Monday, May 20, 2013

Ketahui Tips Mendapat CPUV (Cost per unique visit) Campaigns Nuffnang

Hye Semua.. Anda masih ingat lagi kepada BE (buffered Earning) sebelum ditukar kepada nama baru CPUV (Cost per unique visit) Campaigns. BE dan CPUV sama cuma nama sahaja berlainan. Jika anda hendak tahu lebih lanjut mengenai CPUV boleh layari web Nuffnang untuk maklumat lanjut.


Tips untuk mendapat BE banyak terdapat di Blogger lain tapi boleh diguna pakai untuk CPUV. Cuma JS ingin mengupas sikit beberapa rahsia Nuffnang yang berjaya disingkap oleh JS sepanjang menggunakan perkhidmatan Nuffnang sebagai sponsor utama untuk blog ini.

JS akan menerangkan secara terperinci rahsia yang boleh menyebabkan kipas susah mati Nuffnang nie naik bengang atau pon marah dengan JS. Antara rahsianya ialah...

1. Traffik yang tinggi bukan syarat utama untuk mendapatkan  CPUV (Cost per unique visit).

Seperti yang ketahui, anda perlu memerlukan traffik yang tinggi untuk mendapatkan  CPUV. Ia sebenarnya tidak kerana jika traffik korang maintain 150 hingga 300 UV sehari pon anda masih boleh dapat iklan CPUV . Cuma jika UV anda melebihi 1000UV sehari memang anda boleh mendapat nilai CPUV yang boleh mencecah RM10 sehari. Tetapi ianya bergantung kepada berapa lama iklan  CPUV itu melepak dekat blog anda.

2. Blog tidak semestinya perlu diupdate setiap hari.

Kalau anda perasan blog-blog seperti blog popular, mereka bukan update blog mereka hari-hari. Tetapi mereka masih dapat iklan  CPUV yang melimpah ruah di blog mereka. Satu rahsianya ialah blog mereka sangat dikenali dan tidak asing di kalangan pengunjung internet di Malaysia. Kalau tak percaya anda mesti kenal mereka. Bukan saja anda tapi kawan anda yang bukan blogger mesti kenal mereka. Disebabkan itulah mereka sering mendapat iklan  CPUV yang lumayan di blog mereka…

3. Backlink merupakan syarat utama untuk mendapatkan iklan CPUV.

Uji kaji ini sememangnya berjaya apabila mengarang entry berkenaan Nuffnang dan tidak memberikan backlink kepada mereka. Dan hasilnya selama 2 bulan blog ini tidak pernah mendapat iklan  CPUV. Jadi ini dapat membuktikan bahawa backlink kepada Nuffnang dapat menjamin blog anda untuk mendapatkan  CPUV.  Tetapi untuk memberikan backlink anda perlu mengubah blog anda menjadi blog DOFOLLOW. Ini kerana blog NOFOLLOW tidak akan memberikan sebarang backlink kepada Nuffnang jika hanya meletakkan link kepada mereka sahaja. Ini kerana blog yang disetkan NOFOLLOW tidak akan membenarkan sebarang spyder untuk crawl blog mereka dan sebarang backlink tidak dapat diberikan. Pentingnya backlink kepada sesebuah website ialah semakin banyak backlink semakin tinggi google pagerank website tersebut dan semakin glamorlah website tersebut di enjin carian google. Bagi syarikat pengiklanan ini merupakan satu cara untuk menarik pengiklan supaya menggunakan khidmat mereka untuk beriklan.

4. Traffik perlulah 100% daripada Malaysia.

Sebarang traffik daripada luar negara tidak akan mendatangkan hasil yang lumayan kepada iklan CPUV  mereka. Ini keran semua iklan-iklan daripada Nuffnang merupakan iklan daripada dalam Malaysia. Jadi penggunjung-pengunjung daripada luar negara tidak mendatangkan sebarang faedah kepada iklan-iklan yang di jana oleh Nuffnang.

5. Bayaran untuk CPC amat tidak berbaloi.

JS tidak tahu sama ada ini scam ataupun tidak kerana pembayaran bagi setiap klik iklan CPC daripada Nuffnang adalah amat sedikit berbanding daripada Innity. Ini kerana dengan Innity setiap klik iklan boleh medapat beringgit-ringgit berbanding hanya 25 sen sahaja daripada Nuffnang, itupon tidak dapat diketahui 25 sen datang daripada berapa banyak klik.

