bit)

VideoLAN.org - 21.86MB (Open Source)

Download


VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codec or program.
It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
VLC can play:

  • MPEG-1, MPEG-2 and MPEG-4 / DivX files from a hard disk, a CD-ROM drive, and so on
  • DVDs, VCDs, and Audio CDs
  • From satellite cards (DVB-S)
  • Several types of network streams: UDP/RTP Unicast, UDP/RTP Multicast, HTTP, RTSP, MMS, etc.
  • From acquisition or encoding cards (on GNU/Linux and Windows only)

Screenshots

Screenshot 1Screenshot 2Screenshot 3

Avast! Free Antivirus 7.0.1474

avast! Free Antivirus 7.0.1474

  92.98MB (Non-Commercial Freeware)







avast! Free Antivirus represents the best free antivirus protection currently available on the market. This edition is FREE OF CHARGE for non-commercial & home use. Its features include:

  • Anti-spyware built-in
  • Web Shield
  • Anti-rootkit built-in
  • Automatic updates
  • Strong self-protection
  • Virus Chest
  • Antivirus kernel
  • System integration
  • Simple User Interface
  • Integrated Virus Cleaner
  • Resident protection
  • Support for 64-bit Windows
  • P2P and IM Shields
  • Internationalization
  • Network Shield

Google Chrome Free Download

Google Chrome 25.0.1364.68 Beta

  30.85MB (Open Source)




Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
One box for everything
Type in the address bar and get suggestions for both search and web pages.
Thumbnails of your top sites
Access your favorite pages instantly with lightning speed from any new tab.
Incognito mode
Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.
Safe browsing
Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.
For information about alpha and developer builds, check out the Chrome dev channel here.

Free Phone For Your Computer



Gizmo Project 4.0.5.400
         13.29MB (Freeware)


Gizmo is a Free Phone For Your Computer that makes calling as easy as instant messaging. It includes these features and more:
  • Voice Calls - Call anyone in the world for free from your computer, save big on calls from your mobile phone.
  • Instant Message - Chat with friends on Gizmo5, MSN, AIM, Yahoo! and Jabber for free.
  • File Sharing - Easy sharing of photos, videos and files from your mobile phone or computer.
  • Video Calls - See friends and family when making calls anywhere in the world.
  • Two-way Text Messaging - Send SMS messages directly from your Gizmo5 account.
Download

Gizmo Project 4.0.5.400
         13.29MB (Freeware)

Thursday 7 February 2013

How To Delete My Facebook Account


Remove all applications and Facebook Connect Websites.

You might be using external third party applications within facebook, example iPhoto, Zerply, etc also you would have linked your Facebook account to external website while commenting on articles or for using it for web based authentications all these applications can reactivate your Facebook account if you happen to use them knowingly or unknowingly since they are linked to your Facebook account automatically. The first step would be to remove and delink all these applications from your Facebook account.
  1. Login into Facebook and click on Account setting on the top right hand corner. Click Privacy Settings.
  2. At the bottom of Privacy Setting you’ll see “Apps And Websites” click on “Edit Your Settings”
  3. Under “Apps you use” Click on “Edit Settings”
    Privacy SettingPrivacy Setting
  4. Remove all the applications and websites that access your Facebook account.

Deleting Your Facebook Account

Once you’ve take the steps above you can follow the instruction given in Remove Facebook Account and then the following given below if that is not successful.
  1. The first step would be to email Facebook directly. Send an email to privacy@facebook.com and request that Facebook deletes your account.
  2. Wait  for a week to get an email response from Facebook confirming that your account has been permanently deleted.
  3. If you don’t hear from Facebook within a week, email them again. This time, email Facebook at privacy@facebook.com, but also send an email to support@facebook.com and one to info@facebook.com.
  4. Finally, attempt to log in to your account once you get an email from Facebook. If you’re unable to log in and don’t get a message asking you to reactivate your account, your Facebook account has been permanently deleted.

