Thursday, December 19, 2013

Fix – Unable to RDP Windows 8 or 8.1


RDP keeps dropping the connection ?

Its been 2 months I was not able to take RDP with my windows 8 / 8.1  machine so I just started digging Microsoft site.I was able to see this issue is there in windows 8 and 8.1 but not able to find the fix.

How can I leave without sharing this information to my friends so here is fix…,

finally I got the fix from below link

Just download by giving your email to Microsoft then install & restart . now it should work.

Source links:

Saturday, December 14, 2013

Stop Ads while using Facebook


I know you are really tired of annoying Advertisement while using facebook that's why you are here,

How to stop this thing?

If you are using chrome browser then here is the tweak,


Facebook AdBlock 

Just click the above link in chrome browser, add the extension to your chrome browser and Enjoy.

This Facebook AdBlock will remove the ads from your Facebook page, to leave you with clean Facebook pages.

- Install the Facebook AdBlock extension
- Go to & refresh the page
- That's it! No more annoying ads.

What's inside?
✔ Works on the new Facebook news feed layout
✔ Removes any type of ad on the side bars and public pages
✔ Blocks sponsored ads
✔ Keeps you free from annoying ads!

Don't forget to RATE  – ★★★★★ (Just help the Developer)

Free script to stop copying your content


Do you feel your contents copied somewhere on the other website or blogs ?

Do you want to stop that by disabling selecting text ?

yes its possible in few steps.


Step 1.

Login to your Blogger account then go to layout

Step 2.

Add a Java Script / HTML Gadget

attach the below color code and save it then check your blog

<script type="text/javascript">

//form tags to omit in NS6+:
var omitformtags=["input", "textarea", "select"]


function disableselect(e){
if (omitformtags.indexOf(
return false

function reEnable(){
return true

if (typeof document.onselectstart!="undefined")
document.onselectstart=new Function ("return false")


Friday, December 13, 2013

Boot to Start menu or login to Start menu in Windows 8.1


Are you upgraded to Windows 8.1 and still looking for the way to boot to start menu ?

you are in right place then , yeah Microsoft does not made this option by default but they left you with option to change.

How to change?

Step 1

Right click on your task bar and goto properties


Step 2

Goto navigation tab and click the below selected option and say apply & Ok



You are really done.



Thursday, December 12, 2013

Free Junk removal tool


Many times people are not keeping eye on the wizards while installing the freeware, so after installation

they will be having bunch of extra junk applications installed in their PC / Laptop.

The problem is those apps are not simply sitting in background rather it started to giving trouble to PCs.

slow down your machines,

unwanted advertisements,

hidden hijacks of your personal data,

PC crashes,


these are the very known symptoms of the affected PCs.


Yeah don't worry we got a single tool which will remove almost 90% of junk applications simply and freely.

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.


Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Blekko
  • Claro / iSearch
  • Conduit
  • Crossrider
  • DealPly
  • Delta
  • Facemoods / Funmoods
  • Findgala
  • Globasearch
  • Hao123
  • iLivid
  • Iminent
  • IncrediBar
  • MocaFlix
  • MyPC Backup
  • MyWebSearch
  • PerformerSoft
  • Privitize
  • Qvo6
  • Searchqu
  • Snap Do
  • Swag Bucks
  • Wajam
  • Web Assistant
  • WhiteSmoke
  • Zugo

and many more…

When run, Junkware Removal Tool will remove all traces of these programs including their files, folders, registry keys, and values.                    



Tuesday, December 10, 2013

Hibernate in Windows 8.1


I was looking for the option to enable hibernate in Windows 8.1 after installed finally found but wanted to share the same with you people.


1. goto RUN and type “powercfg.cpl” hit enter



2. Choose what the power button does



3. Change setting that are currently unavailable



4. Enable hibernate and don't forget to Save Changes.



5. Go to start button and see you have Hibernate option.

Sunday, December 8, 2013

Windows 8.1 to Bootable USB ?


I knew few USB bootable tools which were helping me when I needed to make the windows 7 to bootable USB but somehow those really did not help me when I tried to convert windows 8.1 to bootable USB  (WinToFlash , WintoBootic and Windows 8 USB Bootable Maker)

Finally I was able to convert Win8.1 to bootable USB successful with out any struggle by using ZOTAC WinUSB Maker

it made me to write this post.



Here is some features of this application:

- Fastest file copy from directory or file using a dedicated memory stream allocation.
- Solid UI Design made to have the best performance inside all computers.
- Drag and Drop based for all the functions that need of user data.
- 100% written in .NET to avoid false positives problems.
- Compatible with all DPI scales (100% +).
- Taskbar progress for Windows 7 and higher.
- Smooth GUI with nice animations.

The software compatibility:

- Windows XP or higher with .NET Framework 4.0 installed.
- Capable to transfer Windows Vista or higher to any removable device.

The hardware compatibility:

- Any removable device inside the system.
- The best compatibility with USB 3.0 and memory cards.
- Cell phones, tablets, MP3 players that have massive storage support.
- External HDDs and removable devices recognized as fixed media also is supported.

The boot features:

- Full UEFI support with multi boot code. *
- Dynamic device format for any type of device.
- The boot code is made inside the partition, the last will remain untouched.

* Only FULL UEFI compatible operating systems will be supported (Windows 8 / 8.1 x64 until now).

Saturday, December 7, 2013

Intel VT-x / Intel VT-i / Intel VT-d / Intel VT-c


Intel VT-x (previously known as Intel VT) is the implementation of an Intel Secure Virtual Machine for the x86 IA-32 and Intel 64 architectures. The older designation, “Intel VT” (without the “x”), continues to be used by many BIOS menus.

