Siva Kumar Eanuga

Just Started Blogging new tech things in this place will be posting more topic soon.

Siva Kumar Eanuga

Just Started Blogging new tech things in this place will be posting more topic soon.

Siva Kumar Eanuga

Just Started Blogging new tech things in this place will be posting more topic soon.

Siva Kumar Eanuga

Just Started Blogging new tech things in this place will be posting more topic soon.

Siva Kumar Eanuga

Just Started Blogging new tech things in this place will be posting more topic soon.

Tuesday, November 22, 2011

File Encryption and Decryption

File Encrypt
Now you can do the file encryption and decryption very easily, to protect your data from unauthorized views.
  • Two steps to encrypt your files with a personal password
  • Decrypt the encrypted files easily
  • Any file types are supported
File Encryption is used to make files unreadable until the specific decryption method has been employed. 
The most common method of file encryption is to protect your private files, documents and information. 
When your file is encrypted, then the file would be definitely unreadable. By the way, the encrypted files can also be brought back to a readable state by decrypting.
File Encrypter in Acebyte Utilities is a simple and reliable tool to encrypt your files with adding your personal password. 
You can also decrypt your encrypted files by entering your password quickly.

How to Delete Undeletable Files

We all face this problem in windows that we cant delete some files in windows and they never get deleted. 
This is because of the files getting connect to the other windows explorer and they waste system resources. 
To this these types of undeletable files i have a trick. Lets see

1) Open Windows + R to open Run and type cmd to open the Command Prompt.
2) Now Windows + R to open Run and type taskmgr.exe or right click on taskbar to open taskmanager.
3) In the Task Manager window click on the Processes tab.
4) From the processes list highlight explorer.exe and then click the End Process button.
5) Don't close the Task Manager window, keep it open along with the Command Prompt.
6) Now return to Command Prompt and change the directory to the directory that contains the file which you want to delete.
7) In Command Prompt type: del (filename) (where the (filename) is the name of the file you want to delete).
  Press Enter to Delete the file. Thats all.

If you don't want all these steps to be done just install a application called UNLOCKER.EXE and delete the file by right clicking on it and selecting unlocker and then select delete.

How to create a batch file to open multiple programs at once?


Have you ever tried to open multiple programs at a same time?  We can create a batch file so that we can open three applications at a same time consistently. 
Generally we open three applications individually and its a  time consuming process as we have to search the windows shortcuts on desktop and then open the 
application say if you want to open Internet Explorer, Calculator, Ms-word three at a same time how? I have a trick to do that. here it is…….

First i am creating a batch file which will open Excel, Calculator and Firefox. I am using windows vista. XP will have some different paths say ms-excel.

start /d C:\Windows\System32\calc.exe
start /d "C:\Program Files\Mozilla Firefox" firefox.exe
start /d "C:\Program Files\Microsoft Office\Office12″ EXCEL.EXE

Now, The above command start opens a separate window to open the program. and /d tells start command the path of the program. notice that firefox and excel are in inverted quotes which is needed when there is a space in the path.

Now, lets try to open www.satish-tips.blogspot.com , and calculator and excel at a time. It should be like this when we put in notepad.

start /d C:\Windows\System32\calc.exe
start /d "C:\Program Files\Mozilla Firefox" firefox.exe
start /d "C:\Program Files\Microsoft Office\Office12″ EXCEL.EXE

Just add the site which you want to open under the firefox command what ever it may be it sholud contain http://www.——/com. Similarly if you want to open two websites at a time then the command should be like this

start /d "C:\Program Files\Mozilla Firefox" firefox.exe

Now, let us create a batch file so that we open a application program which opens more than three programs at a time.

1) Just open Notepad
2) copy the above commands in the notepad and make changes according to your needs and they should contain all the quotes and spaces as we have done it above.
3) Save the notepad file as .bat extension but not as .txt. to do this just type save as and give a file name say application.bat and save it.

Finally open the .bat file where u have saved it. This will really save lot of time. 

Without any software you can lock your Folder With Password


Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

How to Use Notepad as a log file with time and date


Microsoft Notepad is a word processing tool included with Windows and is installed by default under the Accessories program group. 
You can use it to create a log-type file that adds the current date and time each time the Notepad file is opened. 
This article describes how to create a log file with Notepad.
To create a log file in Notepad:
1.Click Start, point to Programs, point to Accessories, and then click Notepad.
2.Type .LOG on the first line, and then press ENTER to move to the next line.
3.On the File menu, click Save As, type a descriptive name for your file in the File name box, and then click OK. 

When you next open the file, note that the date and time have been appended to the end of the log, immediately preceding the place where new text can be added. 
You can use this functionality to automatically add the current date and time to each log entry.

