Wednesday 27 June 2012

Export and Restore Registry

Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.




How to Export Registry Keys

>>Click Start, and then click Run.

>>In the Open box, type regedit, and then click OK.

>>On the File menu, click Export.

>>In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

>>Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.


How to Restore the Registry


>>To restore registry keys that you exported, double-click the .reg file that you saved.

Wednesday 20 June 2012

Change Startup and Log Off Screens

Startup Screen
  1. Create a 320x400 bitmap in the root directory and name it LOGO.SYS
  2. You can use LOGOW.SYS file in the Windows directory as a starter


Logoff Screens
  1. There are many system file that constitutes Logoff screen.
  2. They are actually bitmaps 320x400 that just have a different extension
  3. The hidden file in the root directory LOGO.SYS is the startup logo.
  4. There are two files in the Windows directory.
  5. LOGOW.SYS is the Wait while Shutting down ... screen.
  6. LOGOS.SYS is the You may now shut-off or Reboot screen.
  7. Make two new image files of your chice in Paint and name it as LOGOW.SYS and LOGOS.SYS and replce the actual windows file by this two.
  8. But make sure they should be of the same size

Know your SIM Card Name

Do you know, every SIM Card has a name ? You can know your SIM name only in facebook comment box. So open facebook.com and follow these steps in comment box.



To know your SIM Card name, follow these steps:-

1. From your number, take the last three numbers.
    
     ex: 0123456789   take 789 only

2. do this,
   
    @*[789:0]

3. Third step,
    
    Remove the sign *
    And press enter in comment box.

Your SIM name is here..........

Goto http://www.facebook.com/

Lock a folder in Windows XP without any Software



To Lock a folder in windows XP without any software. Follow the steps Below.
  1. Make a Folder in C drive rename it as "abc" without quotes.
  2. Now open Command Prompt from Start Menu.
  3. Type "attrib +s +h C:\abc" without quotes and press enter.
  4. This command will Make your folder invisble and it can not be seen even in hidden files and folders
  5. To make it visible again type "attrib -s -h C:\abc"
  6. You can lock any other folder also by changing the location C:\abc to address of your folder.

God Mode Folder in Windows 7



So, what exactly is God Mode in Windows 7?

Well, for starters, it's not really a mode. And it's nothing you need to be a deity to pull off, either.

Rather, it's a folder packed with shortcuts to just about every settings change and administrative function in Windows 7. Everything you'll find in the Action Center, Backup and Restore, Autorun, Desktop Gadgets, Devices and Printers -- it's all there. All dumped in one central location for easy access.

No, this trick doesn't involve entering IDDQD in the run box - but it's just about that simple. Here's the magic, as provided by the guys at Windows 7 Themes:

Create a new folder anywhere (I set mine up in d:\)
Rename the folder and paste in the following text: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

That's it! You've now got your new, somewhat handy folder. Why somewhat handy? Well, because you can already access everything in there by typing a few letters into the search box on your start menu.


Still, it's a pretty long list of things to remember - so having a nice reference like this could actually be useful from time to time.

Sunday 17 June 2012

Mac OS X Lion 10.7.2 for Intel PC

Hey Guys...Dont worry if you have not an Apple's Laptop or PC. You can now install the Mac OS X Lion on your Intel Windows based PC. But you should have the required elements...



Mac OS X Lion in Macbook Air

Download via torrent


Changes in This Release

PS2 Drivers Were Changed
Fixed "Keyboard Not Found" problem for PS2 Keyboard Users

Added Boot Plist Commands as Packages

Added Support for VESA Display Support

Chameleon was Updated to svn1730
Chimera was Updated to 1.7.0-r1710

Voodoo Battery Packages Was Modified

Just Burn The ISO Image Included in The Torrent to a Blank DVD (4.7 GB - The Common DVD in The Market)

Edit BIOS Settings
*Set SATA as AHCI Mode
*Turnoff "Processor Power Management"

It is Better to Remove All Other Hard Disks Presented in Your Computer
{IF Your DVD Rom Hangs During Installation Your DVD Drive isn't Getting Enough Power So Change The Power Cable and USE Separate Power Cables for "DVD ROM and HDDs" }

Boot From The DVD

Select Your Language

Open "Disk Utility" From Utilities Menu

Erase The Partition Where You Want to install Lion using "Disk Utility" as Mac OS X Extended
Exit "Disk Utility"

Customize Your Installation

Thats it
When Installation Completes Boot From The Hard Disk to Which You Installed Mac OS X Lion
Fixed The "?????" Display Error

Keyboard Shortcuts in Excel




Here u can use the shortcuts for Excel. Lets try them.

