Search:

Type: Posts; User: TechyGuy

Page 1 of 4 1 2 3 4

Search: Search took 0.01 seconds.

  1. Re: How to upgrade Windows Mobile 6 software with T-Mobile Dash

    As you are done with the above steps, then for the upgrading the software of the phone you have to follow some step which I have mentioned below and connect the phone with the computer of yours:

    ...
  2. Re: How to upgrade Windows Mobile 6 software with T-Mobile Dash

    You can upgrade the file by downloading the file from the internet but before that I want to say that before going on please make sure that all data on your MDA (Model-driven architecture) is backed...
  3. Re: What Is the Difference between an Apple Macintosh and an IBM Computer?

    Now countless associations fabricate PCs, incorporating Lenovo, Hewlett-Packard, Dell, Toshiba and Acer. While Macs particularly are private computers, the terms PC and Mac have been utilized for so...
  4. Re: with dell and an Intel graphics driver, want to install Windows 7 sp1

    If you are getting some problem while updating your windows 7 to SP1 version with your Intel graphics driver, then it is sure that there will be some problem with your graphic driver. According to me...
  5. Replies
    1
    Views
    1,968

    Re: To Print only selected text from Websites

    Select the text That you want to print. Left-click on the mouse at the beginning and drag across to the end of the text you want and release. While the text is selected (highlighted / greyed), go to...
  6. Replies
    1
    Views
    31,059

    Re: Lock your iPhone applications with mAdvLock

    Functions & Characteristics

    1. 1. Encrypt and Hide files
    All files in your iphone can be encrypted,such as SMS,photos,and cotacts,etc.

    2.Application locks
    mAdvLock allows you to protect...
  7. Replies
    1
    Views
    1,397

    Re: Nokia Easy Meet for Online Collaboration

    Following features can be supported by Easy Meet:

    File Sharing, supporting PPT, JPEG and PNG
    Chat
    Meeting Minutes
    Whiteboard
    Gesturing
    File Downloads
    Participant Awareness
    Remote...
  8. Re: Sort and search your emails with OutlookDeck

    Another tip:
    The software also offers to generate a "Tag Cloud" (a cloud of keywords) to easily identify the other issues related to selected emails. You just need to click on the icon shaped like...
  9. Re: How to set up Outlook 2007 client to work with Gmail ?

    Wow!!!! that was very sweet of you to spend so much of your quality time and energy to make the above thread. And the best part is that you did so, just to help others, you don't possess good...
  10. Replies
    5
    Views
    2,663

    Re: Windows Error code 999 with iTunes

    According to me, if you are using this application in your system without the browser plug ins then this can be issued for the other application those are relevant to this program, if you are having...
  11. Re: Not able to access Hotmail account from windows mail

    According to me, if you are willing to load the email client that should be compatible with the gmail and windows mail, then I recommends you to go of the Microsoft outlook email client, by this...
  12. Re: my C: Drive is showing Full, i don't know why

    You have to check manually that, is there anything which has taken a more space. Check your recycle bin. Right click the recycle bin, click properties, move the slider from 10 % to 3 %, then click...
  13. Re: Can't install Gigabyte motherboard drivers from the drivers & utlity CD

    I've just installed the cdrom again, and already is blinking. I now have a problem with the ethernet. I installed these drivers for the motherboard MSI KT880 Delta VIARAID_OM74. And in the device...
  14. Replies
    5
    Views
    1,317

    Poll: Re: Top Nokia Mobile Phone

    The Nokia E73 Mode is based on Symbian OS 9.3, which provides maximum customization and compatibility with Java applications. In the business, managing business communications by e-mail is absolutely...
  15. Replies
    4
    Views
    1,959

    Re: Atomic browser vs Perfect web browser

    It will be better to go for the Perfect web browser since It also works without computer and without jailbreak. The app is called Oplayer, and is also available in a lite version. Unfortunately, I...
  16. Replies
    4
    Views
    981

    Re: How to Remove Backdoor.ProRat Virus

    The Backdoor Prorat is a real nuisance (especially versions 1.8 to 2.0), it puts off a lot of AV and firewall, and anti Trojans, versions of PestPatrol are too old to be able to find the main office...
  17. Replies
    4
    Views
    1,066