VT-x is necessary for Intel systems in order to:

  • run domUs under Xen Hardware Virtual Machine (HVM) (as well as run a guest system under Windows).
  • run 64-bit guest systems under VMware.[1]
  • to run virtualization with KVM.[2]

Information regarding the activation of Intel VT-x at the BIOS level (if supported by the Intel processor) can be found in the article, Activating the Intel VT Virtualization Feature.

As of the Nehalem architecture (Intel Xeon 55xx CPUs), VT-x includes the Intel Extended Page Tables (EPT).[3][4]

Intel VT-i (Intel Virtualization Technology for Itanium Processors)

Intel VT-i is the implementation of an Intel Secure Virtual Machine for the IA-64 architecture (Itanium).

Intel VT-d (Intel Virtualization Technology for Directed I/O)

Intel VT-d makes direct access to a PCI device possible for guest systems with the help of the Input/Output Memory Management Unit (IOMMU) provided. This allows a LAN card to be dedicated to a guest system, which makes attainment of increased network performance beyond that of an emulated LAN card possible. Of course, once such a direct access system has been implemented, live migration of the guest system is no longer possible. VMware can be configured for use with an activated Intel VT-d system using VMware VMDirectPath for direct access to PCI cards.

Pre-requisites for Intel VT-d

  • The chip set as well as the BIOS used must support Intel VT-d.
    • Requires the Intel Nehalem or later micro-architecture, such as that found in Xeon 34xx, 55xx and more recent, as well as other, desktop CPUs (see A List of Intel CPUs).
    • There are no special requirements placed on the CPUs themselves, since VT-d is a function of the chip set. The CPU need merely support VT in general (see [5]).

Information regarding the activation of Intel VT-d at the BIOS level (if supported by the Intel processor) can be found in the article, Activating the Intel VT-d Virtualization Feature.

For additional information regarding VT-d, see:

Intel VT-c (Intel Virtualization Technology for Connectivity)

Intel VT-c is a collection of input/output (I/O) virtualization technologies. These technologies include:[6]

The article, Activating the SR-IOV Virtualization Feature contains additional information about activating SR-IOV.

For additional information regarding VT-c, see:

The following, as well as other, platforms support VT-c:

  • Intel 75xx systems (Intel 7500 Chipset Boxboro-EX)[7]

Configuring VMDirect Path I/O pass-through devices on an ESXi host


You can connect up to two passthrough (ESX 4.0) and up to four passthrough (ESX 4.1) devices to a virtual machine. When selecting the devices, keep in mind these restrictions:

Configuring pass-through devices

To configure pass-through devices on an ESX host:

  1. Select an ESX host from the Inventory of VMware vSphere Client.
    Note: If you have a chipset with VT-d, when you click Advanced Settings in vSphere Client, you can select the devices that are dedicated to the VMDirectPath I/O.
  2. In the Configuration tab, click Advanced Settings. The Pass-through Configuration page lists all available pass-through devices.
    Note: A green icon indicates that a device is enabled and active. An orange icon indicates that the state of the device has changed and the host must be rebooted before the device can be used.
  3. Click Edit.
  4. Select the devices and click OK.
  5. When the devices are selected, they are marked with an orange icon. Reboot for the change to take effect. After rebooting, the devices are marked with a green icon and are enabled.
    Note: The configuration changes are saved in the /etc/vmware/esx.conf file. The parent PCI bridge, and if two devices are under the same PCI bridge, only one entry is recorded.
    The PCI slot number where the device was connected is 00:0b:0. It is recorded as:
    /device/000:11.0/owner = "passthru"
    Note: 11 is the decimal equivalent of the hexadecimal 0b.

To configure a PCI device on a virtual machine:

  1. From the Inventory in vSphere Client, right-click the virtual machine and choose Edit Settings.
  2. Click the Hardware tab.
  3. Click Add.
  4. Choose the PCI Device.
  5. Click Next.
    Note: When the device is assigned, the virtual machine must have a memory reservation for the full configured memory size.

Thursday, December 5, 2013

How to change Favicon or Blogger Icon ?


What is Favicon ?   

While you are opening a Blogger  or any Blogspots you can find the Big “B” imageicon will be sitting in your title bar its is called Favicon.

Why you want to change this ?

some people want to make their BlogSpot to looks like website, in this scenario you need to change this first.

Okay let me jump to start the procedure,

Step 1 . You need to create a alternative icon to replace by using free online tool.

               FaviconGenerator (right click image and choose “Save image as”)

     upload your image (make sure you are uploading 256 X 256 resolution file so             that  you will  be getting good resolution icon.)

Step 2 .  Upload your favicon to the web

             Login in to Blogger account and choose your blog, go to layout you can see like below screenshot


            Edit Favicon and upload your new icon and don’t forget to save the settings.

You are all done.

Now check your blog you can see new icon sitting in your title bar.

Don’t wonder if its not reflecting suddenly just clear your Browser cookies and reopen your Browser

now you will be seeing the new icon.



Tuesday, December 3, 2013

What are the risks in Pirated Windows ?