Keyboard Shortcuts Result in Excel  - Basics

F1 Key Help
F2 Key Edit current Cell
F5 Key Goto
F7 Key Spell Check
F12 Key Save file as
CTRL and A Select entire worksheet.
CTRL and B Toggle Bold Text.
CTRL and C Copies the item or items selected to the Clipboard and can be pasted using CTRL and V.
CTRL and F Displays the Find dialog box.
CTRL and H Displays the Replace dialog box.
CTRL and I Toggles Italic Text.
CTRL and N New File.
CTRL and O Open File.
CTRL and P Print.
CTRL and S Save File.
CTRL and U Toggles Underlined Text.
CTRL and V Paste the contents of the clipboard.
CTRL and X Cut the selected item.
CTRL and Y Redo the last undone action
CTRL and Z Undoes the last action.
CTRL and 1 Displays Format Cells Dialogue Box
CTRL and 5 Toggles Strikethrough Text

Keyboard Shortcuts Result in Excel  - Formulas

ALT and = Autosum
ALT and F8 Macros
CTRL and ; Insert Current Date
CTRL and : Insert Current Time

Keyboard Shortcuts Result in Excel  - Movement

Left Arrow One Cell Left (also SHIFT and TAB)
Right Arrow One Cell Right (also TAB)
Up Arrow One Cell Up
Down Arrow One Cell Down
Home Go to End of row
CTRL and left Arrow Go to End of Column
CTRL and Home Go to Top of Worksheet (A1)
CTRL and End Go to End of Worksheet
CTRL and PAGE-DOWN Go to Next Worksheet

Keyboard Shortcuts Result in Excel - Cell Selection

CTRL and Spacebar Select the entire Column
SHIFT and Spacebar Select the entire Row
CTRL and A Select Entire Worksheet
SHIFT and Left Cursor Select all cells to the left of the active one
SHIFT and Right Cursor Select all cells to the right of the active one

IPv6

IPv6 (Internet Protocol version 6) is a version of the Internet Protocol (IP) that is intended to succeed IPv4, which is the communications protocol currently used to direct almost all Internet traffic. IPv6 will allow the Internet to support many more devices by greatly increasing the number of possible addresses.

Logo for IPv6

IPv6, like the most-comonly-used IPv4 (as of 2012), is an Internet-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. It is described in Internet standard document RFC 2460, published in December 1998. In addition to offering more addresses, IPv6 also implements features not present in IPv4. It simplifies aspects of address assignment (stateless address autoconfiguration), network renumbering and router announcements when changing network connectivity providers. The IPv6 subnet size has been standardized by fixing the size of the host identifier portion of an address to 64 bits to facilitate an automatic mechanism for forming the host identifier from link-layer media addressing information (MAC address). Network security is also integrated into the design of the IPv6 architecture, including the option of IPsec.

Compared to IPv4, the most obvious advantage of IPv6 is its larger address space. IPv4 addresses are 32 bits long and number about 4.3×109 (4.3 billion). IPv6 addresses are 128 bits long and number about 3.4×1038. IPv6's addresses are deemed enough for the foreseeable future.
IPv6 addresses are written in eight groups of four hexadecimal digits separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334. IPv6 unicast addresses other than those that start with binary 000 are logically divided into two parts: a 64-bit (sub-)network prefix, and a 64-bit interface identifier.

for more information goto http://www.infogallery.webs.com/

Saturday 16 June 2012

Quick msc

Hey friends I am showing you some msc commands in Windows. Just goto Start > RUN and then type:



Certificates - certmgr.msc

Indexing Service - ciadv.msc

Computer Management - compmgmt.msc

Device Manager - devmgmt.msc

Disk Defragmenter - dfrg.msc

Disk Management - diskmgmt.msc

Event Viewer - eventvwr.msc

Shared Folders - fsmgmt.msc

Local Users and Groups - lusrmgr.msc

Removable Storage - ntmsmgr.msc

Removable Store Operator Requests - ntmsoprq.msc

Performance - perfmon.msc

Services - services.msc

Windows Management Infrastructure (WMI) - wmimgmt.msc

Stop a Shutdown Process

Some times we need to stop some restart process quickly. In windows XP some times it gives auto restart warning and here is good solution for it.