Thursday, November 17, 2011

Convert your text files to MP3 audio with Zamzar


This time zamzar has come up with a new feature of converting text files to audio files.Students now you can uplaod your notes and convert them to audio files and then download it and listen when you are in need either it might be while travaling in buses or at free time.
The full list of supported files which you can convert into mp3 is listed below:
* doc - Microsoft Word Document
* docx - Microsoft Word 2007 Document
* odt - OpenDocument Text Document
* pdf - Portable Document Format
* pub - Microsoft Publisher
* txt - Plain Text document
* wpd - Wordperfect Document
* wps - Microsoft Works Document

Announcing this feature, Zamzar bog mentions

We think this feature will be particularly useful for our visually impaired users, many of whom receive documents from friends and colleagues in formats that are difficult for screen readers to access. We also hope this will come in handy for anyone who wants to listen to documents, emails or pdf files on the go - All files are converted into the mp3 format, making them ideal for listening on portable music players such as the iPod.
In order to get started with conversion of text to audio, you need to follow the steps below
1.) Point your browser to Zamzar.
2.) Next follow the guided screen to select your files to convert, choose the format for the       converted file. Here you need to select mp3.
3.) Enter your email address and press Convert.
Zamzar doesnt require any download or installation.


Thanks to http://www.techfancy.co.cc/ for the valuable information

Now you Can Download YouTube HD Videos to your Computer

I believe that most of the people tried downloading YouTube videos and finally your computer will be effected by virus or browser settings might have changed  or something you expected is not downloaded etc... now you can download YouTube videos very easily by downloading this small utility program. and also you guys know that YouTube now supports HD 720p and full-HD 1080p. We can enjoy a great viewing experience with YouTube as videos look bigger and better. Well, if you are interested in downloading such videos then you do so using a freeware known as YouTube HD Transfer.

YouTube HD Transfer is software that allows you to download YouTube videos on your computer with ease. You can not only download YouTube videos in HD but also in other qualities and formats. Downloading videos with this software is pretty easy. All you need to do is simply paste the YouTube video URL from your browser into YouTube HD Transfer and select the video quality you want to download and click on the Download button. The software also includes a search function that helps you to search any video you would like to download. In addition to this you can also preview the video before actually downloading the video.

Download YouTube HD Transfer

Now you can Recover Lost Data Easily???

It is a fact that most of the times people loss their important data stored in their electronic devices like computers, laptops etc. The reason behind the data loss covers many facts and events. These facts include human errors, device malfunction and virus attacks. These facts or events are actually the most common issues find in different electronic devices. Human errors are referred to mistakes made by you or any other device user. You can understand human errors by considering the following example. 

If you are using an electronic device like computer or Mac system and during the usage you accidentally delete the files form the hard drive. This accidentally mistake is actually made by you and thus referred to as human errors. This type of mistake is not only made by you. It can be happened by any one at any time. During the usage of electronic device like Mac system you sometimes are not attentive to your usage. This carelessness leads to the data lost issue. Remember that you should not become careless when you are using your Mac device or any other electronic device. People related to business usually save their files in their computers and Mac systems. If they do such type of mistake then their can be a great loss for these businessmen. To avoid such losses attentiveness and care is necessary but there are certain ways to recover the data as well. Yes, you can still recover your data in a convenient and reliable way. To know how to recover deleted files follow the key steps mentioned below.


First of all you should make sure that you do not install any further third party utility in your Mac device. This is because once you lost your data the data is still in the form of physical data which can be recovered. But if you install third party utilities after losing data then the already physical data will be overwritten with the new added files. This is the point where data becomesunrecoverable. The lost data can be recovered if you are sure that you have not installed any third party utility. Recovery is possible with the help of a useful tool called recovery software. Many people think of how to recover deleted files with the help of a software program? If you observe the detail of this software program then you would come to know that it is specially designed to recover the deleted files. The software is known as lost data recovery software

There is a large number of data recovery software available in the market. All these software programs are different in terms of their features and characteristics. This is because there is a huge quantity of electronic devices present in the market. All these electronic devices contain a mega collection of various models and designs. So it is not possible to recover your lost files from only one recovery software. You should know which recovery software is designed for the model of your electronic device. For example if you are using Mac system then you should choose recovery software which match the model number. 

There are many other facts and events which cause data loss. Actually your saved data is stored inside the hard drive of your electronic device. This hard drive is prone to different types of damages. Device malfunction is another big reason and a common one which cause data loss. It can occur due to high temperature of the hard drive and power failure. You should not get worried under such circumstances because there are a large number of recovery software programs which can solve these problems. One of the best considered recovery software program consist of many valuable features. These features are capable of recovering data from your system’s hard drive very easily. 