The risks and costs of obtaining and using pirated, or counterfeit, software are real, to individual customers and to organizations. Too frequently , counterfeit software is bundled with malicious and unwanted software that can lead to corrupted systems, lost data, and even identity theft. For example , an IDC report that was sponsored by Microsoft® in 2006 found that 25% of websites offering counterfeit software also attempted to install spyware, Trojans, and other malware that can compromise computer systems and environments.1

In organizations, counterfeit software can increase IT costs substantially. A Yankee Group study (sponsored by Microsoft) revealed that “when problems arise with counterfeit software, IT administrators typically require 20% to 30% more time and labor to identify and resolve the problems—at a monetary premium to the business.”2 And a 2008Harrison Group study (sponsored by Microsoft) concluded that “companies less committed to using genuine software are significantly more likely to have system failures that lead to lost critical data and employee downtime.”3

These security issues are compounded by the fact that only customers with genuine Microsoft software have access to updates and support from Microsoft and its partners.

Additionally, lost and compromised product keys, as well as non-compliant licensing, can result in increased costs from system reactivation, employee work interruptions, damaged reputations, or even costly financial penalties.

Top of Page

Microsoft Genuine Software Initiative

In an effort to ensure that customers avoid the risks of using counterfeit and noncompliant software and experience all of the benefits of using genuine software , Microsoft launched the Microsoft Genuine Software Initiative (GSI). The GSI divides its increasing investments across three strategic areas: education , engineering, and enforcement.

Three Pillars of Microsoft GSI

Source : Microsoft

Please use Genuine Copy of Windows.

Monday, December 2, 2013

Free webhosting providers


I am new to webhosting wanted to learn depth in by using php based tools and etc. so I have decided

to buy a domain name but was looking for free webhosting finally I found top rated providers with and

without Ads even 99.9% uptime guarantied, would like to share with you people.


  1. (PHP, MySQL, WordPress, Joomla, Free domain, No ads)
  2. Free Hosting EU (Blog / Site builder, No ads, Free domain)
  3. (Easy Website builder: html5, Flash, mobile, blogs, etc.)
  4. (PHP, MySQL, Email Sending, No Ads, Free subdomain)
  5. (Website & Blog builder, Photo album, Free domain)
  6. (PHP, MySQL, 1-click Scripts, No Ads, Free subdomain)
  7. (PHP, MySQL, PHPbb, SMF, Wiki, Free subdomain)
  8. (Support cPanel, PHP, FTP, No ads, Free subdomain)
  9. (Visual website builder, add videos, photos, shopping cart)
  10. (Easy site builder, blog, forms, polls, Free subdomain)

Sunday, December 1, 2013

Map Your Domain Name to Blogger


I have created this post just because want to help and speed up their work the way to fix…,

You can establish a more professional identity for your Blogger® blog by configuring it to point to one of the domain names you registered with any registrar. in my case I am using Godaddy as I recently came across this situation, Instead of entering your Blogger URL to view your latest blog post, visitors enter your domain name's URL. For example, by mapping your blog to your domain name, visitors focus solely on your domain name.

To point your Blogger blog to your domain name, you set up domain name mapping, which configures your blog settings and domain name. You update your settings in your Blogger account and Domain Manager:

Edit the www CNAME record for the domain name you want to use with your Blogger account. This update tells the Web browser to open your Blogger blog when visitors enter your domain name's URL in the browser address bar.

You can automatically configure your DNS with this tool.
Forward your domain name to use www. This step ensures your Blogger blog displays for visitors who go to your domain name with or without the www prefix. For example, it displays for visitors who entered both and
Configure your Blogger account to use your domain name.

To Edit Your CNAME Record

Log in to your Account Manager.
Next to Domains, click Launch.
From the DNS menu, select DNS Manager. The DNS Dashboard displays.
For the domain name you want to use with your Blogger account, click Edit Zone. The Zone File Editor displays.
In the CNAME (Alias) section, click the www record.
In the Points To field, type
Click Save Zone File, and then click OK.

To Configure Your Blogger Account

Log in to your Blogger account.
From the Settings tab, select Basic.
From Publishing, click Add custom domain.
Click Switch to Advanced Settings, and then enter your domain name. For example, enter
To specify another location in which to look for files, in the Use a missing files host? section, select Yes and enter the path. If not, select No.
Click Save.

Any DNS changes you make can take up to 48 hours to reflect on the Internet.

Friday, November 29, 2013

Intel WiFi Link 5100 won't connect to WPA2 network?


I bought a new wifi router which supports new network security protocols like WPA2/ Personal & etc..  unfortunately I was not able to connect my laptop through Intel Wifi Link 5100 WAN device which is built in with my laptop but there were no issues while I am connecting to my Android phone.

finally I made this to work with my laptop by the below things which I followed so I decided  to share with  you people I believe you are in right place to fix your issue.

  • Firmware update in your wireless router from the Manufacturer's website.
  • Broadcast SSID (change this to make it easier to connect)
  • Use WPA-PSK(TKIP) Security(WPA Personal).
  • Password at least 13 characters long.( so that people wont hack your wifi easy)
  • Mixed b and g mode(n if available)(Use this mode only if using a print server and/or USB wireless adapters.
  • Use channels 1, 6 or 11 - for better to use your device
  • Setting up DHCP as you want.
  • Do NOT use Mac Address Filtering
  • Turn off the firewall in the wireless router.
  • Its safe to turn off WPS if its not really needed.
  • Disable 20/40Mhz Coexistence (for faster speed)   - Optional
  • Save and exit.
  • Power off  router and keep 30 seconds.
  • Power on router and wait 30 seconds, now try to connect.

Enjoy helping others.

Wednesday, November 27, 2013

Track who is copying your content ?


People are trying hard to share the knowledge with others and want make money on that but some people are using to copy their contents from their blog or site simply and they are getting top ranking on Search engines.

I feel this is the headache of most of the people ? lets know about Tynt service for your cure.