How To Delete History In Google Chrome

If  you use google chrome as your primary browser or are using it in some internet cafe or on your friends computer you might want to clear and delete History In Google Chrome if you want to avoid people snooping of what you’ve been doing online.
Clear Your All Google Chrome Surfing, Browsing history
  1. Click the wrench icon wrench icon on the browser toolbar of Google Chrome.
  2. Select Tools option from the menu.
  3. Select Clear browsing data from the menu.
  4. In the dialog that appears, select the “Clear browsing history” checkbox.
  5. Use the menu at the top to select the amount of data you want to delete. Select beginning of time to clear your entire browsing history.
  6. Click and check all the optionsClear browsing data, Clear download history, Empty the cache, Delete cookies and other site data, Clear saved passwords, Clear saved Autofill form data..
Following the above instruction the following information is removed when you clear your browsing history:
  • Web addresses you’ve visited, listed on the History page
  • Cached text of pages you’ve visited
  • Snapshots of your most frequently visited pages on the New Tab page
  • Any IP addresses pre-fetched from pages you’ve visited
  • All the web searches that you’ve done.

How To Remove Specific Items From Your Browsing History



  1. Click the wrench icon tools menu on the browser toolbar.
  2. Select History.
  3. Click Edit items on the blue bar at the top of the page.
  4. Select the checkboxes for the items you’d like to remove.
  5. Click Remove selected items.
  6. Click Done removing items on the blue bar at the top of the page to return to your normal view.

Clear your browsing history from the address bar

To prevent matches to your browsing history from appearing in the address bar, follow the steps above to clear your entire browsing history. You may also want to turn off the prediction service for the address bar if you don’t want Google Chrome to help complete the search terms and web addresses you’re typing in the address bar.

Clear your browsing history from the New Tab page


The New Tab page shows a list of your most visited sites. To remove a specific thumbnail, hover over an image with your mouse. Then click the “X” that appears in the top right corner of the frame. Thumbnails that you remove won’t show up on the page again. To reset the page to blank thumbnails, clear your entire browsing history.

Unlimited Free International Calls & SMS After Activating Google Voice Outside US

Google Voice is a service that google provides in the US using which you can call any one for free in the US & Canada, but for people who are not in the US cannot use this service, I have outlined a workaround below to activate you google voice account outside the US or Canada. There are a couple of softwares you need before you can starting making free unlimited international Calls to the US & canada, or to send free SMS to any country in the world.
  1. You need a Google Voice Invite, there are only two ways to get this, either you get someone who already has a Google Voice to invite you or apply for an invitation to Google Voice service here https://services.google.com/fb/forms/googlevoiceinvite
  2. Hotspot shield, to access the google voice service you need use a US Proxy Address, otherwise you’ll see a message saying “Thanks for visiting Google Voice. We are not yet open for users outside the US.” so get http://www.hotspotshield.com/ or any other proxy service whose IP address belongs to the US.
  3. A SIP Client, the workaround involves you getting a US number for which you need a SIP client. I suggest X-lite Download it from here http://www.counterpath.com/x-lite-download.html ( Note: download X-lite Beta 4 if you are using a Mac OSX since I had no luck configuring X-lite 3.0 on the Mac)

Getting A Free US Number

  • Register for a free account at iptel.org http://serweb.iptel.org/user/reg/index.php
  • Using the the info from iptel.org register an account at register for a free USA DID with Ipkall here http://phone.ipkall.com/ setting are given below.
    1. Choose your account type: SIP
    2. Choose Area Code for your IPKall Number: Choose Any Number
    3. SIP Phone number: Your iptel.org User ID
    4. SIP Proxy: sip.iptel.org
    5. Email Address: Your Email address
    6. Password: Enter a Password
    7. # of Seconds to ring before hanging up: 120
  • You’ll get a email with a US Number note this down.

Setting For Your SIP Client ( x-lite ) Using iptel.org

After downloading X-lite 3.0 or 4.0 Beta you need to set it up with your iptel.org the setting are given below
  1. Display Name: Whatever you want
  2. User Name: Your iptel.org user ID example: clazh
  3. Password: Your iptel.org Password
  4. Authorization User Name: Your Iptel.org User ID@iptel.org example: clazh@iptel.org
  5. Domain: iptel.org
If you have entered your SIP settings correctly then you should be able to see Ready/available on your X-lite Screen depending on which version you are using.
 
