Saturday 30 June 2012

Some Useful internet tips and Codes


How to delete Internet History Using command Prompt?
Delete Cookies Code:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8
Delete History Code:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2
Delete Data Code
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 1
Delete Passwords Code
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 16
Delete All Code
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 32
Delete All – “Also delete files and settings stored by add-ons” Code
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255

How to Make Sure No One Finds Out Where I Go on the Internet?

Instructions

    • 1
      Use a browser with "private browsing" and turn it on. Private browsing allows you to enter a special mode where the information that you obtain from the Internet will not be cached and tracked on your personal computer. A number of different web browsers offer private browsing, so you have several options how to browse and keep your details private.
    • 2
      Clear your "cookies" or do not allow your computer to accept cookies. Cookies are little bits of information placed on your computer by web pages so that the web page can remember who you are when you come back. When you put something in a web shopping cart or when you store a password on a web page, cookies are placed in order to allow you to do this. To be completely safe from tracking cookies, you can block them entirely. This will keep your computer clear of cookie files and prevent companies from tracking where you go. However, many websites will not work properly without cookies being allowed.
    • 3
      Clear your "history" or turn off the history option. Browsers track the history of web pages that you visit. When this occurs, anyone who has access to your computer can go back and look at your history. To avoid this, you can either disable the option to store web pages visited or you can simply clear the history of one or more pages.



How Can You Tell If Someone Has Used Your Computer?


Instructions

    • 1
      Open the Start menu and click "Control Panel."
    • 2
      Open the drop-down menu in the upper-right corner of the Control Panel window and select "Small icons" or "Large icons."
    • 4
      Double-click "Event Viewer."
    • 5
      Click the triangle next to the "Windows Logs" folder on the left side of the window to expand it.
    • 6
      Click "Security." The center of the window fills to display all of the security-related events that have recently taken place on the computer, including any time a user has logged on or off.
    • 7
      Click "Date and Time" at the top of the window if the events are not already sorted by date. Look for any event with the word "Logon" in the "Task Category" column that took place during a time in which you were not at the computer. This indicates that someone else has used your computer.


Removing the ability to delete Internet Explorer history


Press the Windows logo and "R" keys simultaneously to make the "Run" dialog appear.


Type "gpedit.msc" (without quotation marks) into the box and press "Enter." This launches the Windows Group Policy Editor, which allows a computer administrator to make global changes that affect all users.


Use the folder tree on the left side of the screen to browse to the "Computer configuration," "Administrative templates," "Windows components" and "Internet Explorer" folders. Click on the "Delete browsing history" folder beneath the Internet Explorer folder.


Note: If the "Internet Explorer" folder is not visible, see Section 2.


Double-click "Disable Configuring History" and click the "Enabled" radio button. Click "OK."


Double-click "Prevent the deletion of temporary Internet files and cookies." Change the value to "Enabled" and click "OK."


Double-click "Turn off delete browsing history functionality." Change the value to "Enabled" and click "OK."


Double-click "Turn off delete forms functionality" or "Prevent deleting form data." Change the value to "Enabled" and click "OK."


Double-click "Turn off delete passwords functionality" or "Prevent deleting passwords." Change the value to "Enabled" and click "OK."


Double-click "Disable changing temporary Internet files settings" and "Prevent deleting temporary Internet files." Change the value to "Enabled" and click "OK."


10 Double-click "Disable changing advanced page settings" or "Prevent deleting websites that the user has visited." Change the value to "Enabled" and click "OK."