Tynt are providing 2 different types of service or solution for your headache,


Copy Paste & Speed Share

Copy Paste :

All that you need to do that Once you sign in to Tynt you will get a separate Java script code where you need to install in to your Blogs or websites.

after that it will keep on watching your site so that you can track that how many time your content copied

not even that this script will add your site url by default to their copied content so that your url will be shown in their content as well.

Speed Share :

this is also like CopyPaste you need to add a Java script  in to your Blog or site so that people can see share buttons very quickly as soon as they are selecting your content


Tuesday, November 19, 2013

Vengeance Note Tw 3.1 - for Samsung Galaxy Note (GT-N7000)

VengeanceNote Tw 3.1 - for Samsung Galaxy Note (GT-N7000)
This rom is build with Miui's Patchrom tool.
Do a Full wipe if you com from vetw3 to avoid bugs.
- Miui 3.11.1 (changelog on )
- Update base to XLT6 4.1.2
- Multilang pack - on
- OTA Updates via UpdateMe
- Working Smart Stay, Airview & Spen
- 3 Way Reboot
- CRT - Off
- Resizable widgets on Miui Home
- Note Settings for changing row/size on Miui Home
- Change DPI to 268 on Note Settings
- removed Chinese only Apps
- TW Launcher, Awesome Note, Splanner & more TW Stuff on UpdateMe
- Chinese Miui Apps on UpdateMe
- Switch between UMS & MTP via UpdateMe
- Download Gapps flashable zip or Gapps Installer via UpdateMe
- Multi DPI PlayStore on UpdateMe
- Bravia Engine 3
- add Media Scanner fix
- Splanner on UpdateMe
- Philz v5.x Recovery
- Download latest PhilZ N7000 kernel
- Make a Backup of your current rom
- Flash it
- Reboot recovery
- Make a Fullwipe (dont forget to wipe /preload )
- install the rom
Known issues:
- Change to Tw Launcher (from updateme) doesnt work, you need a home switcher app from playstore
If you doesnt have a Lockscreen & Power Menu, take a look here :
Check this link for newest and older Miui version (updated every friday) :
Credits to MIUI, Miuiandroid for base/multilang pack & PhilZ for the kernel, Galaxtus for the Wallpaper

Sunday, November 17, 2013

CM or CyanogenMod Installer in PlayStore


The very famous custom rom Cyanogen Mod can be installed from Google Play store by installing Cyanogen Mod Installer.



Companion application for the CyanogenMod Installer. Following this process will provide your device with the latest version of CyanogenMod, an Android OS made for you, the users..

For a list of currently supported devices, please see our Supported Devices page:


Google Nexus S


Google Nexus S 4G


Google Galaxy Nexus (GSM)


Google Galaxy Nexus (Verizon)


Google Galaxy Nexus (Sprint)


Google Nexus 7 (WiFi)


Google Nexus 7 (GSM)


Google Nexus 7 2013 (WiFi)


Google Nexus 4


Google Nexus 10


Samsung Galaxy S II Skyrocket


Samsung Galaxy S II Hercules


Samsung Galaxy S II (Intl)


Samsung Galaxy S II (Intl)


Samsung Galaxy S III (Intl)


Samsung Galaxy S III (AT&T)


Samsung Galaxy S III (Sprint)


Samsung Galaxy S III (T-Mobile)


Samsung Galaxy S III (US Cellular)


Samsung Galaxy S III (Cricket)


Samsung Galaxy S III (T-Mobile)


Samsung Galaxy S4 (Intl)


Samsung Galaxy S4 (Sprint)


Samsung Galaxy S4 (Canada)


Samsung Galaxy S4 (Cricket)


Samsung Galaxy S4 (C Spire)


Samsung Galaxy S4 (T-Mobile)


Samsung Galaxy S4 (US Cellular)


Samsung Galaxy Note (Intl)


Samsung Galaxy Note (AT&T)


Samsung Galaxy Note (T-Mobile)


Samsung Galaxy Note II (GSM LTE)


Samsung Galaxy Note II (GSM)


Samsung Galaxy Note II (AT&T)


Samsung Galaxy Note II (T-Mobile)


Samsung Galaxy Note II (Sprint)


HTC One (Unlocked)


HTC One (T-Mobile)


HTC One (AT&T)


HTC One (Sprint)


Please note: Currently the installation process requires a Windows PC to complete.

but CM team still working on OSX support.

Device won't boot up, but shows CM boot animation
  • The installer lost communication during the install, usually due to a faulty USB cable or intermittent connection. You need to power down the phone, then boot it into recovery mode - different phones have different key combinations to boot into recovery. Once you're in recovery mode, you should be able to plug in your phone and restart the installation process from the beginning.
Device not detected
  • Is your device supported? Refer to the supported devices list above.
  • Have you installed and run the Android app? It will prepare your device for installation. Run the Android app and follow the instructions.
  • Try unplugging your device and plugging it into a different port. Windows will sometimes fail to recognize a device until it's unplugged and replugged.
  • Your USB cable may not be up to par.
'We couldn't talk to your phone'
  • Disable your anti-virus. No, really, disable your anti-virus. It interferes with the tools we use to write your recovery partition, among other things.
  • Plugging the phone into a different USB port and clicking 'Try Again' is often sufficient to proceed.
  • If you have a USB hub or a docking station, try the installation without it. Unplug from the hub or docking station completely.
  • If you get this repeatedly at different stages of the install, you almost certainly have a bad USB cable.
  • If the installer doesn't detect your device after a reboot, and it's stuck in download mode, it's generally safe to hold down power or remove the battery (if the phone allows it) to power the phone off. You may attempt the installation again, it may be successful.
  • For Windows: If in advanced power settings enabled something like "temporary disabling USB" Windows can disconnect USB.

