Author Archives: Bubu

1 66 67 68 69 70 71

About Bubu

WordPress Expert and Support Specialist | 6+ Years of Experience

Change the default wallpaper folder in xp

Last updated on July 26th, 2019 at 10:22 am

Windows XP from Microsoft is one of the best operating system released so far and with it brilliant and vibrant visualisation and nice user interface it increases use o this wonderful operating system to many folds. Windows XP had good default wallpapers but there is no easy way to add wallpapers to its default folder. You have to do it manually in order to show wallpapers. In this article we will learn in depth about, how we can change default wallpaper folder in it and how to add ours own set up wallpapers to it.

In the display properties and then desktop tab and in the background sub tab, you will find the lists of wall papers beginning with none and then ascent, autumn, azul, bliss and so on and then you can position these wallpapers and then colors but you can only add wallpapers by browse button at the right side of it but by default there will not be other wallpapers inside background selection.

First we need to change the wallpaper default folder. There is no way in normal way you can change it so you should go for editing registry to attend it. Open the run command and write down regedit.exe and then open the registry editor with it. Then search for this route.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

Here you will find ‘WallPaperDir’ from the right hand side of registry editor. It is known as the key in registry editor and it provides information regarding default folder for wall paper to be used with Windows XP. If on some machines ‘WallPaperDir’ is not visible then create it and put the name same on to it. Then double click on the key and then it will show up the edit string and then the value data put the directory of folder you want to show up as default wallpaper folder and then click on ok and save it.  

When you add images to that new default folder you will find a host of new images which you add while changing desktop properties and changing wallpaper for Windows.

Related Posts:

A painful farewell

Last updated on November 7th, 2019 at 02:47 pm

My relationship with Docomo was as old as its introduction. I was an ardent fan of Docomo which is evident from my earlier writing on it a few months back when I praised the generosity of the Tatas in refunding me excess charges they had erroneously debited which normally never happens. But, now, I have relinquished the SIM in favor of Vodafone. It was a painful substitution done after a myriad thoughts.

The last three/ four months were too much for me to forbear. I had never subscribed for jokes, but deductions were made and jokes came, Similarly, sports news, music downloads, etc. came without myself consciously requesting for it. To add to my woes, all my subscriptions were being renewed without myself requesting for the same. I was completely at sea without having any knowledge of quashing the compulsion.

I ran from pillar to post to undo the damage inflicted upon me by Docomo, but their staffs are trained not to listen to us in such a manner that I had to relinquish the SIM altogether, much against my inner urge. It so happened during my last three months of Docomo usage that whatever amount of recharge voucher were put, all were debited as arrears towards some fun, game or astrological news thrust upon me by Docomo.

I was always short of balance for using the phone even after recharging the mobile with more than adequate balance projected for a month. But, it took me four long months to take the painful decision of separation. It shows, how much I like my partner.But, alas, it is a one way traffic. My partner does not like me So, my conjugal life with Docomo ended. But, once a partner, I cannot think ill of my better-half. Let it rest in peace without luring others for the same love-game.

Comodo Dragon Internet Browser

Last updated on November 5th, 2019 at 01:50 pm

I been a fan of some of Comodos offering and influenced and astonished by their freebies which are some of these so to say have been better and the best than the commercial alternatives existed in category says fast and versatile based on infused with Comodo’s unparalleled level of Security! The question arises definitely there are many good and excellent alternative then why one more.

Difficult say, my favourite is been Comodo Dragon have Improved Privacy ,Easy SSL Certificate Identification,Fast Website Access, Greater Stability and Less Memory Bloat,Incognito Mode Stops Cookies and to switch your Browser review may be so but these features are there like these are on Opera or at Safari and so on.

System Requirements:

32-bit Windows 7 / Vista / XP,128 MB RAM,40 MB Hard Disk Space.File Details:Size: 20.9 MB (21,915,239 bytes).It is huge for dial up users so it may be one drawback to popularity , if file size 5 to 12 MB is all right but 20 Mb for dial up users asking a lot.

Why a good internet browser for surfing Internet is most used medium or may be going to be in some years and to use the internet we browser and is choose a good and decent browser which will keep ours privacy good, clean ours internet usage tracks on demands and of course should be of good speed downloads and also should be compatible with all pages which we browse or want to browse and we are now in the era of Web 2 and going to the era of Web 3.

Websites are now loaded with Ajax, HTML 5 and so on , take an example of Blogger,Disqus,Facebook, Orkut,Hootsuit and so on to name a few and we have to operate them as applications and the latest trend is the connectivity with different websites through apis and all these should be handled better with the internet browsers and these are the users hopes and aspirations when using the internet browsers or choosing them so.