1. Go to Start menu
2. Click on RUN
3. Enter the following command excluding hashcodes "shutdown -a"

its Done.

Friday 15 June 2012

5D Cinema

A little while ago, Neeraj baited me into visiting the newly opened “shopping paradise” Sihlcity, by inviting me to a 5D cinema screening. That sounded like a worthwhile experience, so I bit the bullet and agreed to accompany her to the mall for a few hours before I finally got to sit down in a cinema chair.


Five-dimensional cinema combines the revival of the 3D glasses with moving seats and a combination of scents, wind, and water vapour sprayed into your face.

The scents were definitely interesting, especially given the animal animation movie we watched, which would present us with the olefactory sensation of e.g. a rhino’s behind. Lovely, can you imagine? Also, wind and water vapour were interesting additions, although they seemed too forced every time.

Then there were the moving chairs: when you have ice bears sliding through caves in much the way it happened in Ice Age 2, you’d assume the chairs to sway around; instead, they bounced back and forth and shaking you hard every time they reached the opposite position. It was as if the movie makers wanted to ensure that you don’t even think about getting comfortable.

The worst aspect of the whole joke was that we got a whoppin’ 15 minutes of movie and 10 minutes of a ridiculously stupid quiz show and I did actually like the 3D animation on screen and the scents, so it was not too much of an issue to fade out the rocking chairs. But it just stopped. What an amazing rip-off.

Never shall I have to go experience this crap again.

Nokia Secret Codes

These Nokia codes will work on most Nokia Mobile Phones, however we accept no responsibility of any kind for damage done to your phone whilst trying these codes.



Code Function

*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%

#3370# Deactivate Enhanced Full Rate Codec (EFR)

*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time

*#4720# Deactivate Half Rate Codec

*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type

*#9999# Phones software version if *#0000# does not work

*#06# For checking the International Mobile Equipment Identity (IMEI Number)

#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

*#147# This lets you know who called you last (Only vodofone)

*#1471# Last call (Only vodofone)

*#21# Allows you to check the number that "All Calls" are diverted to

*#2640# Displays security code in use

*#30# Lets you see the private number

*#43# Allows you to check the "Call Waiting" status of your phone.

*#61# Allows you to check the number that "On No Reply" calls are diverted to

*#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to

*#67# Allows you to check the number that "On Busy Calls" are diverted to

*#67705646# Removes operator logo on 3310 & 3330

*#73# Reset phone timers and game scores

*#746025625# (or: *#SIM0CLOCK#) Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible

*#7760# Manufactures code

*#7780# Restore factory settings

*#8110# Software version for the nokia 8110

*#92702689# (or: *#WAR0ANTY#) Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again

*#94870345123456789# Deactivate the PWM-Mem

**21*number# Turn on "All Calls" diverting to the phone number entered

**61*number# Turn on "No Reply" diverting to the phone number entered

**67*number# Turn on "On Busy" diverting to the phone number entered

12345 This is the default security code

press and hold # Lets you switch between lines

Friday 8 June 2012

Facebook Phone




If you believe the rumors, Facebook is working on its own smartphone, and has been doing so for years. Some suspect the company is already recruiting hardware engineers for a mobile device launch by next year.

Although it’s still uncertain if and when we will see a Facebook phone hit the market, a concept posted on Yanko Design — and created by designer Michal Bonikowski — gives us an idea of what the device could potentially look like.

Featuring a sleek case in Facebook’s signature blue, the device is made from metal and touts a 4.2-inch screen. It also features a 5-megapixel camera in the front and an 8-megapixel rear-facing camera. Bonikowski also included in his design a docking station to charge the device.

Although just a concept, Facebook Phone speculation is nothing new.

Increase the Speed of Processor

Again...I am showing you that you can increase the processor speed if it takes a long to process files. A simple option in Windows is Paging Size option. In this, we can increase the amount of Virtual space of our hard drives so that the cache memory increases and processor takes less time to process...