If you run into any issues or need some additional help, please see CM forums:

.PIT files Updated links for Samsung phones


here is the PIT and Ops files to use with Odin flasher.

B5510 - B5510B - B5510L : Download

B5512 - B5512B : Download

B7510 : Download

D700 : Download

I5500 - I5500B - I5500L - I5503 - I5508 : Download

I5510 - I5510L - I5510M - I5510T : Download

I5700 : Download

I5700E : Download

I5800 - I5801 : Download

I7500 : Download

I8150 - I8150B : Download

I8530 : Download

I9000 - I9000B - I9000M - I9000T : Download

I9001 : Download

I9003 - I9003L : Download

I9010 : Download

I9070 : Download

I9070P : Download

I9100 - I9100M - I9100P - I9100T : Download

I9100G : Download

I9103 : Download

I9220 : Download

I9250 : Download

I9300 : Download

N7000 - N7000B : Download

P1000 : Download

P1010 : Download

P3100 : Download

P3110 : Download

P5100 : Download

P5110 : Download

P6210 : Download

P6211 : Download

P6800 : Download

P6810 : Download

P7300 - P7300B : Download

P7310 : Download

P7500 : Download

P7510 : Download

S5300 : Download

S5360 - S5360B - S5360L - S5360T - S5363 : Download

S5570 - S5570B - S5570L : Download

S5570I : Download

S5660 - S5660L - S5660M - S5660V : Download

S5670 - S5670L : Download

S5690 - S5690L : Download

S5830 - S5830B - S5830C - S5830L - S5830M - S5830T : Download

S5830I : Download

S6102 : Download

S6500 : Download

S6802 : Download

S7500 - S7500L : Download

Thursday, November 14, 2013

Lets convert your handwriting to Text in Android


I still remember the day I got surprised when I saw a smartphone that allows to write on the screen and recognize very nicely few years ago. but there was few issues while recognize and few things was not possible too.

Now a days its somehow rectified by the Cross Platform Text recognizing technology.

I am writing this post which made my life easier on day to day activities I am really impressed with this application name called “7notes with mazec


How it works

7 notes with mazec


### Handwriting input method “mazec” is also available for Note Anytime!
More than a simple note taking app, Note Anytime is also a powerful drawing app, PDF annotation tool, interactive browser, virtual whiteboard and more. Note Anytime is a universal note taker and sketching software for iOS, Android and Windows.

For this version please note the following:
* English language only
* Kindle Fire users please use "7notes Premium (Kindle Tablet Edition)" available from the Amazon Appstore

7notes with mazec is the smart writing tool optimized for the Android OS. 7notes enables you to mix handwriting recognition into your standard Android experience, removing the reliance on the software keyboard.

Now you can take notes faster and easier in a wide variety of situations such as during a phone call, attending lectures, meeting with customers, and commuting. 7notes provides a superior note-taking experience with a state-of-the-art handwriting recognition and text prediction engine. You can easily export notes to e-mail, Facebook, Twitter, and other applications such as Evernote.
The application delivers the power of human touch, to offer solutions that eliminate the barriers between smartphone and tablet users and their keyboards. Handwriting recognition “mazec” can be used within other Android applications such as e-mail, Twitter, blogging apps, thanks to the mazec technology.

7notes has three key concepts:
[Take notes on the fly]
You can take a note anytime, anywhere at a moment with handwriting.
You can edit and decorate handwritten sentences later as you want.
Smooth inking and auto scroll, feed features provide outstanding note taking experience.

[Notes to messages on demand]
7notes with mazec has state-of-the-art handwriting recognition engine which allows you to change your handwriting to text messages during or even after your handwriting. The app also has a variety of exporting features to e-mail, Evernote, Facebook and Twitter, etc.

[Replace pen and paper]
With 7notes with mazec, your Android device becomes the best notepad you can carry anytime, anywhere. Good-bye dead trees.

7notes features include:
- Handwriting stroke input with smooth inking
- Convert handwritten notes to digital text real-time or on-demand
- Decorate handwritten letters and digital text with different colors, fonts and styles
- Create and manage notes easily
- Connect to other applications such as Note Anytime, Facebook, Twitter, and Evernote
- Cross application handwriting recognition available through the mazec technology


Wednesday, November 13, 2013

How to open firewall port in Windows


I am writing this post for my Developer friends as they wanted to know.

the scenario is a Developer hosting a web application by using IIS in windows but he is not able to access the same from other machines which are available in the same network.

make sure the web application is working locally by typing localhost from your browser.

coming  to our main part.

first you need to check your local port is open for http.

How to check your port is open ?

there are many ways but let me show one easy way here.

just open the link from your browser and type port 80 and click “Check Your Port”

button if you are getting green color “Success” message saying that your port is open then that’s great.

If not.., what next? you gonna need to open http port 80 in your firewall.

lets see how..,

1. Open Control Panel and choose Firewall


2.Select Advanced Settings


3. Choose Inbound Rules from left pane


4. Right click “Inbound Rules” and say “New Rule” and Select Port in the New Inbound Rule Wizard and then click Next.


5.Select the protocol for this rule in our case  is TCP, select Specific local ports, type port number 80, and then click Next.


6.Select Allow the connection and then click Next.


7.Select when this rule applies (check all of them for the port to always stay open) and then click Next.