Xlite iptel.org Settings

Activating The Google Voice Service Outside The US

Make sure your X-lite client is running and SIP account is active before you try to activate your Google Voice Service
Run HotSpot Shield or whatever US proxy number you are using and log on to http://www.google.com/voice
1. The frist screen show you an option to choose any Google Voice US number of your choice. (You can’t change the number later so choose carefully)
Choose A Google Voice Number 
Choose A Google Voice Number
2. You’ll be asked to choose a PIN to access your voice mail
Choose A Google Voice PIN 
Choose A Google Voice PIN
3. You need to enter the US Phone number that IPKALL provided for you.
Enter A Forwarding Number (IPKall Number) 
Enter A Forwarding Number (IPKall Number)
4. The last step requires you to verify your IPKALL Number, make sure you have x-lite configured and running, now just click Call Me Now
Verify Google Voice  
Verify Google Voice
5. If you have configured your x-lite correctly it should now ring just enter the two digit number show into the dial pad.
Thats it you are done. You don’t need to use HotSpot Shield any more just log into Google Voice and dial any US number always make sure X-lite is running, since it acts as a proxy number, X-lite will ring just pick up the call and start talking.
You can find a full list of SIP Clients here http://en.wikipedia.org/wiki/List_of_SIP_software
if you are using the iPhone or android you can use Nimbuzz

Tuesday 5 February 2013

Vishwaroopam (2013) Dvdscnr [Hindi] [379MB]


Hindi-Viswaroopam.jpg



Small In Size But Best IN QUALITY....
Unbeatable QUALITY..

One Man Army

Audio Perfectly sync by me...

Sample Included In the Torrent



DOWNLOAD LINK 

 

Saturday 2 February 2013

How to download Youtube Videos

I've been looking for a solution to download YouTube videos forever, and Google doesn't help. But now I have one, and you do too! (And you don't need to download anything except the movie you want! ;D :o

Most sites (about 99%) that say that they can download youtube videos, but they can't because of a hosting change.

In 10 parts, you can get youtube videos, and it usually takes less than 5 minutes.

1. Go to the video you want to download.
2. Make sure the URL is in this format: http://www.youtube.com/watch?v=5BCVLRPQUnY and copy it.
3. Go to http://www.youtubecatcher.com/
4. Paste the URL into the text area, and press the Download Video Button
5. Right click on the link that says "Right-Click Here to Download Your Video (FLV format)" and select Save Link As (or Save Target As) save it to your desktop.
6. Go to http://media-convert.com/
7. Click the FIRST browse button. Select the .flv video you just downloaded.
8. Make sure the output format is "Windows Media Video (.wmv)"
9. Click OK
10. Wait for it to upload and convert, then you are done. A fully playable YouTube video on your computer!

Yahoo mail through outlook express

ok so if you have a free yahoo account and outlook express, why not make them work together! there are 2 ways to do this
1.) get a premium mail account from yahoo (but who would want to pay when there is a free solution!?)

2.) get a program called ypops
How to use ypops
for this I will be using outlook express 2007 but its easy to figure out with a different version

1.)download it from here http://ypopsemail.com/download/36-releases/66-download

2.)install it and make shure its running in the system tray

3.)open outlook express and go to tools>account settings>new... and click next

4.)tick the box that says manually configure server settings or additional server types and hit next and then hit next again

5.)Now put in your name in the name box, email in the email box

6.)make shure POP3 is selected under account type

7.)in the incoming mail server box type 127.0.0.1 now type the same thing in the outgoing mail server box

8.)under login info put your yahoo username (dont put the @yahoo)  and put your password

9.)click on the more settings button and go under the outgoing server tab

10.)then tick the box my outgoing server (SMTP) requires authentication and then hit ok

11.)click test account setting to make shure its working and then click next then finish

there you go! yahoo mail on outlook express for free!! ;D ;D

Password protect shared folders on XP network

This chore, which was easy in earlier Windows versions, is difficult and poorly documented in XP Professional and theoretically impossible in XP Home. But there's a workaround: When someone accesses your computer over a local network, XP provides access through the Guest account, even if that account is turned off. So if you password-protect the Guest account, you effectively password-protect network access to your PC.

