Thursday, December 19, 2013

Fix – Unable to RDP Windows 8 or 8.1


RDP keeps dropping the connection ?

Its been 2 months I was not able to take RDP with my windows 8 / 8.1  machine so I just started digging Microsoft site.I was able to see this issue is there in windows 8 and 8.1 but not able to find the fix.

How can I leave without sharing this information to my friends so here is fix…,

finally I got the fix from below link

Just download by giving your email to Microsoft then install & restart . now it should work.

Source links:

Saturday, December 14, 2013

Stop Ads while using Facebook


I know you are really tired of annoying Advertisement while using facebook that's why you are here,

How to stop this thing?

If you are using chrome browser then here is the tweak,


Facebook AdBlock 

Just click the above link in chrome browser, add the extension to your chrome browser and Enjoy.

This Facebook AdBlock will remove the ads from your Facebook page, to leave you with clean Facebook pages.

- Install the Facebook AdBlock extension
- Go to & refresh the page
- That's it! No more annoying ads.

What's inside?
✔ Works on the new Facebook news feed layout
✔ Removes any type of ad on the side bars and public pages
✔ Blocks sponsored ads
✔ Keeps you free from annoying ads!

Don't forget to RATE  – ★★★★★ (Just help the Developer)

Free script to stop copying your content


Do you feel your contents copied somewhere on the other website or blogs ?

Do you want to stop that by disabling selecting text ?

yes its possible in few steps.


Step 1.

Login to your Blogger account then go to layout

Step 2.

Add a Java Script / HTML Gadget

attach the below color code and save it then check your blog

<script type="text/javascript">

//form tags to omit in NS6+:
var omitformtags=["input", "textarea", "select"]


function disableselect(e){
if (omitformtags.indexOf(
return false

function reEnable(){
return true

if (typeof document.onselectstart!="undefined")
document.onselectstart=new Function ("return false")


Friday, December 13, 2013

Boot to Start menu or login to Start menu in Windows 8.1


Are you upgraded to Windows 8.1 and still looking for the way to boot to start menu ?

you are in right place then , yeah Microsoft does not made this option by default but they left you with option to change.

How to change?

Step 1

Right click on your task bar and goto properties


Step 2

Goto navigation tab and click the below selected option and say apply & Ok



You are really done.



Thursday, December 12, 2013

Free Junk removal tool


Many times people are not keeping eye on the wizards while installing the freeware, so after installation

they will be having bunch of extra junk applications installed in their PC / Laptop.

The problem is those apps are not simply sitting in background rather it started to giving trouble to PCs.

slow down your machines,

unwanted advertisements,

hidden hijacks of your personal data,

PC crashes,


these are the very known symptoms of the affected PCs.


Yeah don't worry we got a single tool which will remove almost 90% of junk applications simply and freely.

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.


Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Blekko
  • Claro / iSearch
  • Conduit
  • Crossrider
  • DealPly
  • Delta
  • Facemoods / Funmoods
  • Findgala
  • Globasearch
  • Hao123
  • iLivid
  • Iminent
  • IncrediBar
  • MocaFlix
  • MyPC Backup
  • MyWebSearch
  • PerformerSoft
  • Privitize
  • Qvo6
  • Searchqu
  • Snap Do
  • Swag Bucks
  • Wajam
  • Web Assistant
  • WhiteSmoke
  • Zugo

and many more…

When run, Junkware Removal Tool will remove all traces of these programs including their files, folders, registry keys, and values.                    



Tuesday, December 10, 2013

Hibernate in Windows 8.1


I was looking for the option to enable hibernate in Windows 8.1 after installed finally found but wanted to share the same with you people.


1. goto RUN and type “powercfg.cpl” hit enter



2. Choose what the power button does



3. Change setting that are currently unavailable



4. Enable hibernate and don't forget to Save Changes.



5. Go to start button and see you have Hibernate option.

Sunday, December 8, 2013

Windows 8.1 to Bootable USB ?


I knew few USB bootable tools which were helping me when I needed to make the windows 7 to bootable USB but somehow those really did not help me when I tried to convert windows 8.1 to bootable USB  (WinToFlash , WintoBootic and Windows 8 USB Bootable Maker)

Finally I was able to convert Win8.1 to bootable USB successful with out any struggle by using ZOTAC WinUSB Maker

it made me to write this post.



Here is some features of this application:

- Fastest file copy from directory or file using a dedicated memory stream allocation.
- Solid UI Design made to have the best performance inside all computers.
- Drag and Drop based for all the functions that need of user data.
- 100% written in .NET to avoid false positives problems.
- Compatible with all DPI scales (100% +).
- Taskbar progress for Windows 7 and higher.
- Smooth GUI with nice animations.

The software compatibility:

- Windows XP or higher with .NET Framework 4.0 installed.
- Capable to transfer Windows Vista or higher to any removable device.

The hardware compatibility:

- Any removable device inside the system.
- The best compatibility with USB 3.0 and memory cards.
- Cell phones, tablets, MP3 players that have massive storage support.
- External HDDs and removable devices recognized as fixed media also is supported.