8. Give this rule a name and then click Finish to add the new rule.



TCP Port 80 is now open and ready to be used.

again check your port by using the online port checker tool which I mentioned top of this post, now it should say its open.

Now you can check your web application from another machine by typing the hosted machine name or IP .

Note:- If you are trying this in your office network 100% it will not work because centralized firewall is enabled to manage office network machines.

Sunday, November 10, 2013

One Tab loading in Chrome ?


In this method you can save memory a lot if you are interested in just make the Chrome to load single tab on startup then here is my another post to read.

How to make your Chrome Browser to load only one tab when ever you open the first time after the boot.

every one knows Chrome its giving blazing speed to compare to other browser if you are having your chrome in well tuned.

even though I have seen many threads over internet saying that its does not have the feature to load only one tab when you open browser first time after the boot of your PC incase you are set it to keep tabs for last time used.

but this feature came with Mozilla Firefox , why not in Chrome no answer from Google yet.

I found a Chrome Extension which make this feature enabled in Chrome by doing simple workaround.


How it works

Whenever you find yourself with too many tabs, click the OneTab icon to convert all of your tabs into a list. When you need to access the tabs again, you can either restore them individually or all at once.

When your tabs are in the OneTab list, you will save up to 95% of memory because you will have reduced the number of tabs open in Google Chrome.

More Features

OneTab lets you easily export and import your tabs as a list of URLs. You can also create a web page from your list of tabs, so that you can easily share your tabs with other people, other computers, or with your Smartphone or tablet.

You can drag and drop tabs in your OneTab list to reorder them. You can also hold down the Ctrl or Cmd key while restoring tabs and they will remain in your OneTab list (meaning you can use OneTab as a way of quickly launching a set of commonly used tabs). OneTab supports retina displays. Note that OneTab is designed to leave in place any 'pinned' tabs you have.

You will not lose your list of tabs if you accidentally close the OneTab window, if your browser crashes, or if restart your computer.


How to install OneTab

To install OneTab into Google Chrome in under 5 seconds, click here

How to uninstall OneTab

Simply right click on the OneTab icon in Google Chrome, and click 'Remove from Chrome'.

Saturday, November 9, 2013

All in One online DNS information tool


What do you think having tool to find all DNS related information from one place online.yeah its provided by and

Are you a developer ? want to integrate with your application ?

easy, they are providing API so that you can just use this to integrate with you application.


get viewdns API from here

dnsstuff designed by the great Solarwinds team as they always do…,

and they are providing many other useful tools in free of cost.

image image

Wednesday, November 6, 2013

Hosting websites from any Windows Machine

Recently I came across the situation in my friends circle, there is a requirement to host  a demonstration site in a laptop / desktop machine which is running any version of Windows and the site should be available over the internet by typing the appropriate site name.
In this post I assume that you have basic knowledge of DNS .
Is it possible ?
Yeah Its absolutely possible ,When I told this my friends started to laughing at me.
anyway I have proven to them but I have decided to write a post regarding this to give some idea about this situation so that people can have some idea who don’t know already.
There is an other way to make this work with out using any software If you are ready to use Windows Server editions keep reading my site often so that you can read my other post which will explain about configuration in Server editions.(soon)

There are few providers giving this option with 24/7 support but here I am just going to talk about only 2 top level providers.
No-IP   and  Dyn

Step 1  You need to host a site in your local machine does not matter whether you are using IIS or  Apache Tomcat.
Please confirm its hosted properly by typing localhost from your browser. if it working then you are good to go…,
Step 2  Choose which provider (NOIP or DYN) you want to use it, but process is same for both.
in this post I am using NOIP because I am an existing user.

  • Login with your account
  • Choose your DNS        (based on your budget)
  • Download the client & Install where you are exactly hosted your site.
  • Login from the installed application


Step 3    Edit Hosts like below to manage your existing DNS

and select your DNS say “Save” like below screen.


You are done!

Now you can check your site from any device over internet.(some times it will take max 4 hours to take effect)

Demo by No-IP




Unusual traffic from your Computer Network ?


What does it mean?

When your Device sending some automated traffic to Google we may get the below on your browser.


What to do when you are getting this?

The error page most likely displays a CAPTCHA (a squiggly word with a box below it). To continue using Google, type the squiggly word into the box -- it's how we know you're a human, not a robot.

  1. Check for malware on your computer. Malicious software, sometimes bundled with other free downloads without your knowledge, can trigger Google to show this message.  some well-known programs that can detect and remove such applications.

  2. If the suggested programs don't resolve the problem, you might want to try an advanced troubleshooting program such as HijackThis.

    HijackThis lets you view programs installed on your computer and easily remove malicious ones. We're not affiliated with HijackThis and cannot vouch for it ourselves however many other users have found it useful. After scanning your computer with HijackThis, you can determine which programs to remove. Make sure to be cautious, as you do not want to remove legitimate programs from your computer.

  3. After using HijackThis, suggest you to update and run the applications listed below again. Although you've already run these programs, doing so after using HijackThis often exposes additional files.

Friday, November 1, 2013

Find or Erase your stolen Android Device remotely


Step 1. login to GooglePlaystore 

Step 2. Choose “Android device Manager “ from gear icon in the right top


Step 3. Choose Setup Lock & Erase and follow the wizard on your device



Step 4. You can just make your Device ring for 5 minutes incases you forgot where you kept your Device

by pressing Power button you can off your Ringing tone once you got your Device.

Sunday, October 27, 2013

How to change MAC Address of existing Virtual Machines


I was having problem with my ethernet MAC in one of my VMs. I just did remember that I did not write post about this, so I am writing this now.