There is another common issue which is seen mostly in hard drive failures. It is the virus attack or malware which makes you unable to access your important data. This problem arises when the device is subject to third party utilities installation and un-installation. When you uninstall or install any utility from a third party source then you actually give way for the virus to attack on your hard drive of system. 


This article is written by Ella Green, who also writes for mac-how.net, a site featuring various tutorials and lessons on how to recover deleted files mac.

Google Wave - A forward step in Email Communication

Google is planning to release Wave later this year. It seems Wave will replace the current Email system. And, it looks like it will compete with Twitter also.
Google Wave=Email/Outlook on Browser + SharePoint + Twitter+Real time chat


Google has given Developer preview demo recently.. You can see it below

Friday, October 14, 2011

New feature of Google Search !!!! now you can Block the results from selected websites!!!

It comes as a feature after your first search query... Say you would want to block http://www.w3.org search results from the query "Owl", you will have to do a first search on OWL... Go to each of the results, on a click back to Google search home page from each result, a new feature "Block all w3.org results" appears next to cached and similar links.. On clicking "Block all w3.org results" link, the future results shall not be from "w3.org". The link appears even though the user has not signed in, but blocking requires the user to sign into the Google account. Although the feature could help in blocking results which are offensive or are of low quality or pornographic stuff, it requires efforts from the user in traversing to the search result page of the site you would want to block... Isn't this a burden on the user? Would it not be better to have a settings feature where the user can first block/unblock domains he would not want in search results? Or on the first shot, on a search, the search results can directly have a link to block the corresponding domains from future search...

This feature being previously available as Chrome extension is now rolled out for both IE and Firefox users.. Developed by search quality engineers, "Amay Champaneria and Beverly Yang",
the new feature might add value to increased personalisation for the users with extra burden of traversing each link which the user would want to block..



Get More info from Official Google Blog

Thursday, October 6, 2011

Cool Tricks for Computer Users

1. Running Multiple Instance of GTalk.

Right click on the Google Talk shortcut.       
  1. On the right click contextual menu, click on Properties.
  2. Go to Shortcut tab on Google Talk Properties window.
  3. On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original) Target: "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex
  4. Click on OK.
2. Run Firefox inside Firefox
  • copy paste following url in a web browser (mozilla firefox). chrome://browser/content/browser.xul
3. Folder Lock Using Dos Commands.
  • Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').Any name will do. Then you see a batch file. Double click on this batch file to create a folder locker. New folder named 'Locker' would be formed at the same location. Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. If you want to unlock your files,double click the batch file again and you would be prompted for password. Enter the password and enjoy access to the folder.
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

4. PDF File Speak
  • This is not a trick . This is the functionality of Adobe Reader 7.0 through the latest 9.3.
  • go to View>Read out Loud> Activate Read Out Loud.
5. Calculation on  Command Prompt.
  • The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:                                                                  
    C:\>set /a 2+2                                                                                                                                   
    4                                                                                                                                                       
    C:\>set /a 2*(9/2)                                                                                                                                 
    8                                                                                                                                                         
    C:\>set /a (2*9)/2                                                                                                                                    
    9                                                                                                                                                   C
    :\>set /a "31>>2"                                                                                                                                 
    7                                                                                                                                                    
    Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.
    For more information, type set /? at the command prompt.
6. Create Nameless File and Folders.

  • This trick will allow you to create files and folders without any name.Just follow the steps as given below :-
  1. Select any file or folder.
  2. Right click on it, select 'Rename' or simply press 'F2'.
  3. Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.                                                                                                                                      Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.Don't type the numbers which are present on top of the character keys.
  4. Press Enter and the nameless file or folder will be created.
  • Reason :- The file or folder that seems nameless is actually named with a single space.

  • But what if you want to create another nameless file or folder in the same directory ?For this you will have to rename the file with 2 spaces.Just follow the steps given below 
  1. Select file, Press 'F2'.
  2. Hold 'Alt' key and type '0160' from the numpad.
  3. Release the 'Alt' key. Now without doing anything else, again hold 'Alt' key and type '0160'.
  4. Press 'Enter' and you will have second nameless file in the same directory.
  5. Repeat step 3 to create as many nameless files or folders in the same directory.

What Is SCRUM?