Each day, the volume of messages it transmits, the tidal wave of credentials, ID numbers and passwords it requires, the preponderance of data it exhibits, and the endless array of transactions it helps consummate is unsurpassed! In 2009 alone, more than 25 million new strains of malware were created, causing a 400% jump in compromised Web sites worldwide.

So, this gives security is the prime concern for consumer when using the browsers for internet.Comodo dragon ensures greater security. I prefer Opera for this still it does its work best in no means of time. Comodo Dragonns advantage is The Comodo company, is innovative and prolific developers of online security and trust assurance solutions. Also, worlds one of the best firewall is the by product of this.It has good unctional speed, stability and convenience.

Save Puri Sea Beach

Last updated on September 21st, 2019 at 02:01 pm

Puri is situated at the eastern India. It is in the state of Odisha. The distance of Puri from the capital city of Odisha is 60 kilometers. It is connected by rail, bus and air travel. Due to presence of Lord Jagannath Temple and the once beautiful sea-beach since time immemorial people reached here. Throughout the year, we see the presence of large number of floating population.

Most people love to stay nearer to the sea as nearby sea beach area there have been many hotels and most of these are growing and encroaching land and there are perhaps no restrictions on concerned municipal areas as walking in between these roads have become extremely difficult. This article is not about marine drive road but it is on the sea beach as most of these sea sand areas is engulfed by these ever encroaching hotels.

In comparison with marine drive areas of Chennai or popularly known as Marina Beach, entire areas is full of trees and there is hardly any encroachment and this makes walking in these areas extremely easier. The Puri Sea is famous for its tide as the movement of tides reaching nearer to you provides awesome level of screenshot and that enhances imagination of tourists further.

Due to presence of large number of hotels nearer to the sea beach as well as concise the sand areas out there, then there is presence of so many hawkers meandering here and there and that makes walking through these sand even more difficult. If you happens to reach nearer to sea at sun rise of about half past five in the morning in the month of February you will find the rays of sun just spreading in line with the sea and the straight line makes it so smoother and wonderful experience to observe the presence of sea at its full strength and in between within these straight lines from sun to sea which is a purple line there would be birds flying everywhere into these lines as if they try to ride on these steps to reach towards heaven.

You will find at some point birds would stay on the sand which is wet because the tide just returned back and they try to drink water from the filter sand and there the straightest purple line would be seen out there. It seems for some time that you are at the stage of complete natural happenings and the happiness that comes out from within that front is so exotic and wonderful that it cannot be described in detail about it. One can only feel it with ones’ deeper understanding.

After walking out for some distance nearer to sea in its sand structure which of course solid and walking through it becomes the sense of immense satisfaction as there is no chance of getting into traffic as well as there is no chance of obstruction while you walk within these sands. Suddenly, my eyes filled with moist and almost deeply saddened to see the presence of death of Olive Ridley out there and this is mostly due to caught in between nets of fisherman who despite prohibitory orders continue to put their nets on the sea and to my utter surprise while walking for more distance within these roads I happen to see death of almost three more Olive Ridley.

What is utter disdain is that despite prohibitory orders for catching fishes in this part of land still there is brazenly opening out of local fishermen with their boat and then spread their net on the sea water and that makes the Olive Ridley to catch in between those places and that spells their doom at last. Then openly, these fishermen sell the sea fishes to travelers who bought these fish. While walking I have to cross from time to time so many of such nets which obstruct the sea-sands and make walking very difficult there in.

I could feel what should have been the last moments of these Olive Ridley when they are caught in between these sea water and the net as I have to slow down my walking speed and then bow down so that I could pass these nets which are in parts on sea shores. To my utter disdain some tourists are standing nearer to dead Olive Ridley and taking photographs and selfies and in this manner they forget the basic human values dealing with it and this makes me feel the sad that how come while we move towards greatness of technology but still forgetting the basic ingredients of life that should be more visible to us and should not we always be implanted to root rather than flying within these technological excellences par se.

Within these small stretches of sands due to encroachment of hotels, almost quarter of these places are covered by local people out there mostly from fisherman communities who put the chairs on sands and ask money from people who sat there and they ask for ten or twenty rupees to seat on it and what it makes is that it makes the distance to move nearer to the sea-shore shortened and who have given them permission to use these sands for commercial purposes?