You will be simply failed if you have tried below things..,

1. Removing that ethernet from VM and adding new one

2. Generate a new MAC from the ethernet settings.


So what is the work around ?

lets start…,

Step 1.  Go to your VM working directory to the one you are facing issues. from Virtual Machine settings.


Step 2.  Edit the .vmx file by any text editor and find the below three entries below and remove completely from that file.

In my case these are below entries for you it will be in enthernet[n].generatedAddress= “your current MAC”

ethernet0.generatedAddress = "00:0c:29:2b:5b:8e"

ethernet0.generatedAddressOffset = "0"

ethernet0.addressType = "generated"



Step 3.  Add a new static MAC address line to the configuration file with help of the following entries:

ethernetN.address = "00:50:56:XX:YY:ZZ"
ethernetN.addressType = “static”

XX should be  hexadecimal number between 00h and 3Fh,

YY  and ZZ should be  valid hexadecimal numbers between 00h and FFh.

Friday, October 25, 2013

How to submit your sitemap to Blogger


Its really simple but I have created this post for the Blogger beginners.

Step 1.

Go to   and sign in to gmail account which you have mapped in to Blogger.

Step 2.

Once you logged in you need to select your blog where you want to submit sitemap incase you are having more than one Blogs.



Step 3.

Now you are seeing the Dashboard of your selected Blog. Go to Crawl and choose Sitemaps as per the below screen.



Step 4. Click ADD /TEST SITEMAP like below and type following yellow colored text without quotes

atom.xml?redirect=false&start-index=1&max-results=500”  and Hit “Submit Sitemap”


Note : If you are keeping more than 500 posts in your blog you need to add one more entry like below example for 501 to 1000 like vise 1001 to 1500.

Example :


Recover deleted files with Portable tools


Now a days everyone looking for light weight tools for often use and portable too. there could be two reasons,

one is people don’t want to hurt their computer / laptop while trying to get their work done with free wares when they are really looking for the best to get their result.

second thing people want to use this where they don’t have access to try Winking smile


these are the top 2 tools where I got 99% satisfied all the times.

 1. Recuva   - Download here

Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!

Features :-

Undelete files on your computer

Deleted a file by mistake? Recuva brings lost files on your computer, USB drive, camera or iPod.  

Recovery from damaged or formatted disks

Even if you've formatted a drive so that it looks blank, Recuva can still find your files on it.  

Recover deleted emails

Emptied your email trash and need it back? Recuva's got you covered with full support for Microsoft Outlook Express, Mozilla Thunderbird, or Windows Live Mail.  

Recover deleted iPod music

Deleted music from your iPod or MP3 player? No problem, Recuva will get this back for you along with any additional track data.  

Restore unsaved Word documents

Did Microsoft Word crash or did you forget to save that important Word document. No problem with Recuva! As it can intelligently rebuild Word documents from their temporary files.  

Quick-Start Wizard

If you need your files back right away without fiddling with options, Recuva's Quick-Start Wizard is the answer.  

Deep Scan

Recuva can find most files within a minute. Or, set the Deep Scan to look for more deeply-buried results.  

Securely delete files you want to erase forever

Want to protect your deleted files? Recuva also allows you to permanently erase any traces of deleted files.  

Portable version

Take Recuva with you wherever you go with the portable version.

2. Wise Data Recovery -   Download here 


Easy to use

The operation is easy and simple. By several clicks only, you can search and recover the lost data.

Quick and Safe

Wise Data Recovery can search and recover the lost data quickly, accurately and safely.

Able to recover various types of files and different devices

The types of files that can be recovered by Wise Data Recovery include image, document, audio, video, compressed file and email. And the devices that can be recovered include local drive, USB, camera, memory card, removable devices and so on.

Show instructive scan results

Wise Data Recovery will indicate the data as "Good", "Poor", "Very Poor", or "Lost" in the scan results to show whether they are able or suitable to be recovered.

Sunday, October 20, 2013

How the JTA Transaction Manager helps to GemFire


JTA provides direct coordination between the GemFire cache and another transactional resource,

such as a database. Using JTA, your application controls all transactions in the same standard way, whether the transactions act on the GemFire cache, a JDBC resource, or both together.

By the time a JTA global transaction is done, the GemFire transaction and the database transaction are both complete.

imageContributed by Gemstone.

Using GemFire with JTA transactions requires these general steps.

During configuration:
1. Configure the JDBC data sources in the cache.xml file.
2. Include the jar file for any data sources in your CLASSPATH.

At run-time:
3. Initialize the GemFire cache.
4. Get the JNDI context and look up the data sources.
5. Start a JTA transaction.
6. Execute operations in the cache and database as usual.
7. Commit the transaction.

The transactional view exists until the transaction completes. If the commit fails or the transaction is rolled
back, the changes are dropped. If the commit succeeds, the changes recorded in the transactional view are
merged into the cache. At any given time, the cache reflects the cumulative effect of all operations on the
cache, including committed transactions and non-transactional operations.

JTA Transaction Limitations:

• Only one JDBC database instance per transaction is allowed, although you can have multiple connections
to that database.
• Multiple threads cannot participate in a transaction.
• Transaction recovery after a crash is not supported.
In addition, JTA transactions are subject to the limitations of GemFire cache transactions, which is discussed
in the previous section. When a global transaction needs to access the GemFire cache, JTA silently
starts a GemFire cache transaction.