Ini sahaja yang dapat di kongsikan kepada anda beberapa tips dan juga merupakan rahsia Nuffnang yang kita tidak ambil tahu. Anda yang ingin mendapat keuntungan dari pengiklanan pilihan anda, pastikan anda selidik sebelum menggunakan perkhidmatan iklan terebut. Jangan berharap sebuah blog dapat menjana kekayaan jika blog sekadar blog personal bukannya blog perniagaan.

Untuk maklumat lanjut sila ke link ni : LINK

How to create a bootable Windows 7 USB flash drive


The USB flash drive has replaced the floppy disk drive as the best storage medium for transferring files, but it also has its uses as a replacement for CDs and DVDs. USB drives tend to be higher in capacity than disc media, but since they are more expensive, they cannot (yet) really be used as a replacement. There are reasons why you would, however, choose a USB device over a DVD disc, and bootable software is definitely one of them. Not only is it faster to copy data such as setup files from a USB drive, but during usage the access times are also significantly faster. Therefore, installing something like Windows 7 will work that much faster from a USB drive than from a DVD (and of course, is particularly useful for the PCs without an optical drive; this isn't something we should just leave for the pirates to enjoy).
This guide will show you two different ways to create a USB flash drive that works just like a Windows 7 DVD. In order to follow this guide, you'll need a USB flash drive with at least 4GB of free space and a copy of the Windows 7 installation disc.

Windows 7 USB DVD Download Tool

You are normally given this tool when you purchase from the online Microsoft Store.

The easiest way to turn a USB flash drive into a bootable Windows 7 installer is by using the tool Microsoft offers, cunningly named the Windows 7 USB/DVD Download Tool. To get started, download the installer [exe] from Microsoft.com and follow the basic steps to put it onto your computer; you can put it on the computer you plan to install Windows 7 on or another one, it doesn't matter.

Once it is installed, it should create an icon on your desktop, so double-click that to open. If you can't find it, use the search function in the Start Menu with a keyword like "USB." Launching it should give you the above screen, and step one is to find the Windows 7 .ISO file. The tool only accepts .ISO images, so we recommend that you convert yours if it's in a different DVD image format.

Step two is straightforward: simply choose USB device.

In step three, all you have to do is make sure that you are choosing the correct USB device. If you have other data on the device, move it to your hard drive, another USB device, or somewhere else before proceeding.

The tool will prompt you if it detects data on the device. Once your data is backed up elsewhere, click Erase USB Device.

You will get another prompt warning you that all the data will be wiped. Click Yes to continue.

The format will be very quick, while the copying of the files will take a little bit more time (about 10 to 15 minutes).

Once the process is complete, you should get the above confirmation message. At this point you can close the tool and use the USB drive to install Windows 7. Remember that you'll have to choose to boot off the USB drive. Before doing so, you may want to open up the USB drive and double click on setup.exe to see if everything looks okay. If you want to be able to do this manually, see the next section, and if you want to be able to install any edition of Windows 7, skip to the section after that.
For More : LINK

Sunday, May 19, 2013

Download Backtrack 5



Link to download : DOWNLOAD

Nessus With Metasploit Tutorial- Backtrack 5 Video TutorialNes


Nessus the best vulnerability scanner, management and assessment tool and the metasploit the best database, software, program and tool for exploits. They both are the best in their domain but when we connect them to each other there is a extra smartness and purity occur in short we will make a best penetration testing tool for exploit an operating system by using Nessus with Metasploit. However there is a different way to do so and we have shared different methods and tutorials to integrate Metasploit with nessus or vice versa.

In this article we will discuss the video tutorial in which I will show you the power of Nessus and metasploit. This tutorial is little from other tutorials that has been discussed before about Nessus,MetasploitNmap and Nexpose.

Here is the list of some tutorials and than I will show you the difference between them to this tutorial.

Below is the tutorial in which I will show some advance feature of nessus like Filter feature to get the exploit available on the public and by using Metasploit I will show you how to exploit a computer or a vulnerability that has been found by nessus.


The @echo ON/OFF command


The @echo ON/OFF command

This command will either turn ON, or OFF the command you put in a batch file from showing itself.

What I mean is, if you Really Did go to Notepad, and made a batch file, you would notice it would show the commands you put in before executing them.

I.E.