    Re: Dell Studio 1558 bluescreen on power unplug

    Sounds like the problem is due to the Drive Verifier which deetects the PCTCore64.sys and is the main cause of this problem. Thats the reason why you were receiving the error message. I would suggest...
  18. Replies
    77
    Views
    97,649

    Re: Unlock new idea 3g netsetter huawei e1550

    If you are looking to unlock the Huawei e1550 then you need two things. First you should no the IMEI number of device and unlocking software. I have gone through the same. Below is the given...
  19. Poll: Re: Need Suggestion for Best Electronic Gadget

    I am with the Commodore PC 64. Commodore takes a few months teaching his head in the media, and I'm sure many of you will cause a special interest by reading the mythical name of the company. The...
  20. Replies
    4
    Views
    1,687

    Re: Asus LCD Monitor vs Samsung LCD Monitor

    If you ask me then i will advise you to go with the Samsung which is the best in LCD manufacturing. This product is being released a press release, Samsung Electronics, home page or a state of...
  21. Replies
    6
    Views
    2,679

    Poll: Re: Vote for Best SD Card Manufacturer

    SD cards are the most popular digital memory cards. Kingston SD Cards offer high storage capacity and fast data transfer rates of up to 5 MB / second. The built-in write-protect switch prevents...
  22. Re: Need suggestions for private "Heartbeat" configuration on a cluster server

    Recommended configuration for the private adapter in Windows 2000 and Windows 2003

    1. Click Start, point to Settings, click Control Panel, and then double-click Network and Dial-up Connections....
  23. Need suggestions for private "Heartbeat" configuration on a cluster server

    Communication between Server Cluster nodes is critical for smooth cluster operations. Therefore, you must configure the networks that you use for cluster communication are configured optimally and...
  24. Replies
    5
    Views
    1,512

    Poll: Re: Vote for Best Wireless Mouse Manufacturer

    My vote goes to iBall which i can trust on and suggest others also to go with the same. I have gone through the same and let me tell you that i have not got any issue with the same. I like then...
  25. Replies
    1
    Views
    2,099

    Re: FAQs about Network Load Balancing (NLB)

    Q. How Does the NLB Load Balancing Algorithm Work?

    A. NLB employs a fully distributed filtering algorithm to map incoming clients to the cluster hosts. This algorithm enables cluster hosts to...
  26. Replies
    1
    Views
    2,099

    FAQs about Network Load Balancing (NLB)

    Q. Do the Heartbeat Packets Consume a Lot of Bandwidth?

    A. No, the heartbeat packets, which are emitted every second by each host, consume less than 1,500 bytes.

    Q. Do the Heartbeats Need to Go...
  27. Replies
    6
    Views
    1,925

    Poll: Re: Vote for Best USB Manufacturer

    Looking for an easy way to store, carry and transfer files wherever you go? Or a convenient and innovative way to back up files on your netbook or laptop? Lexar offers a variety of solutions portable...
  28. How to stop managing a cluster from Network Load Balancing Manager

    1. Open Network Load Balancing Manager.
    2. Right-click the cluster that you want to remove from Network Load Balancing Manager and choose Remove from view.

    Please note that:

    Performing...
  29. Replies
    1
    Views
    2,657

    Windows 7 Clean Install Walk-through

    Here is a walkthrough on how to clean install Windows 7:

    1. Make sure your first boot device, in BIOS, is your cd/dvd drive. Insert Windows 7 disk and restart your computer.
    2. Your computer...
  30. Re: Step by step procedure to remove Avmirror.com hijacker

    If you are not sure about what you are doing, then it is recommended to take the back of your Windows Registry. The above steps to remove Avmirror.com program should be done at your own risk.