11 Close the Group Policy Editor and restart your computer for the changes to take effect.


Adding Internet Explorer to the Group Policy Editor


12 Right-click on the "Administrative templates" folder under "Computer configuration" and click "Add/remove templates."


13 Click the "Add" button.


14 Double-click "Inetres.adm."


15 Click "Close." The "Internet Explorer" section is now added to the Group Policy Editor.

Friday 29 June 2012

Revamp in Tatkal Scheme:Booking to start at 10 A.M


From July 10, reservation of tatkal tickets will start from 10am instead of 8am and no authorised agents will be allowed to book them during the first two hours, Railways on Thursday said.
"Railways have decided that from July 10 booking of tatkal ticket will start at 10am on the 
previous day of journey from train originating station instead of 8am at present," said a Railways statement.
The move is being initiated as part of revamping the tatkal scheme amid increased complaints from passengers about touts making good of the loopholes in the schemes and selling tatkal tickets at a premium.
Railways officials felt the development will not only help reduce pressure on counters booking both general and tatkal tickets at the same time, but will also reduce the waiting time of tatkal ticket seekers with the shrinking of the crowd.
The pressure on the e-ticketing site would also reduce considerably. At present, booking for both general and tatkal tickets open at 8am, not only chocking e-ticketing sites but also triggering to long queues in reservation counters.
Officials said separate tatkal booking counters will also be opened soon and CCTV cameras installed to monitor the crowd to check irregularities.
Booking clerks will also be barred from carrying mobiles inside the counters, they said.
At present, tatkal scheme is available in around 2677 trains which translates to around 1.71 lakh berths. In 2011-12, earning from the scheme stood at Rs. 847 crore.
The scheme has seen a several changes in the recent past including reducing the days for reserving tatkal tickets from five to one day and barring web-based agents from booking tickets during the first hours, but the indulgence of the touts has deprived passengers from deriving the benefit of the scheme, officials noted.

Displeased with Postal sector: Minister call for reforms

New Delhi: A review meeting of the entire Indian postal sector, chaired by Minister of Communications and IT Kapil Sibal, has found it lagging behind its peers in other parts of the world and called for immediate reforms.

Sibal was displeased with the unorganised nature of Indian postal sector in general, its low contribution to GDP and under-utilised potential to generate employment.

According to ministry sources, Sibal on the basis of cross country data presented to him remarked that "Indian Postal Sector is unorganised and grossly undeveloped. In absence of a forward looking policy framework, the Postal Sector in India has failed to keep with global development".

The meeting was held in connection with finalisation of the draft cabinet note for the first detailed National Postal Policy.

The officials told Sibal that postal sector in some European countries' contributed between 0.6-0.9 percent to their GDP but the contribution of estimated Rs 15,000 crore Indian Postal sector is much lower.

In terms of employment generation, postal sector of France accounts for 1 percent of total employment.

As many as 27 postal service providers in European Union account for 0.5 percent of the region's total employment whereas it stood at around 0.6 million people out of 1.2 billion population in India.

"Postal sector urgently requires legislative, institutional and governance reforms," Sibal said.

He also asked the postal department to make provision for uniform quality standards of services and grievance redressal mechanism at par with global best practices in the policy. 

Source:PTI

DB Analyser dated 28.06.2012 and CC bridge Version 28.06.2012

Revised exe for DB analyser and CC Bridge Version is available for download at
http://tamilnadupost.nic.in/sdc/index.htm

Thursday 28 June 2012

5 Quick Tips to Longer Battery Life

 Quick tips to handle battery problems in your smart phones.

Low BatteryIf you own a mobile phone then you’ve probably been in a situation where your mobile phone dies from a lack of battery charge. This can be rather frustrating - especially if you are in a place where you are unable to charge your battery. There are some measures you can take when using your mobile device that can help preserve your battery power.

1) Avoid Keeping the phone in Vibration Mode:


The method of notification for phone calls can use a significant amount of battery power. This is mainly true for when you set your mobile phone to vibrate. Vibrating will use more power than just having the phone ring. An even larger battery drain is when your phone is set to both vibrate and ring. If you are using this setting, go for the ring-only option as it will use less battery power.

Release of Revised MNOP script dated 27.06.2012

Revised MNOP for Speednet released on 27.06.2012.This script will contain the entire Hub Master data as per the requirement /modifications


Download the script



 

Wednesday 27 June 2012

SQL Queries

How to Delete all rows from a table?

   Delete from table_name  or  Delete * from table_name

Eg: in my case table name=BD
                                     Delete from BD

How to Delete specific rows from a table
                         


DELETE FROM table_name WHERE some_column=some_value



code
name
Designation
Amount
1
Abc
Supervisor
300
1
Bcd
Assistant
300
3
Efg
assistant
300




Eg:  Delete from BD where name= 'abc'


How to delete a Column from a table


ALTER TABLE TableName DROP COLUMN ColumnName

eg:Alter BD Drop column Amount




Monday 25 June 2012

Limit for receiving remittances through International Money Transfer Service to a single individual beneficiary is raised from 12 to 30.


 Limit for receiving remittances through International Money Transfer Service to a single individual beneficiary is raised from 12 to 30.