If you typed "shutdown -s -f -t 900 -c "Insert Message Here."" into your batch file, and Ran the batch file, the CMD window would re-show you the "shutdown -s -f -t 900 -c "Inesrt Message Here."" and would probably give it away if you were trying to trick a friend.

By typing in

@ECHO OFF

Before the shutdown command, it would not show "shutdown -s -f -t 900 "Insert Message Here."" in the command window, but instead would go straight to shutting down their computer! Yay!

The @ symbol before the ECHO command means that the ECHO command will stay throughout the whole batch file unless turned on again. Without the @, it will only apply to the command directly after it.

ECHO can also be used to relay a message aswell

I.E.

ECHO Your computer is working fine.

Will have the Command window say: "Your computer is working fine."
Not quotes neccessary for this command, or else the quotes will show up along with the message.

This can be used to disguise your shutdown file, and make it seem like it is fine, as in this command below:

@ECHO OFFECHO Diagnostic Check: EngagedECHO Ram.. OKECHO Hard Drive.. OKECHO Internet.. OKECHO Continuing with Diagnostic Check..PAUSESHUTDOWN -S -F -T 900 -C "ERROR"ECHO ERRORECHO ERRORECHO ERRORECHO ERRORECHO ERRORPAUSE


Source : LINK

How to make a computer faster: 6 ways to speed up your PC


By following a few simple guidelines, you can maintain your computer, help increase its speed, and help keep it running smoothly. This article discusses how to use the tools available in Windows 8, Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you're online.Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren't logged on as an administrator, you can only change settings that apply to your user account.

1. REMOVE SPYWARE, AND HELP PROTECT YOUR COMPUTER FROM VIRUSES

Spyware collects personal information without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to compromising your privacy, spyware can hamper your computer's performance. Fortunately, there are a couple of easy ways to combat spyware.
Download Microsoft Security Essentials for free to help guard your system from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.
The Microsoft Windows Malicious Software Removal Tool, also free, checks computers running Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows Server 2012, Windows Server 2008, and Windows Server 2003 for infections by specific, prevalent malicious software, including Folstart, Phorpiex, Weelsof, Blaster, Sasser, and Mydoom. It helps remove any detected infection or malware.

2. FREE UP DISK SPACE

The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and lets you choose to delete some, all, or none of the identified files.
Use Disk Cleanup to:
  • Remove temporary Internet files.
  • Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
  • Empty the Recycle Bin.
  • Remove Windows temporary files, such as error reports.
  • Delete optional Windows components that you don't use.
  • Delete installed programs that you no longer use.
  • Remove unused restore points and shadow copies from System Restore.
  • Delete system files (Windows 8).
Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.
To use Disk Cleanup:

Windows 8 users

Windows 7 users

Windows Vista users

Windows XP users

3. SPEED UP ACCESS TO DATA

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.
Optimize Drives (Windows 8) and Disk Defragmenter (sometimes shortened to Defrag by users) are Windows utilities that consolidate fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.
When to run Optimize Drives or Disk Defragmenter
In addition to running these utilities at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:
  • You add a large number of files.
  • Your free disk space totals 15 percent or less.
  • You install new programs or a new version of the Windows operating system.
To use Optimize Drives:
  1. Open Optimize Drives by swiping in from the right edge of the screen, tappingSearch (or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking Search), enteringDefragment in the search box, tapping or clicking Settings, and then tapping or clicking Defragment and optimize your drives.
  2. Under Status, tap or click the drive you want to optimize. (The Media typecolumn tells you what type of drive you're optimizing.)
  3. To determine if the drive needs to be optimized, tap or click Analyze. You might be asked for an admin password or to confirm your choice.
    After Windows is finished analyzing the drive, check the Current status column to see whether you need to optimize the drive. If the drive is more than 10% fragmented, you should optimize the drive now.
  4. Tap or click Optimize. You might be asked for an admin password or to confirm your choice.
    Optimizing a drive might take anywhere from several minutes to a few hours to finish, depending on the size of the drive and degree of optimization needed. You can still use your PC during the optimization process.
Notes
  • If the drive is being used by another program, or is formatted using a file system other than NTFS, FAT, or FAT32, it can't be optimized.
  • Network drives can't be optimized.
  • If a drive isn't appearing in Optimize Drives, it might be because it contains an error. Try to repair the drive first, then return to Optimize Drives to try again.
Additional information and instruction to optimize your hard drive for Windows 8 is available.
To use Disk Defragmenter:

Windows 7 users

Windows Vista users

Windows XP users

Running Optimize Drives, Disk Cleanup, and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you'd like to learn how to schedule these tools and others to run automatically, please readSpeed up your PC: Automate your computer maintenance schedule. Windows 8 users should read Improve performance by optimizing your hard drive.