    How...
  31. Step by step procedure to remove Avmirror.com hijacker

    Avmirror.com is a rogue website that promotes the fake security program called Antivir Solution Pro. It restricts the browsing scope and affects the web-surfing destination. It hijacks your browser...
  32. Re: Step by step guide to remove Antispymega.com hijacker

    If you are not sure about what you are doing, then it is recommended to take the back of your Windows Registry. The above steps to remove Antispymega.com program should be done at your own risk.
    ...
  33. Step by step guide to remove Antispymega.com hijacker

    Antispymega.com (or Antispymega.net) is a fake website which publishes a rogue security program to make money. This program is none other than well known Antivir Solution Pro. If you reach the...
  34. Replies
    2
    Views
    1,938

    Re: How to remove Av-fox.com hijacker

    Manually Remove Av-fox.com

    First of all delete %Documents and Settings%\[UserName]\Local Settings\Application Data\[random string]\[random string].exe file. Then open Windows Registry and look...
  35. Replies
    2
    Views
    1,938

    Re: How to remove Av-fox.com hijacker

    If you are not sure about what you are doing, then it is recommended to take the back of your Windows Registry. The below steps to remove av-fox.com program should be done at your own risk.

    How...
  36. Replies
    2
    Views
    1,938

    How to remove Av-fox.com hijacker

    Av-fox.com is a fake website which promotes a bogus security program in order to earn money. This program is named as Antivir Solution Pro. Antivir Solution Pro enters into the target computer via...
  37. Re: How to protect your confidential data in Facebook

    Follow the event or register

    Ah! If only Tata Jeannine was on Facebook, you certainly would not have forgotten to celebrate his birthday because the social network is a very practical agenda...
  38. Re: How to protect your confidential data in Facebook

    Add activities

    It is possible to enrich Facebook by adding applications. Both functions, as a calendar that can sync with Google Calendar, an interactive map which pin up places on the planet that...
  39. Re: How to protect your confidential data in Facebook

    Chat Live

    One could almost wonder why bother with email and instant messaging when you're a facebooker. Not only is it easy to leave messages on the wall of his friends, but Facebook has its own...
  40. Re: How to protect your confidential data in Facebook

    Upload your photos on the Web

    To share vacation photos, for example, with your friends, several means are available to the facebookers. Click in the left column of the homepage, on "Photos", to...
  41. Re: How to protect your confidential data in Facebook

    Finding friends and making new ones

    On Facebook, intimate as casual acquaintances are all "friends". Clicking "Find Friends" (top right of the homepage) can be traced. The function "Find People...
  42. How to protect your confidential data in Facebook

    The biggest social networks offer a multitude of possibilities, but serious doubts remain about the confidentiality of your data!

    This is not nothing: Google is not the most visited site. Anyone...
  43. Re: How to create a Search Engine for your own needs

    Google Custom Search Engine Benefits

    Custom Search for your website or blog

    Provide fast and relevant search results
    Make money with AdSense for Search
    Invite your friends and...
  44. Re: How to create a Search Engine for your own needs

    Refine your engine

    After validating the creation of your engine, you go to a page corresponding to "Control Panel". Click on the name of your tool. In part "General" to change the criteria...
  45. Re: How to create a Search Engine for your own needs

    Configure your tool

    With your browser, go to the site Google Custom Search Engine. Click on the "Create a Custom Search Engine" button, located at the right top of the screen, to start the...
  46. How to create a Search Engine for your own needs

    In a few clicks, make your own search engine and target the results of your queries!

    Creating a search engine taking into account only the list of websites of your choice, it is possible and it...
  47. Replies
    4
    Views
    2,512

    Re: JAVA Fundamental: The java.io package

    Summary:

    Here is a summary of the different classes we have seen so far. However I opted for another way to classify to know the destination.

    Destination ByteStream CharacterStream...
  48. Replies
    4
    Views
    2,512

    Re: JAVA Fundamental: The java.io package

    B-2] The Writer Class

    Each input stream represents an output stream except for Class LineNumberReader. They extend all the class Writer and redefined, The method write (), method Flush () which ...
  49. Replies
    4
    Views
    2,512

    Re: JAVA Fundamental: The java.io package

    B] The Character Streams

    On common question asked - Why feed the special characters while these are binary data? The answer is that Java, unlike many other languages, use Unicode. Thus, the...
  50. Replies
    4
    Views
    2,512

    Re: JAVA Fundamental: The java.io package

    A-2] The Output Stream

    For each input stream there is an output stream. This part should not be difficult to understand as these are opposite (some what) to the classes mentioned above.

    Here...
Results 1 to 50 of 200
Page 1 of 4 1 2 3 4
Page generated in 1,711,706,435.42749 seconds with 31 queries