On your XP system (which I'll call the "host"), select Start, Run, and type net user guest password, replacing password with something less obvious. Press Enter and reboot your system.

From now on, visitors trying to log on to the host from another PC will run into a dialog box asking for the password. Without it, they can't log on. There are a couple of caveats, however.

First, visitors must first access your PC through Windows (rather than through an application), which opens a password dialog box automatically. They won't be able to access the folder on the host through another program until they've done so with Windows Explorer, the desktop, or another Windows resource.

Second, the host's Guest account must be turned off--that's the default setting. If it's on, select Start, Control Panel, User Accounts, Guest, Turn off the guest account.

Thursday 31 January 2013

Precautions from virus attacks


  1. A number of general precautions are herewith provided to minimize the possibility of virus infection. 
  2. Back up important data frequently and keep them in a safe place other than the computer.
  3. Patch the operating system as quickly as possible to block the potential vulnerabilities that malware can exploit and sneak in.
  4. Obtain the most recent virus definition to keep the antivirus application up-to-date.
  5. Be suspicious of e-mail attachments from unknown sources and scan them first; be cautious when opening e-mail attachments even from known sources, because e-mail attachments are currently a major source of infection and sophisticated viruses can automatically send e-mail messages from other’s address books.
  6. Scan all new software before installing and opening, particularly the media that belong to other people. Sometimes even the trial and retail software has viruses.
  7. Be extremely vigilant with external sources, such as CDs, Pen drives and Web links.
  8. Always keep application’s auto-protect running. Set the application default to auto-protection upon the launch of system.
  9. Now-a-days the USB ports are the major reasons for spreading viruses. So, always try to explore any device than directly opening it Scan the pen drives before opening it.

Prevention from Viruses in OS:

Additionally, many recent significant outbreaks of virus stem from Operating System (OS) vulnerabilities. Vulnerabilities can exist in large and complex software systems as well as human carelessness and sabotage.
Virus writers have demonstrated a growing tendency to exploit system vulnerabilities to propagate their malicious code. Operating systems consist of various and complex yet vulnerable software components that play a crucial role in the achievement of overall system security, since many protection mechanisms and facilities, such as authentication and access control, are provided by the operating system.
Vulnerabilities and methods for closing them vary greatly from one operating system to another. Therefore, it is of vital importance to screen these following items in the following two famous usable OS.

Microsoft Windows:

  • Internet Information Services (IIS)
  • Microsoft SQL Server (MSSQL)
  • Windows Authentication
  • Internet Explorer (IE)
  • Windows Remote Access Services
  • Microsoft Data Access Components (MDAC)
  • Windows Scripting Host (WSH)
  • Microsoft Office Suite (Word and Excel)
  • Microsoft Outlook and Outlook Express
  • Windows Peer to Peer File Sharing (P2P)
  • Simple Network Management Protocol (SNMP)
  • Abstract Syntax Notation One (ASN.1) Library

Unix/Linux:

  • Open Secure Sockets Layer (SSL)
  • Apache Web Server
  • BIND Domain Name System (DNS) Server
  • Remote Procedure Calls (RPC) Services
  • Sendmail
  • General UNIX Authentication Accounts with No Passwords or Weak Passwords
  • Clear Text Services
  • Simple Network Management Protocol (SNMP)
  • Secure Shell (SSH)
  • Misconfiguration of Enterprise Services NIS/NFS
These activities will not put an end to the viruses. But, it can reduce the damages caused by the viruses. The sudden hacks in the forms of viruses can also be mostly eliminated. Hope, his discussion on Viruses and Anti viruses may deliver a good knowledge about the protection from viruses.

Optical mouse - Principle and working


What is a mouse?

