How to Turn Off Security Check Facebook


How to Turn Off Security Check Facebook


Facebook has implemented a variety of different security features for its users, including something called a security check. In the context of Facebook, a security check is a pop-up Captcha image (random words or letters) that appears when you attempt to add new friends or communicate with friends who aren't on your Friends list. After awhile, the security check can become a nuisance, especially if you use Facebook frequently for your business, but getting rid of it is a simple process that takes only a few minutes.

  • Log in to your Facebook account
  • Complete a task that causes the Captcha to appear, such as sending a friend request to a new friend.
  • Click the "Verify your account" link that appears in the Captcha box. This will open another pop-up window. This window will ask you to confirm your account by mobile phone number.
  • Select your country from the "Country Code" pull-down menu. Enter your mobile phone number in the "Phone Number" field and then click "Confirm." A code will be instantly sent to your mobile phone and the pop-up window will navigate to the "Confirm" window.
  • Enter the code you received via text message in the "Confirm" window's "Code" field. Click the "Confirm" button to save your changes. Your Facebook account has now been confirmed and the security check will be turned off.


Automating with Batch Files

http://nfelica.blogspot.com

If you're familiar with MS-DOS at all, you'll recall that it's a command-driven operating system that performs functions issued at the C:> prompt. The only way to get an MS-DOS computer to do something was to type a command at this prompt and if you can imagine, it was a rather cumbersome way to use a computer.

As an example, to load up Microsoft's simple editing program, you had to type the name of the drive that the program was on, the directory that the program was in, and then the name of the program. So if Microsoft Edit was in a directory or folder named "Process," you could start the program by typing, "C:>process\edit.com" Then, and only then would the program load up for use.

This is a small command, but just imagine if you had a program that was deeply nested within a series of folder. You could end up typing a command as wide as your computer screen or worse, long enough that the entire command would have to wrap onto the next line! Now imagine having to type these long commands every time that you wanted to start a program. Yikes!

That's one of the reasons why batch files became so popular. Batch files are small text-based documents that contain a bunch of these commands on their own lines. When executed, they would process each command without the user having to type each and every one of them.

When Windows was developed, the need for typing commands was essentially eradicated thanks to the introduction of the point-and-click (mouse) interface. But this didn't stop the batch file fever that started under MS-DOS - and in some small circles, batch files are still as popular as they were in the beginning.

Even though you may use Windows XP or Vista, batch files can save you tons of time by automatically starting multiple programs and performing different tasks at the single click of a button. They don't require any extensive programming background and they don't need to be encrypted with some weird, expensive compiler. Batch files are plain text files, and you can build one for your own personal use with Windows' Notepad.

You could make a batch file that loads up your favorite websites at once for example, or you could make a batch file that fills your desktop with the most important applications for the day. To do so only requires a little knowledge about the locations of these applications.

Let's say that every day we need to load up the Yahoo web browser, Microsoft Word, and then the calculator that comes with Windows. Instead of doing this by hand, we could write a batch file to do it for us.

First, we'd load up Notepad and type in the following:

START "http://www.yahoo.com"
START "c:/program files/microsoft office/office/winword.exe"
START "c:/windows/calc.exe"

We would then save this data into a file named, "mytasks.bat" onto the Desktop for easy access. Each time we double-clicked on this file, the Yahoo website would load up, Microsoft Word would start, and the simple calculator would pop up.

Since we want these programs to load every day, we could create a shortcut to this file and then place the shortcut inside our computer's Start Up folder. That way, these three programs would load every time we turn on the computer. If you wanted these programs to start minimized, you could type the following into a batch file instead:

START http://www.yahoo.com /m
START "c:/program files/microsoft office/office/winword.exe" /m
START "c:/windows/calc.exe" /m

This will run all three programs as before, however the "/m" parameter will minimize them so that they don't clutter up the desktop.

Other people have found much more creative and effective ways to use batch files, but the important thing is that you know they're a resource you can use to save a few seconds or minutes in performing important tasks. We've come a long way from MS-DOS, but it's still a valuable source of automation that anyone can use with no programming knowledge at all.