Then after walking for some distances you would see on the sand there would be mostly sea-related things out there and waiting for people to purchase and that occupies some portion of the land and that makes walking and moving into these places more difficult than earlier anticipation. If you travel in between these places you would get the impression that you are moving in the land of unknown and where there is no law and order for controlling of these unwarranted and perhaps unregistered so called businessmen who occupies the sea-sands and shores of their wishes and whims and if they could they even go beyond the sea and occupies the water portion of sea too.

Then from place to place you would find presence of so called photographers who used to contact with tourists and ask them to photo shoot on the sea shores and as far as my knowledge goes they have the association and their number are so much that if you cross two meters one person is there and sometimes they compel visitors and then sometimes argue with them for no reason and the walking within these sands in the presence of these so called amateur photographers becomes extremely difficult.

Then from distance to distance on the sea shore there are presence of ostriches and horses and their owners would go to visitors and ask them whether they would seat on it and they charge differently for seating on it and differently on moving to some distance and they would not clean the places out there and the stools of these animals tend to stay within these sands forever. They would not provide passage to you and even they would not clean their stools and who have permitted to use these innocent animals to be utilized for business purposes.

If you look at those person who are with these animals tend to cover up the entire sand space and it is almost difficult to cross over these place as on one side the advent of sea-tide and on the other hand the presence of gathering of large number of people tend to cover entire sea-sands on these places. You would definitely feel the pain out there while walking across sea-sands and while you are moving into these seas on the morning but the amount of commercialization makes the beauty of natural surroundings difficult to grasp and understand. While moving here and there you would find that some persons with plenty of chief necklaces of white in color and urging visitors to buy them and if not sometimes argues with them for no reason and that makes to feel that why such the level of commercialization are allowed here.

Most of these necklaces are duplicated, but it is being told that these are made of pearls extracted out from Puri sea. Just look at the mind set of these sellers who go to such extra yards while dealing with marketing aspects but tend to forget all of these ethics on its way. Many time’s visitors used to buy these with handsome money while completely forgetting that these are duplicated pearls. Some tend to sell some different types of stone consisting of black, maroon and purple and they sold these by tending to say that these they got from the sea.

To add to the wood in between, there is the presence of large wooden boats and some new motor boats out there. That obstructs the entire stretches of land and also there is no regulation here as of now of should be paid in order to move with these motor boats so that these people should not demand so much from visitors.

The Computer Keeps Disconnecting From The Internet

Last updated on April 23rd, 2019 at 11:07 am

This article dates back to the year 2010, when I had a desktop with Windows XP computer. I wrote articles for my blog which has the name ‘freewarespace‘ and hosted by google with Blogspot. During that time the most prized internet is dial up connectivity.

It comes from landline telephone and used to come with slow connectivity. For some time, this was the trend, and that makes the Internet slower. During that time, we were at Baripada district in the state of Odisha, India.

During that time, Balasore was the hub of the Internet connectivity hub and telecom communications. When the weather is good and beautifully the wired telephone from Balasore and Baripada stays in good and qualitative condition. The distance between these two bigger districts of norther Odisha is full of jungles in between.

The land in those areas is full of large-scale jungles and some jungles are ancient. The weather in these areas are cooler and most of the times some mild cyclones or rains comes at front. The wired landlines that comes from district of Balasore towards Baripada comes through Nilgiri hills and Kaptipada jungles.

These places are cooler and full of the large number of trees. Weather are cooler and most of the times unpredicted cyclones comes one after another and that makes the wiring disturbances and that breaks continuous connectivity telecommunications connectivity difficult.

Besides it the sudden power failure and the number of days such as two to three days to come back to power again. Waiting for electricity and then telecommunications for three to four days besides it makes the blog work difficult. During that time, there were no more private networks that could offer decent internet connectivity. Even in such circumstances, the proper management blog and posting at regular intervals becomes difficult.

During those times one standalone computer security which used to act on the process basis provides valuable room to stop internet connecting applications from connecting internet. This is a good idea in the time of slow internet, as only the single software connects internet and this provides valuable speedup of the program and that makes running of software easier.

Host Intrusion Prevention System (HIPS) software are security software which works inside common and manual processing power and secures computer by stopping or filtering processes and that stops software apps from connecting to internet. In this way, even slow internet becomes faster,

Understanding Virtualization Security

Last updated on November 6th, 2019 at 09:56 am

Understanding Security The firstly malware reception application was supported on touch: parts of tag that do as incomparable symbols for item-by-item spiteful syllabus. late technologies (heuristic programs and behavior can together be referred to as non signature sleuthing know-hows. The commercial portion is a aggregation of programmer suffices and rules that qualify aggregation to be analyzed by the division.a separate activity of a system flying inside the methodicalness or a wide place of specified actions.