The mouse is a pointing device which helps us to operate the computer. Unlike the complicated hardwares such as Mother board,RAM, Hardisk, Processor of the computer, the mouse is designed with a simple circuit to process. Now a days, we get varieties of mouse with different technologies in the market.
The developing applications in the computer field has not completely excluded the mouse yet. Although, we have switched to Touchpads in Laptops, "the function of mouse is easy and user-friendly when compared with touch pads for a new user", says the users. Mostly all the applications are operated with mouse for easy working. In recent days, the optical mouse had overcome the old ball mouse, because of its 'easy to use' function.

Disadvantages of Ball mouse

With the previous ball-rolled mouses, the movement of the pointer in the computer  is decided by the ball inside the mouse. So, if the ball gets damaged, or if dust gets clustered, the operation of the mouse becomes problem. When dust gathers, it takes some time to clear it too.With these disadvantages, the ball mouse was slowly moved away form the computer technology leaving the optical mouse to fill its space.

Working of Optical mouse

Now, almost everyone tries to switch from ball/roller mouse to Optical mouse. As the cost of the mouse is also being decreasing, the replacement is quiet quicker.To connect this optical mouse, the necessity is PS/2 or USB plug, and windows, macintosh or LINUX operating system installed in the computer.
The main components of the optical mouse are:
  • Inbuilt optical sensor
  • High speed camera which can take 1000 pictures at a time
  • LED
These optical mouses do have an inbulit optical sensor. The optical sensor reads the movements of the optical mouse (moved by the user) with the help of the light rays which comes out from the bottom. ( The area in which a light glows). When the user moves the optical mouse, the LED (Light Emitting Diode) present inside the mouse emits the light according the minute movements. These movements are send to the camera as light rays. The camera captures the difference in light rays as images. When the camera captures the images, each and every pictures and compared to one another with the digital technology. With the comparison, the speed of the mouse and the direction of the movement of the mouse are rapidly calculated. According to the calculation, the pointer moves on the screen.
   

Comparison between a roller/ball  mouse and optical mouse

  • The optical mouse does not have any movable parts as of the ball mouse. So, the life of the optical mouse is long compared to the ordinary mouse.
  • Since the mouse works with the sensor recognition, the movements are clearly captured and so the moves gives out a same function in all moves.
  • Since the ball is absent in the optical mouse, the weight of the optical mouse is less than that of the ball mouse.
  • The dust clustering problem is abolished in the optical mouse as its parts are all static.
  • The optical mouse can also function good without a mouse pad, which is impossible with ordinary mouses.Any way, optical mouses cannot be used above reflecting glasses or any glass materials.

TFT LCD TV - Principle of working


What is TFT LCD?

The TFTLCD is explained as Thin Film Transistor Liquid Crystal Display. The Liquid Crystal Display’s which are used in famous LCD TV’s and TFTLCD TV’s are referred to as Nematic Phase liquid crystals. There lies a Thin Film(layer) Transistor arranged and so, it is called as  Thin Film Transistor Liquid Crystal DisplayThese Liquid crystals takes neither a solid or liquid form. The main difference between the LCD TV’s and the TFTLCD TV’s can be easily studied from the figure. Today's color LCD TVs and LCD Monitors have a sandwich-like structure as shown in figure 1. And also, in the LCD TV’s there is a single TFT panel.


What is TFT LCD TV and LCD Monitor Panel?


Figure shows a TFTLCD monitor. The only difference is that, the TFT LCD has a sandwich-like structure with liquid crystal filled between two glass plates. From the figure, we can see the TFT glass. This TFT Glass has as many TFT’s as the number of pixels displayed. The Color Filter Glass has color filter which generates color.
The Liquid Crystal Displays (LCD’s) have the tendency to change the properties of light passing through the crystals, when they are stimulated by some external electrical charge. With this property, the Liquid crystals move according to the difference in voltage between the Color Filter Glass and the TFT Glass. The amount of light supplied by Back Light is determined by the amount of movement of the liquid crystals in such a way as to generate color.

Structure of a color TFT LCD Panel

A TFT LCD module consists of a TFT panel, driving-circuit unit, backlight system, and assembly unit.