The boot features:

- Full UEFI support with multi boot code. *
- Dynamic device format for any type of device.
- The boot code is made inside the partition, the last will remain untouched.

* Only FULL UEFI compatible operating systems will be supported (Windows 8 / 8.1 x64 until now).

Saturday, December 7, 2013

Intel VT-x / Intel VT-i / Intel VT-d / Intel VT-c


Intel VT-x (previously known as Intel VT) is the implementation of an Intel Secure Virtual Machine for the x86 IA-32 and Intel 64 architectures. The older designation, “Intel VT” (without the “x”), continues to be used by many BIOS menus.

VT-x is necessary for Intel systems in order to:

  • run domUs under Xen Hardware Virtual Machine (HVM) (as well as run a guest system under Windows).
  • run 64-bit guest systems under VMware.[1]
  • to run virtualization with KVM.[2]

Information regarding the activation of Intel VT-x at the BIOS level (if supported by the Intel processor) can be found in the article, Activating the Intel VT Virtualization Feature.

As of the Nehalem architecture (Intel Xeon 55xx CPUs), VT-x includes the Intel Extended Page Tables (EPT).[3][4]

Intel VT-i (Intel Virtualization Technology for Itanium Processors)

Intel VT-i is the implementation of an Intel Secure Virtual Machine for the IA-64 architecture (Itanium).

Intel VT-d (Intel Virtualization Technology for Directed I/O)

Intel VT-d makes direct access to a PCI device possible for guest systems with the help of the Input/Output Memory Management Unit (IOMMU) provided. This allows a LAN card to be dedicated to a guest system, which makes attainment of increased network performance beyond that of an emulated LAN card possible. Of course, once such a direct access system has been implemented, live migration of the guest system is no longer possible. VMware can be configured for use with an activated Intel VT-d system using VMware VMDirectPath for direct access to PCI cards.

Pre-requisites for Intel VT-d

  • The chip set as well as the BIOS used must support Intel VT-d.
    • Requires the Intel Nehalem or later micro-architecture, such as that found in Xeon 34xx, 55xx and more recent, as well as other, desktop CPUs (see A List of Intel CPUs).
    • There are no special requirements placed on the CPUs themselves, since VT-d is a function of the chip set. The CPU need merely support VT in general (see [5]).

Information regarding the activation of Intel VT-d at the BIOS level (if supported by the Intel processor) can be found in the article, Activating the Intel VT-d Virtualization Feature.

For additional information regarding VT-d, see:

Intel VT-c (Intel Virtualization Technology for Connectivity)

Intel VT-c is a collection of input/output (I/O) virtualization technologies. These technologies include:[6]

The article, Activating the SR-IOV Virtualization Feature contains additional information about activating SR-IOV.

For additional information regarding VT-c, see:

The following, as well as other, platforms support VT-c:

  • Intel 75xx systems (Intel 7500 Chipset Boxboro-EX)[7]

Configuring VMDirect Path I/O pass-through devices on an ESXi host


You can connect up to two passthrough (ESX 4.0) and up to four passthrough (ESX 4.1) devices to a virtual machine. When selecting the devices, keep in mind these restrictions:

Configuring pass-through devices

To configure pass-through devices on an ESX host:

  1. Select an ESX host from the Inventory of VMware vSphere Client.
    Note: If you have a chipset with VT-d, when you click Advanced Settings in vSphere Client, you can select the devices that are dedicated to the VMDirectPath I/O.
  2. In the Configuration tab, click Advanced Settings. The Pass-through Configuration page lists all available pass-through devices.
    Note: A green icon indicates that a device is enabled and active. An orange icon indicates that the state of the device has changed and the host must be rebooted before the device can be used.
  3. Click Edit.
  4. Select the devices and click OK.
  5. When the devices are selected, they are marked with an orange icon. Reboot for the change to take effect. After rebooting, the devices are marked with a green icon and are enabled.
    Note: The configuration changes are saved in the /etc/vmware/esx.conf file. The parent PCI bridge, and if two devices are under the same PCI bridge, only one entry is recorded.
    The PCI slot number where the device was connected is 00:0b:0. It is recorded as:
    /device/000:11.0/owner = "passthru"
    Note: 11 is the decimal equivalent of the hexadecimal 0b.

To configure a PCI device on a virtual machine:

  1. From the Inventory in vSphere Client, right-click the virtual machine and choose Edit Settings.
  2. Click the Hardware tab.
  3. Click Add.
  4. Choose the PCI Device.
  5. Click Next.
    Note: When the device is assigned, the virtual machine must have a memory reservation for the full configured memory size.

Thursday, December 5, 2013

How to change Favicon or Blogger Icon ?


What is Favicon ?   

While you are opening a Blogger  or any Blogspots you can find the Big “B” imageicon will be sitting in your title bar its is called Favicon.

Why you want to change this ?

some people want to make their BlogSpot to looks like website, in this scenario you need to change this first.

Okay let me jump to start the procedure,

Step 1 . You need to create a alternative icon to replace by using free online tool.