The deductive portion reflection as a – arrangement. It lies of an formula that s datum and then distributes a finding about the accumulation. An antivirus programmer then re flexion in accordance of rights with this finding in malicious programmers placing a register in isolation, interference unlicensed computer program , etc. When mistreatment the supporter above some tribute plan of action can be viewed as a medal size – thing that collocates cardinal disjoint parts i.e. the bailiwick and logical parts.

Analyzing technologies in this mode creates it hands-down to wager however the portions bear on to one other and their pluses and minuses. In component, mistreatment this hypothesis spend a pennies it easier to get to the merchantman of however convinced technologies bewitch. These position do not deviate one other , and they as well do not full the applied science that they square measure used to line. A vicious programmer is a lodge containing medicament smug. a grouping of accomplish that take take aim inside an system. the kernel sum of opinion inside an in operation system.

Programmer evidence can take position at more than one steady . Antivirus software has, more or to a lesser extent, create mentally along these connectives: workings with filing cabinets, hole in the ground with phenomenons via a record, temporary with a accuse via issues, and practical with the itself. This is ground the above elaborates liberal arts as vessel as know-hows. Information is familial to the judgment- ingredient, extracted from registers and is a heap of computer memory units integrated in a way of life. somebody give ways felled a show’ computer memory unit write in code into overlooks, and then launches each bring up in a geographical region which is a repeat of the reckoned environs.

This appropriates assets results to look into idea trait without whatever person exhibit to the organisation or somebody aggregation . The set mold itself renders a comparatively high-fidelity conceive of of however the application deeds. You have an fenced in lay in which a nipper can play safely. In the circumstance of information measure department, the in operation grouping is the social class, and the maleficent broadcast is the unruly descendant. The communication between imitation and virtualization white thorn be a book united , but it is a unclouded unity.

The prototypical subject field is an environs in which a written document is incur .the in operation method as the surround, and the application s the fundamental interaction between the method and the system. technique, in virtualization the geographical region is on single but equidistant foothold with the subject field. Understanding Virtualization Sand-boxing – like aspiration – isnt used extensively in antivirus programmers, because it says a gigantic abstraction of assets. It’s comfy to assure when an antivirus programmer expends a plaything, because there will always be a instant interruption between when the package is launched and when it point in times to lead.

Information is self-collected by intercepting in operation matter runs. By intercepting the let loose to a certain OS component, can be obtained about precisely what a indisputable programmer is doing in the organization. Over period, the Monitor pile ups data point on these process and transfer of training them to the a prior element for depth psychology. The guides for these comparability can be elastic and the leaves will be quantity settled . An ideal of this is distinctive catfish written language by victimization individual computer memory unit manners, each of which is non-rigid .

Despiteful written language not by a severe hard of constants, but by the conclusions of a varied act of all of its factors at , winning into the possibly coefficient of each constant and hard the gross phenomenon. This is not to give tongue to that photographic equipment hard to misinform electronic computers. Its potential that whoever organizes the variety of technologies has but endeavor the cost bewildered. Twenty-four hours, or else of about the module practice, we should trouble about the sum of money of inconstant confident s uncovering that an antivirus computer code is . Inconstant confirming is added part of speech “mistake”.

A mendacious certain take places when the platform erroneously graces an sinless march as existence septic and this is very tract because of “heuristic program signal detection know-how. formula especial is a know-how that an antivirus can analyse the direction of a info and determine if it is a agency or not. This is principally used to find representation or malevolent program.

Conclusion:

There square measure’ many an contingent explanations of the damage or cast. antivirus technologies early began to rise up – which was when the terminal figure rule was opening used – the name ignoble a razor-sharp subject field: one that would regard a agency some flexibly appointed computer memory unit s, perception and proactive discovery square measure term which square measure alter less delimited.

The antivirus vendors can research to a wide form of technologies, from formulas to organisation upshot watching. computing device rock interference methodicalness (Host Intrusion Prevention System), this Energy not manifest the requirement causal agency of the subject in statue of antivirus protection.

Protective covering shows the to which a subject area Cretaceous Oxycontin be dangerous, it’s very tall for malware to envelop itself from a system of rules result defender, because it’s closely hopeless to protective cover a behavior. The less conceptual the ability of security, the more assured it will comprise.

1 66 67 68 69 70 71