The main components of the TFT panel are:
1. LCD Panel
The LCD panel has - TFT-Array Substrate and Color Filter Substrate
The TFT-array substrate contains the TFTs, storage capacitors, pixel electrodes, and interconnect wiring and the - The color filter substrate contains the black matrix and resin film containing three primary-color - red, green, and blue - dyes or pigments. The two glass substrates are assembled with a sealant, and the gap between them is maintained by spacers, and LC material is injected into the gap between the substrates. Two sheets of polarizer film are attached to the outer faces of the sandwich formed by the glass substrates. A set of bonding pads are fabricated on each end of the gate and data-signal bus-lines to attach LCD Driver IC (LDI) chips.
2. Driving Circuit Unit
The Driving Circuit Unit is the main part which makes the TFTLCD TV’s to operate. It has LCD Driver IC (LDI) Chips, - Multi-layer PCBs and the - Driving Circuits to run.
3. Backlight & Chassis Unit 
This unit has the Backlight Unit and Chassis Assembly. The backlight is also the main cause for the clarity and resolution of picture.

Mobile Phones - Principle of operation


A cellular/mobile system provides standard telephone operation by full-duplex two-way radio at remote locations. It provides a wireless connection to the Public Switched Telephone Network (PSTN) from any user location within the radio range of the system.
The basic concept behind the cellular radio system is that rather than serving a given geographical area within a single transmitter and receiver, the system divides the service area into many small areas known as cells, as shown in Fig. below. The typical cell covers only several square kilometers and contains its own receiver and low-power transmitter. The cell area shown in Fig. below is ideal hexagon. However, in reality they will have circular or other geometric shapes. These areas may overlap, and cells may be of different sizes.
Basic cellular system consists of mobile stations, base stations and a mobile switching center (MSC). The MSC is also known as Mobile Telephone Switching Office (MTSO). The MTSO controls '\11 the cells and provides the interface between each cell and the main telephone office. Each mobile communicates via radio with one of the base stations and may be handed off (switched from one cell to another) to any other base station throughout the duration of the call.
Each mobile station consists of a transceiver, an antenna and control circuitry. The base station consists of several transmitters and receivers which simultaneously handle full duplex communication and generally have towers which support several transmitting and receiving antennas. The base station serves as a bridge between all mobile users in the cell and connects the simultaneous mobile calls via telephone lines or microwave link to the MSC. The MSC co-ordinates the activities of all the base stations and connects the entire cellular system to the PSTN, most of the cellular system also provide a service known as roaming.
The cellular system operates in the 800-900 MHz range. The newer digital cellular systems have even greater capacity. Some of these systems operate in 1.7-1.8 GHz bands.

Cellular Telephone Unit

The Fig. below shows the block diagram of a cellular mobile radio unit. The unit consists of five major sections:
Transmitter, receiver, synthesizer, logic unit, and control unit. The mobile unit contains built-in rechargeable batteries to Provide operating power. The transmitter and receiver in the unit share the common antenna.

Wednesday 30 January 2013

Tips for Longer PC life

1. Keep your PC in a smoke-free environment. Tobacco smoke can damage delicate contacts and circuits. 

2. Leave your PC running. Powering up from a cold state is one of the most stressful things you can do to your system's components.

If you don't want to leave your PC running all the time, use Windows' Power Management settings to put your machine into hibernation rather than completely shutting down.

In Windows XP, right-click the desktop and select Properties. Click the Screen Saver tab and select the Power button. Choose the Hibernate tab to ensure that hibernation is enabled, and then select a time beneath "System hibernates" under the Power Schemes tab. 


(Note that this option is not available on all PCs.) 

Computers running older versions of Windows may or may not provide similar power-management features. Look under the Power Management icon (Power Options in Windows 2000) in Control Panel to evaluate your machine's capabilities. 

3. Don't leave your monitor running. The best way to extend your display's life is to shut it off when it's not in use.


4. Avoid jostling the PC. Whenever you move your system, even if it's just across the desktop, make sure the machine is shut down and unplugged.