               FaviconGenerator (right click image and choose “Save image as”)

     upload your image (make sure you are uploading 256 X 256 resolution file so             that  you will  be getting good resolution icon.)

Step 2 .  Upload your favicon to the web

             Login in to Blogger account and choose your blog, go to layout you can see like below screenshot


            Edit Favicon and upload your new icon and don’t forget to save the settings.

You are all done.

Now check your blog you can see new icon sitting in your title bar.

Don’t wonder if its not reflecting suddenly just clear your Browser cookies and reopen your Browser

now you will be seeing the new icon.



Tuesday, December 3, 2013

What are the risks in Pirated Windows ?


The risks and costs of obtaining and using pirated, or counterfeit, software are real, to individual customers and to organizations. Too frequently , counterfeit software is bundled with malicious and unwanted software that can lead to corrupted systems, lost data, and even identity theft. For example , an IDC report that was sponsored by Microsoft® in 2006 found that 25% of websites offering counterfeit software also attempted to install spyware, Trojans, and other malware that can compromise computer systems and environments.1

In organizations, counterfeit software can increase IT costs substantially. A Yankee Group study (sponsored by Microsoft) revealed that “when problems arise with counterfeit software, IT administrators typically require 20% to 30% more time and labor to identify and resolve the problems—at a monetary premium to the business.”2 And a 2008Harrison Group study (sponsored by Microsoft) concluded that “companies less committed to using genuine software are significantly more likely to have system failures that lead to lost critical data and employee downtime.”3

These security issues are compounded by the fact that only customers with genuine Microsoft software have access to updates and support from Microsoft and its partners.

Additionally, lost and compromised product keys, as well as non-compliant licensing, can result in increased costs from system reactivation, employee work interruptions, damaged reputations, or even costly financial penalties.

Top of Page

Microsoft Genuine Software Initiative

In an effort to ensure that customers avoid the risks of using counterfeit and noncompliant software and experience all of the benefits of using genuine software , Microsoft launched the Microsoft Genuine Software Initiative (GSI). The GSI divides its increasing investments across three strategic areas: education , engineering, and enforcement.

Three Pillars of Microsoft GSI

Source : Microsoft

Please use Genuine Copy of Windows.

Monday, December 2, 2013

Free webhosting providers


I am new to webhosting wanted to learn depth in by using php based tools and etc. so I have decided

to buy a domain name but was looking for free webhosting finally I found top rated providers with and

without Ads even 99.9% uptime guarantied, would like to share with you people.


  1. (PHP, MySQL, WordPress, Joomla, Free domain, No ads)
  2. Free Hosting EU (Blog / Site builder, No ads, Free domain)
  3. (Easy Website builder: html5, Flash, mobile, blogs, etc.)
  4. (PHP, MySQL, Email Sending, No Ads, Free subdomain)
  5. (Website & Blog builder, Photo album, Free domain)
  6. (PHP, MySQL, 1-click Scripts, No Ads, Free subdomain)
  7. (PHP, MySQL, PHPbb, SMF, Wiki, Free subdomain)
  8. (Support cPanel, PHP, FTP, No ads, Free subdomain)
  9. (Visual website builder, add videos, photos, shopping cart)
  10. (Easy site builder, blog, forms, polls, Free subdomain)

Sunday, December 1, 2013

Map Your Domain Name to Blogger


I have created this post just because want to help and speed up their work the way to fix…,

You can establish a more professional identity for your Blogger® blog by configuring it to point to one of the domain names you registered with any registrar. in my case I am using Godaddy as I recently came across this situation, Instead of entering your Blogger URL to view your latest blog post, visitors enter your domain name's URL. For example, by mapping your blog to your domain name, visitors focus solely on your domain name.

To point your Blogger blog to your domain name, you set up domain name mapping, which configures your blog settings and domain name. You update your settings in your Blogger account and Domain Manager:

Edit the www CNAME record for the domain name you want to use with your Blogger account. This update tells the Web browser to open your Blogger blog when visitors enter your domain name's URL in the browser address bar.

You can automatically configure your DNS with this tool.
Forward your domain name to use www. This step ensures your Blogger blog displays for visitors who go to your domain name with or without the www prefix. For example, it displays for visitors who entered both and
Configure your Blogger account to use your domain name.

To Edit Your CNAME Record

Log in to your Account Manager.
Next to Domains, click Launch.
From the DNS menu, select DNS Manager. The DNS Dashboard displays.
For the domain name you want to use with your Blogger account, click Edit Zone. The Zone File Editor displays.
In the CNAME (Alias) section, click the www record.
In the Points To field, type
Click Save Zone File, and then click OK.

To Configure Your Blogger Account

Log in to your Blogger account.
From the Settings tab, select Basic.
From Publishing, click Add custom domain.
Click Switch to Advanced Settings, and then enter your domain name. For example, enter
To specify another location in which to look for files, in the Use a missing files host? section, select Yes and enter the path. If not, select No.
Click Save.

Any DNS changes you make can take up to 48 hours to reflect on the Internet.