Quick facts about money transfer service
01) Money Transfer Service Scheme ( MTSS ) is a quick and easy way of transferring personal remittances from abroad to beneficiaries in India.
 02) Only personal remittances such as remittances towards family maintenance and remittances favoring foreign tourists visiting India are permissible.

  1. The system envisages a tie-up between reputed money transfer companies abroad and agents in India who would disburse the funds to the beneficiaries at ongoing exchange rates. Such Agents can be Banks (Authorised Dealers) or Full Fledged Money Changer or registered Non-Banking Financial Company (NBFC), IATA approved Travel agents ( having minimum net worth of Rs.25 lakhs ) with prior RBI approval.

  1. As the remittances are towards family maintenance, there will not be repatriation of such inward remittances.

Saturday 23 June 2012

Installation of SQL 2000 in windows 7

Yes it's to possible to install SQL 2000 in Windows7 and Windows Vista

Step 1
While installation of SQL 2000 u will see program Compatibility Assistant.just ignore the message and Run the program




Step 2
  welcome screen appears install sql 2000

Step 3 – Select where to install the server. Local / Remote ?

Thursday 21 June 2012

Tuesday 12 June 2012

Google Drive: Cloud Storage Utility of google



Google Drive is just like Dropbox in Gogle Drive u need to have a gmail account. You can install google drive from the following link https://drive.google.com/#my-drive. Once the link is clicked u will asked to install the software. After the installation a Folder will be created and u can just drag and put here what ever u want to share. It's Providing free usage upto 5 GB.. 

Monday 11 June 2012

SQL Server 2005 error



How to fix?



Go to control panel >> Firewall Settings >> Add SQL Server’s Port to Exception List.


Now try to connect to SQL Server again. It will allow you to connect to server successfully.


SQL SERVER : ERROR : Cannot open database requested by the login. The login failed. Login failed for user ‘NT AUTHORITY\NETWORK SERVICE’.


Cannot open database requested by the login. The login failed.
Login failed for user ‘NT AUTHORITY\NETWORK SERVICE’.


This is Common error which i found a solution

How to Fix??


1. Go to SQL Server >> Security >> Logins and right click on NT 
AUTHORITY\NETWORK SERVICE and select Properties



2. In newly opened screen of Login Properties, go to the “User 
Mapping” tab. Then, on the “User Mapping” tab, select the desired 
database – especially the database for which this error message is 
displayed. On the lower screen, check the role db_owner. Click OK.




Thursday 7 June 2012

RUN Commands for XP,Vista, Windows 7


1.Microsoft Access* msaccess
2.Microsoft Excel* excel
3.Microsoft Malicious Software Removal Tool mrt
4.Microsoft Paint mspaint
5.Microsoft Powerpoint* powerpnt
6.Microsoft Support Diagnostic Tool (Vista/Win7) msdt
7.Microsoft Word* winword
8.Mouse Properties control mouse
9.Mouse Properties main.cpl
10.MSN Messenger* msnmsgr

11.Regional Settings intl.cpl
12.Registry Editor regedit

13.Calculator-calc
14.Groupeditor-gpedit.msc
15.Dispaly Setting-desk.cpl
16.Event Viewer-eventvwr.msc
17.Game Contoller-joy.cpl


18.iP Configuration (Display Connection Configuration)-ipconfig /all
19.IP Configuration (Display DNS Cache Contents)-ipconfig /displaydns
20.IP Configuration (Delete DNS Cache Contents)-ipconfig /flushdns
21.IP Configuration (Release All Connections)-ipconfig /release
22.IP Configuration (Renew All Connections)-ipconfig /renew
23.IP Configuration (Refreshes DHCP & Re-Registers DNS)-ipconfig /registerdns
24.IP Configuration (Display DHCP Class ID)-ipconfig /showclassid
25.IP Configuration (Modifies DHCP Class ID)-ipconfig /setclassid



26.Shared Folders-fsmgmt.msc
27.Shuts Down Windows -shutdown

28.System File Checker Utility ( Scan Immediately )-sfc /scannow
29.System File Checker Utility ( Scan Once At Next Boot )-sfc /scanonce
30.System File Checker Utility ( Scan On Every Boot )-sfc /scanboot
31.System File Checker Utility ( Return to Default Settings)-sfc /revert
32.System File Checker Utility ( Purge File Cache )-sfc /purgecache
33.System File Checker Utility ( Set Cache Size to Size x )-sfc /cachesize=x
34.System Information-msinfo32
35.System Properties-sysdm.cpl
36.Task Manager-taskmgr