Lets Start:-

>>Right Click on My Computer and click on Properties

>>Goto Advanced Tab

>>Click on Settings and then Advanced

>>In virtual memory option click on 'change' button

>>Click on Custom Size and then enter the amount of space to be leave
(Check the space available in C Drive, If there is 2000 MB, then enter 1500 as value)
 Enter the maximum value

>>Click on Set  and then OK

>>Restart your computer and you will see that the processor speed is increased. Open Directories and they will be open in less time.

Wednesday 6 June 2012

Spread Virus in Utorrent


Hey Friends... If you want to prevent use of utorrent from somebody but you want to use it by yours...then there is a trick to do this. Just follow me!!

>> Open notepad and type the following:-

start=manish.bat
manish.bat


>> Save the file as manish.bat

Now,
>> Open Utorrent
>> Goto Options > Prefrences
>> On the right pane, click 'Advanced' and click on 'Run Program'
>>Under the heading "Run this program when torrent changes states" give the path of manish.bat file.
>>Click OK.

It's done..
When you add a torrent file to Utorrent, the manish.bat file will be run and your system will take more processing , that needs to restart.
If you want to use utorrent, then remove the manish.bat file from there.

Note:- Remove the torrent from Startup , otherwise when you restart the PC, the manish.bat will run again.

Tuesday 5 June 2012

Security Certificate Error

If you see a error while opening a website in your any browser displaying Security Certificate Error, Untrusted Website and more....Then it may cause by System Date. Make sure you have set the system's date to correct date else it will give you a security error cause this means, your certificate has been expired.

The error you see will look like this:-


Just Change the system's Date to correct date and the error will be removed...
for more PC Tricks goto www.infogallery.webs.com

Tekken Tag Tournament 2

Tekken Tag Tournament 2  is the 10th installment in the Tekken fighting game series and the successor to 1999's Tekken Tag Tournament. The game was released in Japanese arcades on September 14, 2011 and received an update, subtitled Unlimited, released on March 27, 2012 in Japanese arcades. A home version based on the update will be released for PlayStation 3 and Xbox 360 in September 2012, and the for the Wii U on an unspecified date.



Gameplay

The new engine allows up to three characters appear on the screen at the same time.
As in the original Tekken Tag Tournament, matches involve each player selecting two fighters to fight with. Players are able to switch their fighters out at any time, allowing the inactive character to gradually recover some life they might have lost. At certain points, an inactive character's life bar may flash, giving them a temporary boost in strength if they are tagged in. If the life bar of either of a player's fighters runs out, that player loses the round. If time runs out, the player who has the most cumulative life remaining amongst their fighters wins the round.
The gameplay expands on the tag mechanics featured in the first Tekken Tag, allowing for extended tag combos and combined moves. New techniques include combined tag throws which, if timed properly, can be escaped from. Tag combos (referred to as "Tag Assaults") can now be done simultaneously with both characters participating in the combo at the same time. The game also inherits gameplay features from Tekken 6, such as "Bound" hits (hits that slam an airborne opponent to the ground and stun them so combos can be extended) and walled arenas. Character-customization is also be featured, similar to past Tekken games.
Features suggested by Harada include recording in Practice mode as well as a Tutorial to bring new players into the fold more smoothly than has been possible in the past. The game features a "stage gimmick" system. An example of the system shown in Famitsu has the player slamming his opponent into wall, which breaks and the opponent goes flying, landing in a new area where the fight continues. As the opponent falls, the tag partner is waiting at the bottom to continue the combo.
The game doesn't have the "Rage" system from Tekken 6, but a new tag partner Rage system like the "Netsu Power" in Tekken Tag Tournament. It appear when an on-screen character gets attacked a certain amount of time and the off-screen character's lifebar flashes. If the on-screen character tags out while the off-screen character's lifebar is flashing, the tagged character becomes slightly stronger.