JTA Sync Up :

JTA syncs up multiple transactions under one umbrella by enabling transactional resources to enlist with a
global transaction. The GemFire cache can register as a JTA resource through JTA synchronizations. This
allows the JTA transaction manager to call methods like commit and rollback on the GemFire resource and
manage the GemFire transactions. You can bind in JDBC resources so you can look them up in the JNDI
context. When bound in, XAPooledDataSource resources will automatically enlist if called within the context
of a transaction.

Example :

Using GemFire JTA Transaction Manager

The external data sources used in this transaction are configured in cache.xml.

Region r = ...; // the gemfire regionDataSource 
ds = ...; // other datasource

try {
Context ctx = cache.getJNDIContext();
Connection conn = null;
tx = (UserTransaction)
conn = ds.getConnection();
Statement stmt = conn.createStatement();
String sqlSTR = "insert into " + tableName + " values (........ )";
r.put("key", "value");
} catch (NamingException e) {
// handle the exception

Saturday, October 19, 2013

Mount NTFS USB / Partitions in Cent OS 6.3


All that you need to do install ntfs drivers by enabling Fedora EPEL Repository.


Run the commands in terminal

Step 1:  Enabling the repository

rpm -Uvh

Step 2.  Installing the ntfs driver

“yum -y install ntfs-3g”


LOL ! that’s all now it should mount your ntfs partitions / USB Sticks & etc ….,

KMS Activator for Windows 8.1 and 2012 R2


Are you running with Windows 8.1 or 2012 R2 and looking for KMS Activator ?

Sorry this is not the right post for you. I am just explaining how I got my 2012 R2  activated by Key Management Service (KMS)

Who ever using KMS keys need to add the new ones from  Microsoft  Volume license Service Center


Are you updated with hotfix for your existing KMS server ?

If not you can request for the hotfix(KB2691586) to download from here

Its applicable for

  • Windows Server 2008 R2
  • Windows Server 2008
  • Windows 8
  • Windows Server 2012
  • Windows 7
  • Windows Vista

Get the email and download it then install.

You definitely need a down time window for this.

Run this command as Administrator :

cscript %windir%\system32\slmgr.vbs /ipk

Note :- Each KMS host key is associated with a windows editions so client keys can not be used to Servers.

You will get the below error if  you are trying to add a key which is not matching with editions.

Error message: 0xc004f015: The Software Licensing Service reported that the license is not installed.SL_E_PRODUCT_SKU_NOT_INSTALLEDFor example, you receive this error message if you try to install a KMS host key for Windows 7 on a computer that is running Windows Server 2008 R2.For more information about KMS host keys and about associated groups of Windows editions, see Table 5 in the “Determine Product Key Needs” section of the Volume Activation Planning Guide ( . To activate the new KMS host key on the host computer, run the following command: cscript %windir%\system32\slmgr.vbs /ato

Try this command :  cscript %windir%\system32\slmgr.vbs /dli  to show your registered details and which server etc..

Thursday, October 17, 2013

Is your laptop shutting down for no reason ?


Last week was terrific to me because my laptop started to shutting down with out any reason my few files got corrupted. If I am turning on my laptop again it was showing nothing, lights not coming up so totally frustrated, yeah I kept many important project related files in it. 

After an hour my laptop started working simply by pressing power button. somehow I started Google  regarding this issue which is currently stopping my all beautiful works.  I got to know is possible due to cpu overheating.

Now , I started to look for few tools which can help me to monitor cpu temperature. found few tools but I chosen

1. All CPU Meter    from 


All CPU Meter
is the most popular and sought-after gadget on our website and also in the Microsoft desktop gadgets gallery. This gadget shows your processor usage (up to 2 processors, 16 cores, and 32 threads), RAM usage, CPU frequency, and processor name (Intel or AMD). It also includes sound alerts as well as fly out features that display additional information about your processor, operating system, baseboard, bios, and computer system.


2. Core Temp  from


Core Temp is a compact, no fuss, small footprint, yet powerful program to monitor processor temperature and other vital information.

What makes Core Temp unique is the way it works. It is capable of displaying a temperature of each individual core of every processor in your system!
You can see temperature fluctuations in real time with varying workloads. Core Temp is also motherboard agnostic.

Core Temp is easy to use, while also enabling a high level of customization and expandability.
Core Temp provides a platform for plug-ins, which allows developers to add new features and extend its functionality.

3.SpeedFan  from


Speed Fan lets you take a deeper view at the status of your computer. Almost every computer includes support for hardware monitoring. Accessing digital temperature sensors is really useful. If you are trying to figure out why your PC hangs when under heavy load or after some hours of usage, Speed Fan might help you find the real cause. Very often it is a poor power supply, or an improperly installed heat sink that lead to behaviors that we tend to associate (incorrectly) with errors from the operating system. Speed Fan automatically searches your computer for informative chips: the hardware monitor chips. Speed Fan can display voltages,fan speeds and temperatures. On rare occasions, the BIOS doesn't activate such features. Speed Fan tries to enable them as long as this is a safe thing to do. Not only the motherboard is searched, but also some video cards and almost every currently sold hard disk. Speed Fan can access status info from EIDE, SATA and even SCSI drives, consistently showing internal data that can be used to diagnose current and future hard disk failures. This is known as S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology). At the lowest level, the Speed Fan hardware monitor software can access digital temperature sensors, but its main feature is its ability to control fan speeds according to the temperatures inside your PC, thus reducing noise.


Speed Fan allows to change your CPU Clock settings as you wish ( becareful It will hurt your machine by choosing  wrong setting )

Conclusion  :

I have changed Thermal paste after completely clean my CPU & heat sink ,bought cooler pad too, now my CPU’s temp is 40 C to 65 C.


Hope it helps…,