Updates for Speednet Virtual Scanning

To Provide virtual scanning for all Speed Post articles including UID upto 25 days from the date of receipt of messages from Central Server, CEPT, Mysore has released exl file..

ftp://ftp.ptcinfo.org/SpeedNet/

Wednesday 6 June 2012

IPV6 launched toay


What is IPv4?
A: IPv4 stands for Internet Protocol version 4. It is the underlying technology that makes it possible for us to connect our devices to the web. Whenever a device access the Internet (whether it’s a PC, Mac, smartphone or other device), it is assigned a unique, numerical IP address such as 99.48.227.227. To send data from one computer to another through the web, a data packet must be transferred across the network containing the IP addresses of both devices.
Without IP addresses, computers would not be able to communicate and send data to each other. It’s essential to the infrastructure of the web.
Q: What is IPv6?
A: IPv6 is the sixth revision to the Internet Protocol and the successor to IPv4. It functions similarly to IPv4 in that it provides the unique, numerical IP addresses necessary for Internet-enabled devices to communicate. However, it does sport one major difference: it utilizes 128-bit addresses. I’ll explain why this is important in a moment.
Q: Why are we running out of IPv4 addresses?
A: IPv4 uses 32 bits for its Internet addresses. That means it can support 2^32 IP addresses in total — around 4.29 billion. That may seem like a lot, but all 4.29 billion IP addresses have now been assigned to various institutions, leading to the crisis we face today.
Let’s be clear, though: we haven’t run out of addresses quite yet. Many of them are unused and in the hands of institutions like MIT and companies like Ford and IBM. More IPv4 addresses are available to be assigned and more will be traded or sold (since IPv4 addresses are now a scarce resource), but they will become a scarcer commodity over the next two years until it creates problem for the web.

Usage of Mobile during Office Hours Restricted

Thiruvananthapuram: To raise efficiency in government offices, the Kerala government has asked all its employees to restrict the use of mobile telephones during work hours.

The government order, based on the recommendations of the Administrative Reforms Committee, first came out in February.

Since it does not appear to have had the desired effect, it has now been sent out to all department heads again.

The latest circular says that there have been numerous complaints from the public that many government officials engage in private calls on their mobile phones while at work.

"The government views this seriously and instructs all government employees to restrict private calls on mobile phones during office hours, except in unavoidable circumstances," reads the order.

Friday 1 June 2012

Incentive for Taking IMT's-- Kerala Circle

Important points of CPMG letter No:FS/100-1/2012(pt) dated at trivandrum the.4.5.2012. regarding Incentive on IMT's

1. Rs 10/- per transaction is allowed for customer oriented expenditure and incentive to the staff

2. Out of Rs 10/-, Rs 2/- Can be allowed to Counter PA as incentive and Rs .1/- for APM/DPM (counter) or SPM/PM himself wherever he /she himself/herself supervise IMTS transaction. The sanction needs to be issued by the Divisional Head based on the performance of the postoffice every month. The remaining Rs.7 may be set aside for Customer-staff oriented Common expenditure

3. A standing Commitee Comprising the Divisional head/ ASP (OD), ASP/IP Sub Division and PM/SPM of the post office may be constituted. The Committee should have not less than three members. They should analyse the requirement of the post office and decide the course of action for the utilization of the amount including Purchase of items of common use and interest to all the staff, For eg Purchase of Cooler,Smaller refrigenator etc would be considered if adequate funds can be generated. The purchase has to be made observing the usual formalities as prescribed in the rules in the regard. the committee can meet at a convenient frequency as per their local needs for taking appropriate decision  

Batch File for automatic Running of Clients

We are receiving Daily e-mail from Divisional office or Regional office Regarding epayment Client not called offices"  Here is a batch file for automatic running of Various Clients



Type the code in a text file and save the notepad as extension .bat. You can put this batch file either in Task sheduler or Start up

eg:


@ echo off
C:\Program Files\ePayment Client" EBillCommunication.exe







You Might also like this

Related Posts Plugin for WordPress, Blogger...