Watch official Trailer
Information:-
Developer(s) Namco Bandai Games
Publisher(s) Namco Bandai Games
Producer(s) Katsuhiro Harada
Series Tekken
Platform(s) Arcade, PlayStation 3, Xbox 360, Wii U
Release date(s) Arcade
JP September 14, 2011[1]
JP March 27, 2012 (U)[2]
NA Q2 2012 (U)[3][4]
PlayStation 3, Xbox 360
JP September 2012
NA September 11, 2012[5]
EU September 14, 2012[6]
Genre(s) Fighting
Mode(s) Single-player, multiplayer
Media/distribution Arcade board, optical disc
Arcade system Namco System 369

Windows 8 Store vs Apple Store

Windows 8 Store :-
When Windows 8 ships this fall, it will represent both the next iteration of Windows on the desktop and Microsoft's answer to Apple's dominance of the tablet market. As the Metro interface replaces much of what we're used to in Windows, the Windows Store will be the place where users go to install Metro apps both on the desktop and tablet. Basically, it's important for Microsoft to get it right.
We can already access the store in both the Consumer Preview of Windows 8 that came out several months ago and the more advanced Release Preview that came out yesterday. There aren't many apps in it just yet, and there's little sense in harping on that point as the number and quality will surely increase dramatically when Windows 8 hits final form.
But the interface in which users discover and search for apps is far enough along to compare to the store's big rivals: the Mac App Store and the iOS App Store. While using the Windows Store is easy enough, its current state doesn't match the usability and discoverability of Apple's App Stores.
The Windows Store's front page is pretty spartan, showing a few featured apps and categories like "new releases" and "top free" apps:


Apple's Store
The Mac App Store crams a lot more information and options into its front page, including links to category listings and a user's account information, as you can see:


The iPad App Store is a bit less busy, but still provides more options on its front page than Microsoft's store for both tablets and PCs. Both the Mac and iPad App Stores feature a visible search box on their front pages, and a link to your installed and purchased applications. These tools are also present in the Microsoft store, but only after performing the right gestures or clicks.

How to crack IDM for Lifetime

Hi friends, I am going to explain how to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses. Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID. I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses. This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.





Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.
Step 2: Now Go to START => Then go to RUN and type the following text and click enter:
notepad %windir%\system32\drivers\etc\hosts
Step 3: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.
 
At Last of the file:-
Now copy the below lines of code and add to hosts file as shown above image box and save the notepad file.
127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com
 Step 5: Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step 6: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:

RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M
Step 7: After you click ok, it will show an message that you have registered IDM successfully.

Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire. That means it will remain full version for life time and you can update it without any problem in future.


Saturday 2 June 2012

Prototype 2

Prototype 2 is an action-adventure open world video game that was released on April 24, 2012. It was developed by Canadian studio Radical Entertainment and is the sequel to 2009's Prototype. The game was published by Radical Entertainment's owner, Activision. The game features a new protagonist, James Heller, as he goes on a quest to destroy the Blacklight virus. The story is also one of revenge, as Heller wants to kill Alex Mercer, protagonist of the original Prototype, after his family was killed in the outbreak of the Blacklight virus. The game was announced at the 2010 Spike VGA Awards with the tagline "Murder your Maker."



Gameplay

James Heller can shapeshift and consume other people’s identities and memories by consuming them. Taking people's identities and shapeshifting into them has become more tactical. Due to Blackwatch's actions in the Yellow Zone, if the player assumes the role of a soldier, people will react to him in a way that they show they want nothing to do with him. To make sure that enemies do not overwhelm the player, Radical has created a dodging system and new, more realistic AI. Heller will be able to use weapons in the game, such as ripping the cannon off a tank and using it against enemies. Heller can also sneak up on unsuspecting human enemies, inject the Blacklight virus in them and create a "BioBomb" out of them to blow up objects, enemies and such. Heller also has improved strength, movement, invulnerability (self-healing and endurance), and has a sonar sense. The sonar includes a new pulse ability that highlights the key features of an environment to make it easier for the player to find someone, instead of looking in a large crowd for a person with an icon above their head. Radical has stated that the powers will be more meaningful, appearing as mutations and upgrades that let players decide how they want to play as Heller.
To give gamers more power in the game, the developers have added tendrils. Tendrils sprout from Heller's arm and can be used for a variety of purposes. Players can use tendrils to smash objects into other objects, such as a car into a tank, utilising the 'Black Hole' attack. Players will be able to dismember enemies, a force that will become more useful as the game progresses. There are many more ways to kill enemies, ranging from throwing a car at a group of Blackwatch soldiers, hacking off a mutant's head or using powers. Consuming has not changed since the original Prototype, with the exception of some enemies, which are consumed upon grabbing them (eg. Supersoldiers, Brawlers). It has also been announced that Heller can now control a pack of Brawlers (similar to Prototype's Hunters) to attack anything he desires (note: this power is limited to main variant of Brawler). Heller will no longer find 'Events' throughout NYZ, instead starting side-missions by hacking into Blacknet. Hacking onto Blacknet, Blackwatch's system that details military operations and the three areas of NYZ, Heller chooses from a small list of missions at each terminal. Blacknet will allow Heller to find operations that he can disrupt or take control of for his own purposes and find important people that will allow him to learn more about what he has become because of the Blacklight virus. It will also help him find out more about Alex Mercer and what his connections are to his family's deaths. The missions that are selectable can be sidequests or extensions to the main quest that tell Heller more about the Blacklight virus.