Protecting Your Children


http://nfelica.blogspot.com

It's an unfortunate fact of reality, but children are the most victimized computer users on the Internet today. The good news is that there are some practical steps you can take to protect your children from sexual predators, hackers, and other seedy individuals who want to cause harm. This article will describe a few of them.

The first step in protecting your children at the computer is to prevent their access to  passwords. This will keep them from sharing passwords with others and inadvertently enabling hacking into your system. If you think about it, there's no reason why a five, seven, or even twelve year old needs to know the passwords to sensitive areas on the computer unless you've given them permission! In fact, children don't need to know the password used to access the Internet either. It may be a hassle to type it in each time they want to get online, but it's better to know the times that they connect than to have them sneak online without your permission and knowledge of their activities.

The second step towards protecting your children online is using the computer together. Siting next to your child while he or she peruses the Internet, you can guide him or her to make safe and intelligent decisions. You can approve websites and bookmark them together. You can monitor the conversations your children have with their friends and teach them appropriate online behavior at the same time. You can make recommendations and create a private time for quality time as well.

The third step involves blocking access to inappropriate areas altogether. You and your children may not always agree about what's appropriate, but as a guardian, you're in control and you're ultimately responsible for their safety. Take the time to investigate software tools that put you in control and allow you to block access to certain websites. If you use an online service like AOL (America Online), you can use its internal Parental Control settings to block access to various chatrooms and websites. You could even block instant messaging and email from anyone who isn't a fellow AOL user.

Other tools available online operate similar to the way that AOL's Parental Control settings work, however no collection of tools could replace the reinforcement of mom and dad. Never let your children speak with strangers and never leave them alone at the computer unattended. Children just don't have the experience that adults have and they don't have the skills required to handle inappropriate conversations, emails, or images found online.

NOTE: Some of these tools include kid-specific web browsers that will visit pre-approved websites. Others include browser plug-ins that won't allow access to online areas that contain forbidden keywords.

Another step requires teaching your children to never ever volunteer personal information. Under no circumstances, should children give their personal names, home addresses, phone numbers, or school information to anyone over the Internet regardless of the situation.  In the even this information is required to enter a contest of some sort, be sure that you're the one who makes the decision to supply it and that you're the one who does it.

Performing all of these steps won't be easy. However you can help minimize resistance to your monitoring efforts by explaining why you're taking these precautions. Smaller children will probably enjoy the time you spend together at the computer, but older children and pre-teens may resent it. To help build a case for your concern, you might want to show your older children a few news stories that exemplify the dangers that unsupervised children are exposed to. The newspaper is unfortunately full of examples but with your help, we can reduce them world-wide.

Accessorizing Computers

http://nfelica.blogspot.com/2014/10/accessorizing-computers.html


Yesterday, we spent about three hours trying to convince a client of ours that brand new computers just don't come equipped with the all things that most computers need in a PC. We tried to convince him that a fully functional computer is one that is personalized with specially selected hardware and software accessories - and that the computer purchased at the store doesn't come with these things. Unfortunately, all of our convincing was to our avail. Our client insisted that he should never need more than what came with his boxed product and that we were just trying "bilk" more money out of him.

As computer consultants, it's our job and mission to make sure our clients are 100% satisfied when they walk out our offices. But our job is unnecessarily made harder when people don't take the time to learn about computer accessories and familiarize themselves with the limitations of store-bought computers. Hopefully by the time you finish reading this article, you'll understand the lesson that we were trying to teach our client: "What comes out of the box is really just a starter kit."

The typical computer package comes with a CPU unit, keyboard, mouse, and speaker set. That may be just fine for some, but most people require more than that especially in today's "connected" society. Today's users require full multimedia capabilities, a wide range of graphics tools, and accommodations for the various portables we now enjoy. These extras aren't included with "what comes out of the box," and the only way to get them is to accessorize.

To illustrate the importance of accessorizing, we like to use the "plain dough" analogy. Let's say that a brand new computer is a batch of plain dough - waiting to be flavored and baked into something useful. If we want to use this dough to make a delicious batch of chocolate chip cookies, we would need to "accessorize" this dough with chocolate chips and a little brown sugar. If we want to use this dough into in a warm loaf of sesame seed bread on the other hand, we'd need to "accessorize" the dough with yeast and sesame seeds.