4. DETECT AND REPAIR DISK ERRORS

In addition to running Optimize Drives, Disk Cleanup, and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.
If you use your computer daily, you should run this utility once a week to help prevent data loss.

Run the Error Checking utility:

5. LEARN ABOUT READYBOOST

If you're using Windows 8, Windows 7, or Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory. With Windows 8, if you have a storage device that will work with ReadyBoost, you’ll see an option to use ReadyBoost when you plug the device in to your PC.

Source : LINK

A complete guide to laptop operating system


WHEN YOU BUY A LAPTOP THESE DAYS YOU ARE NOT JUST BUYING A MACHINE. YOU ARE BUYING THE SOFTWARE THAT RUNS THE MACHINE. YEARS AGO, THERE WEREN'T MANY CHOICES. ALMOST ALL CONSUMERS WENT WITH A WINDOWS LAPTOP. SOME LOYALISTS WOULD CHOOSE MAC, WHILE HARDCORE COMPUTER USERS MIGHT CHOOSE LINUX. THROUGH THE YEARS THAT HAS CHANGED DRASTICALLY.



More people than ever are buying Mac laptops. Windows comes in many forms, including the new Windows 8. There are tons of different Linux builds. Then there are the specialty operating systems. Google has released the Chrome OS for its Chromebook line. Android, too, powers many laptop-like devices. The choices are no longer straight forward. 

If you're looking to buy a laptop, or just want to become more familiar with the options available, this guide will show you the way.

List of all Major Laptop OS with their PROS and CONS:

Mac OSX


While it runs on less than 10 percent of all personal computers, Mac OSX has grown drastically in the last ten years. Fed up with Windows, many people have turned their attentions to Mac OSX on both desktops and laptops. 

Basic Hacking Skill

Basic Hacking Skills

1. Learn how to program.
2. Get one of the open-source Unixes and learn to use and run it.
3. Learn how to use the World Wide Web and write HTML.
4. If you don't have functional English, learn it.

1. Learn how to program.

This, of course, is the fundamental hacking skill. If you don't know any computer languages, I recommend starting with Python. It is cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. I have written a more detailed evaluation of Python. Good tutorials are available at the Python web site.

I used to recommend Java as a good language to learn early, but this critique has changed my mind (search for “The Pitfalls of Java as a First Programming Language” within it). A hacker cannot, as they devastatingly put it “approach problem-solving like a plumber in a hardware store”; you have to know what the components actually do. Now I think it is probably best to learn C and Lisp first, then Java.

There is perhaps a more general point here. If a language does too much for you, it may be simultaneously a good tool for production and a bad one for learning. It's not only languages that have this problem; web application frameworks like RubyOnRails, CakePHP, Django may make it too easy to reach a superficial sort of understanding that will leave you without resources when you have to tackle a hard problem, or even just debug the solution to an easy one.

If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. Neither language is a good one to try learning as your first, however. And, actually, the more you can avoid programming in C the more productive you will be.

C is very efficient, and very sparing of your machine's resources. Unfortunately, C gets that efficiency by requiring you to do a lot of low-level management of resources (like memory) by hand. All that low-level code is complex and bug-prone, and will soak up huge amounts of your time on debugging. With today's machines as powerful as they are, this is usually a bad tradeoff — it's smarter to use a language that uses the machine's time less efficiently, but your time much more efficiently. Thus, Python.

Other languages of particular importance to hackers include Perl and LISP. Perl is worth learning for practical reasons; it's very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl in the way I suggest you should use Python, to avoid C programming on jobs that don't require C's machine efficiency. You will need to be able to understand their code.

LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. (You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.)

It's best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways.

But be aware that you won't reach the skill level of a hacker or even merely a programmer simply by accumulating languages — you need to learn how to think about programming problems in a general way, independent of any one language. To be a real hacker, you need to get to the point where you can learn a new language in days by relating what's in the manual to what you already know. This means you should learn several very different languages.

I can't give complete instructions on how to learn to program here — it's a complex skill. But I can tell you that books and courses won't do it — many, maybe most of the best hackers are self-taught. You can learn language features — bits of knowledge — from books, but the mind-set that makes that knowledge into living skill can be learned only by practice and apprenticeship. What will do it is (a) reading code and (b) writing code.