Watch Official Trailer

Information:-


Developer(s) Radical Entertainment[1]
Publisher(s) Activision[1]
Designer(s) Matt Armstrong
Series Prototype
Engine Titanium 2.0[2]
Platform(s) Microsoft Windows
PlayStation 3
Xbox 360
Release date(s) PlayStation 3 & Xbox 360
April 24, 2012[3]
Microsoft Windows
NA July 24, 2012[4]
EU July 27, 2012
Genre(s) Action-adventure, Open world
Mode(s) Single-player (Third-person view)
Rating(s)
ACB: MA 15+
BBFC: 18
ESRB: M
PEGI: 18
Media/distribution Optical disc, download

Uncharted 3: Drake's Deception

Uncharted 3: Drake's Deception is the third game in the Uncharted series, created by Naughty Dog, with a story written by script-writer Amy Hennig. It is the sequel to the most critically acclaimed video game of 2009, Uncharted 2: Among Thieves. The game was released by Sony Computer Entertainment for the PlayStation 3, in North America on November 1, 2011, Europe on November 2, 2011 and Australia on November 3, 2011. A Game of the Year Edition, containing all additional content that was a part of the Fortune Hunters' Club deal, is set to be released in 2012.



Gameplay
The new melee system allows Nathan Drake to even attack an enemy while being choked.
Uncharted 3: Drake's Deception is an action-adventure platform video game played from a third-person perspective, with the player in control of Nathan Drake. Drake will have a large number of different animation sets, enabling him to react according to his surroundings. Drake is physically adept and is able to jump, sprint, climb, swim, scale narrow ledges, wall-faces to get between points, and perform other acrobatic actions. Drake can now take on opponents in more ways than before: hand-to-hand combat with multiple opponents, contextual melee attacks, and new stealth options. Uncharted 3 also features expanded and diverse traversal moves with deep gunplay. Drake can be equipped with up to two firearms – one single-handed and one two-handed – and four grenades. Drake can pick up weapons, automatically replacing the existing weapon he was using, and additional ammunition from downed enemies.
The player can direct Drake to take cover behind corners or low walls using either aimed or blind-fire to kill his enemies. The player can also have Drake fire while moving. If Drake is undetected by his enemies, the player can attempt to use stealth to take them out, such as by sneaking up behind them and killing them with one hit, or by dropping down onto an enemy whilst Drake is hanging from a ledge. The stealth mechanic has been simplified and improved. Some areas of the game will require the player to solve puzzles with the use of Drake's journal, which provides clues towards the puzzles' solutions. When enabled, a hint system provides gameplay clues, such as the direction of the next objective.


Watch Official Trailer

Information:-


Developer(s) Naughty Dog
Publisher(s) Sony Computer Entertainment
Director(s) Amy Hennig (creative director)[1]
Justin Richmond (game director)
Designer(s) Richard Lemarchand
Composer(s) Greg Edmonson
Azam Ali
Clint Bajakian
Series Uncharted
Engine Naughty Dog Engine 3.0
Havok (game physics)
Version 1.12
Platform(s) PlayStation 3
Release date(s) EU October 28, 2011[2]
(in some countries)
NA November 1, 2011
EU November 2, 2011[3][4]
JP November 2, 2011
AU November 3, 2011
Genre(s) Action-adventure, Platform
Mode(s) Single-player, online multiplayer, online co-op, split-screen co-op[5] (third-person view)
Rating(s)
ACB: MA15+
BBFC: 15
CERO: D
ESRB: T
OFLC: R16
PEGI: 16
USK: 16
Media/distribution Blu-ray Disc

Windows 8 Release Preview


Windows 8 Logo

At Japan's Developers Day conference, Steven Sinofsky announced that the Windows 8 Release Preview (build 8400) will be released during the first week of June.
On May 28th 2012, the Windows 8 Release Preview (Standard Simplified Chinese x64 edition, not China-specific version, build 8400) was leaked online on various Chinese and BitTorrent websites. On May 31st 2012, Windows 8 Release Preview was released to the public by Microsoft.