In the game of rugby, after an infringement or out-of-play ball, both teams engage in a formation called Scrum (short for scrummage) in order to compete for possession. The nature of the play is quite dangerous and has resulted in injuries and a couple of deaths.
The type of scrum focused on in this article is, fortunately, not life threatening.
In American football, the coach calls each play prior to its implementation by the players - a play that has been practiced and drilled before the game so that each player knows exactly where to go and what his role is. After that play is over, the coach will call another. This process works by using a "defined steps" approach.
In rugby, however, plays don't usually work out as planned and become chaotic and frenzied. Predefined steps in the play will be abandoned, because they do not work in the random nature of the sport. Instead, the rugby coach must teach his players how to be spontaneous, self-organizing, and able to act on the fly. The coach will teach basic rugby patterns that the team will adjust as needed when in action, while making periodic assessments of the patterns and changing them based on success or failure.
The scrum approach to IT project management works in a similar manner to the way a rugby coach organizes his plays. The customer, or product owner, provides a set of objectives he or she desires to reach. The project manager, or ScrumMaster, will create a self-organizing team, but give them no specific steps for achieving the objective(s)2. This allows the team to decide what to do and how to do it as they encounter surprises, problems, or difficulties. At the end of each iteration, or Sprint, of the project, the team presents its work, allowing the product owner to assess what's been done and make changes to the requirements, priorities, and release plans. At the same time, the scrummaster coaches the team as they adapt their project plans and processes.
Roles
Just as a rugby team has various players in different positions (like Fly-Half, Number 8, and Prop), so too does the scrum process team3. According to the Scrum Alliance, there are three:


The Team

  • ·         Is cross-functional, with seven (plus or minus two) members
  • ·         Selects the sprint goal and specifies work results
  • ·         Has the right to do everything within the boundaries of the project guidelines to reach the sprint goal
  • ·         Organizes itself and its work
  • ·         Demos work results to the product owner


The Product Owner

  • ·         Defines the features of the product
  • ·         Decides on release date and content
  • ·         Is responsible for the profitability of the product (ROI)
  • ·         Prioritizes features according to market value
  • ·         Adjusts features and priority every 30 days, or as needed
  • ·         Accepts or rejects work results


The ScrumMaster

  • ·         Ensures that the team is fully functional and productive
  • ·         Enables close cooperation across all roles and functions
  • ·         Removes barriers
  • ·         Shields the team from external interferences
  • ·         Ensures that the process is followed, including issuing invitations to Daily Scrum, Sprint Review, and Sprint Planning meetings
Process Overview
The scrum process has several steps:
1.       The product owner creates of list of requirements, called the Product Backlog, listed in order of business value.
2.       During a sprint planning meeting, the product owner and team choose the top items from product backlog that can be completed during a 2 - 4 week "Sprint" session.
3.       The scrummaster helps the team break down the tasks necessary to complete the items chosen for the sprint.
4.       During each day of the sprint, a 15-minute meeting is held to discuss the status of the project - this is the Daily Scrum Meeting
5.       When the sprint is finished, a Sprint Review Meeting is held so the team can present its work to the product owner, who assesses whether the items are complete or not, and guides the team as they select the items for their next sprint.
6.       After the team and scrummaster discuss the failures and successes of the sprint, the process begins all over again.


Key terms



Scrum - Scrum is an agile project management process that allows you to deliver usable results during your project 
lifecycle, absorbing changes as you go along.


Product Owner - Establishes and prioritizes the product backlog, or requirements, based on the interest of all stakeholders and the goals of the project.

Team - Small team possessing cross-functioning skills that manages and develops the product or project

ScrumMaster - Helps guide the team through the scrum process, but because the team is supposed to self-organize, he or she may not necessarily be perceived as the "leader."

Product Backlog - Documented, prioritized requirements for the project.

Sprint - 2 - 4 week period where the team works to finish predetermined deliverables from the product backlog.

Daily Scrum- In a meeting limited to no more than 15 minutes, each team member must address three items aloud to the rest of the group: what they have done since yesterday; what they plan to do by tomorrow; and what impediments to progress they are experiencing.

Sprint Review Meeting - Held at the end of the sprint, this meeting usually does not exceed a four-hour time limit. The team presents the part of the project they completed during the sprint to the product owner and any related stakeholders and establishes which items from the product backlog they wish to work on next. The team also meets on their own to reflect upon the performance and performance of the last sprint.
Why It's Useful
Scrum is quickly growing to be one of the most popular project management techniques for both large and small companies - and for good reason! The scrum process allows for continual project change and adaptation, innovation, and self-organization as the team assesses what is working and what's not, during the sprint. Not only does this flexibility boost team moral and productivity, it also improves product quality and increases the chances the company will reach (or exceed) its goals by eliminating and prioritizing project issues. Scrum also prevents unnecessary product requirements from being developed because the most valuable items are delivered first.


Reference:  http://www.projecttimes.com/articles/rugby-vs-development-what-is-scrum.html