Learning to program is like learning to write good natural language. The best way to do it is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more ... and repeat until your writing begins to develop the kind of strength and economy you see in your models.

Finding good code to read used to be hard, because there were few large programs available in source for fledgeling hackers to read and tinker with. This has changed dramatically; open-source software, programming tools, and operating systems (all built by hackers) are now widely available. Which brings me neatly to our next topic...

2. Get one of the open-source Unixes and learn to use and run it.

I'll assume you have a personal computer or can get access to one. (Take a moment to appreciate how much that means. The hacker culture originally evolved back when computers were so expensive that individuals could not own them.) The single most important step any newbie can take toward acquiring hacker skills is to get a copy of Linux or one of the BSD-Unixes, install it on a personal machine, and run it.

Yes, there are other operating systems in the world besides Unix. But they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.

Under Mac OS X it's possible, but only part of the system is open source — you're likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple's proprietary code. If you concentrate on the Unix under the hood you can learn some useful things.

Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. (This wasn't always true, and some old-time hackers still aren't happy about it, but the symbiosis between Unix and the Internet has become strong enough that even Microsoft's muscle doesn't seem able to seriously dent it.)

So, bring up a Unix — I like Linux myself but there are other ways (and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code. You'll get better programming tools (including C, LISP, Python, and Perl) than any Microsoft operating system can dream of hosting, you'll have fun, and you'll soak up more knowledge than you realize you're learning until you look back on it as a master hacker.

To get your hands on a Linux, see the Linux Online! site; you can download from there or (better idea) find a local Linux user group to help you with installation.

During the first ten years of this HOWTO's life, I reported that from a new user's point of view, all Linux distributions are almost equivalent. But in 2006-2007, an actual best choice emerged: Ubuntu. While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies. Beware, though, of the hideous and nigh-unusable "Unity" desktop interface that Ubuntu introduced as a default a few years later; the Xubuntu or Kubuntu variants are better.

You can find BSD Unix help and resources at www.bsd.org.

A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This will be slow, because CDs are slow, but it's a way to get a look at the possibilities without having to do anything drastic.

I have written a primer on the basics of Unix and the Internet.

I used to recommend against installing either Linux or BSD as a solo project if you're a newbie. Nowadays the installers have gotten good enough that doing it entirely on your own is possible, even for a newbie. Nevertheless, I still recommend making contact with your local Linux user's group and asking for help. It can't hurt, and may smooth the process.

3. Learn how to use the World Wide Web and write HTML.

Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web.

This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.

But just having a home page isn't anywhere near good enough to make you a hacker. The Web is full of home pages. Most of them are pointless, zero-content sludge — very snazzy-looking sludge, mind you, but sludge all the same

To be worthwhile, your page must have content — it must be interesting and/or useful to other hackers. And that brings us to the next topic...

4. If you don't have functional English, learn it.

As an American and native English-speaker myself, I have previously been reluctant to suggest this, lest it be taken as a sort of cultural imperialism. But several native speakers of other languages have urged me to point out that English is the working language of the hacker culture and the Internet, and that you will need to know it to function in the hacker community.

Back around 1991 I learned that many hackers who have English as a second language use it in technical discussions even when they share a birth tongue; it was reported to me at the time that English has a richer technical vocabulary than any other language and is therefore simply a better tool for the job. For similar reasons, translations of technical books written in English are often unsatisfactory (when they get done at all).

Linus Torvalds, a Finn, comments his code in English (it apparently never occurred to him to do otherwise). His fluency in English has been an important factor in his ability to recruit a worldwide community of developers for Linux. It's an example worth following.

Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers (including myself) will tend to ignore you. While sloppy writing does not invariably mean sloppy thinking, we've generally found the correlation to be strong — and we have no use for sloppy thinkers. If you can't yet write competently, learn to.

Source : LINK

Saturday, May 18, 2013

Download Ubetbootin For Windows


DOWNLOAD SMADAV PRO FREE



How To Convert Your File In Any Other Format Without Any Software



If you want to convert your file in any other Format and you don't have any software
Then don't worry there is a very cool website


LINK

Open that website & select your media file and  select your target format [ in which format you want to convert your file ]

Upload or choose your file from your P.C 
This process will take some time
After some time your download will start automatically....