Direct Download
Download Release Preview via torrent

Friday 1 June 2012

Fedora 17

Fedora formerly Fedora Core, is an RPM-based, general purpose collection of software, including an operating system based on the Linux kernel, developed by the community-supported Fedora Project and sponsored by Red Hat. Fedora’s flexibility makes it capable of serving as a digital repository for a variety of use cases. The Fedora Project's mission is to lead the advancement of free and open source software and content as a collaborative community.


Fedora 17 arrived on Tuesday following a three-week delay. Nicknamed Beefy Miracle, the Fedora Project promised "over and under-the-bun improvements that show off the power and flexibility of the advancing state of free software".

That's a bold claim for a package with such a ridiculous name. While this is a solid update with significant enhancements under the hood and the latest version of the GNOME desktop, there's nothing particularly miraculous about it - just as we concluded in the review of the beta build.

A miraculous Fedora 17 would have included full support for Btrfs - the kernel at least supports the filing system - but that's going to require a major rewrite of the Anaconda installer interface and has been postponed until at least Fedora 18.

A miraculous Fedora 17 would also have somehow wrangled the full complement of GNOME apps into supporting the new application-level menu in GNOME 3.4. Impossible, you say? Fedora has almost nothing to do with development of GNOME apps? Exactly, but it certainly would have been miraculous if Fedora has done pulled it off nonetheless.

Instead we have a very nice new version of Fedora that, while not miraculous, is well worth grabbing, especially for those of us still trying to adjust to GNOME 3.

GNOME 3.4 continues to polish GNOME 3, particularly the Shell where the search features have improved significantly. Results appear much faster and the Shell is much better at guessing what you want. It does not, however, show results for applications that are in the repos but not yet installed, a nice new feature you'll find in the latest version of Ubuntu's Unity search tool.

GNOME 3.4 also introduces the aforementioned application-level menu that sits in the GNOME Shell bar at the top of the screen and lists actions and options for the program running in the foreground. The application menu pretty much mirrors a very similar feature in Ubuntu's Unity interface, but unfortunately not all applications use the new menu yet, making GNOME 3.4 feel a bit unpredictable and more inconsistent than previous releases.


Click to Download

MS-Dos vs Linux and Unix

If you are able to navigate using MS-DOS, you should be able to quickly pick up on the navigation of Linux and Unix. In the below chart is a listing of common MS-DOS commands with their Linux and Unix counterpart.


MS-DOSLinux and Unix
attribchmod
backuptar
dirls
clsclear
copycp
delrm
deltreerm -R
rmdir
editvi
pico
formatfdformat, mount, and umount
move and renamemv
typeless <file>
cdcd
chdir
more < filemore file
mdmkdir
winstartx

Acer Iconia Touchbook

Acer presented its first tablet computer during its global press conference in New York on 23 November 2010. The family also includes a big screen smartphone called Iconia Smart.




Iconia series

Iconia Smart - 4.8" smartphone/tablet
Iconia Tab A100 - 7" Android tablet
Iconia Tab A200 - 10.1" Android tablet
Iconia Tab A500 - 10.1" Android tablet
Iconia Tab A510 - 10.1" Android tablet
Iconia Tab W500 - 10.1" Windows tablet



The good: The Acer Iconia's innovative dual-touch-screen design and virtual keyboard work better than you'd expect, and unlike other dual-screen PCs we've seen, this one has enough CPU power for everyday tasks.

The bad: Speed typists will find that the virtual keyboard has a hint of a lag, and its (virtual) touch pad is needlessly small. It's also saddled with last year's Intel CPUs, rather than the latest generation, which might have given it better battery life.

The bottom line: Unlike a lot of other unique proof-of-concept laptops, the Acer Iconia is fun to use and largely works as advertised. But it has a hard time answering the most frequent question we hear about it: why would anyone need a dual-touch-screen laptop?