Like "plain dough," the brand new computer isn't very useful by itself. It needs accessorizing.

Depending on what's needed, accessorizing doesn't need to be expensive.  In fact, you can get away with paying a minimal amount for extra software and hardware if these accessories are for children. It's when these accessories are work requirements or when they're needed to produce works of quality for any other reason that they can become rather expensive. And this expense applies to microphones, digital cameras, PDAs, scanners, video cams, and more.

Regardless of cost, it's important to understand that accessories can become "necessities," and that the best time to get them is the moment you buy a new computer. Waiting too long to accessorize can cause more problems than necessary because while you wait, manufacturers continuously develop new technologies - technologies that your computer won't be able to accommodate in the future. Once you're ready to accessorize, the new products on the market are too advanced for your computer and they just won't work. This is a typical problem experienced by those who want to use hardware designed for Windows Vista on a Windows XP or Windows 2000 machine.

Viruses

What They Are And One Reason Why People Make Them

http://nfelica.blogspot.com/2014/10/viruses.html


Over recent years, computers have become synonymous with viruses and viruses don't show any signs of disappearing any time soon. In recent news, LiveScience.com reported that "Before the month is even done, April has set a record for virus e-mails."1 In the past, we would be comfortable in telling new computer users not to worry about viruses and that catching a computer virus is rare. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention.

In short, a computer virus is a software program designed to destroy or steal data. It attacks computers via distribution - often unknowingly - through email attachments, software downloads, and even some types of advanced web scripting. Viruses that destroy data are known as Trojan horses, viruses that explode their attacks are called bombs, and viruses that duplicate themselves are called worms. Some viruses are a combination of each, however they can be further identified according to where they're located on a computer.

A virus originating from the boot sector of a computer is a boot-sector virus and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to (infects) other programs is a file virus and activates the moment that an infected program starts. File viruses may also be referred to as parasitic viruses, however should a virus work from both the boot-sector and from an infected program, the virus is then known as a multipartite virus.

Why viruses exist remains a mystery, however we had privy access to the mind behind a virus programmer who explained his motivation behind his destructive inclinations. Apparently, this person had a deep grudge against a popular online service which shall remain unnamed. In this hacker's mind, the online service failed to do a quality job in protecting children from online smut and as retaliation, he created and distributed a virus to as many file libraries of this service as he could. His intentions were to disable the computers of the online service's users so much that they wouldn't be able to connect for days. In his mind, the loss of connection meant loss of revenue for the online service.

Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null.

We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing.

To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do. Perhaps we could make an effort to educate the people who want put viruses into the public about ways to display dissatisfaction with a service or product that don't involve harming innocent parties. In doing so, we just might reduce the number of virus news stories and protect our own investments at the same time.

How to Remove Newfolder.exe Virus from your pc


How to remove Newfolder.exe virus from your pc
  • Find out all the locations of the “newfolder.exe” virus.
  • Open the task manager and end the newfolder.exe process running in background.3. Open cmd and then type “dir /a XXX” where XXX is the name of the folder where the virus is.
  • Then type “cd XXX”.
  • Delete the file by typing “del name_of_file”.
  • Then remove the whole folder by typing “rmdir /s XXX”.
  • The virus has been removed just see the task manager once again and end the newfolder.exe process running in the background (if any).
  • Restart the system and Enjoy!

How To Download Torrent Files

I prefer you to use torrentz.eu

Follow the steps. its very easy to do.
- Go to torrentz.eu


- Type your desires search in the search box and press enter.Like i did.



- Click on the desire one you want to download. I clicked on the first One.
After clicking you will be given downloading links. you can download from any source which are given.
Sources can be different.



After clicking new link will be opened and you can download your desired torrent file from that link.
After downloading your torrent file will be shown below your browser if you are using google chrome.

 Done.

How to use any browser as a text editor

You may be confused and thinking that i may be going to present a online text editing application but No I am not going present a online text editor application but i am going to present just a small script by which you can use your browser as text editor and this trick can be really helpful to you , if you computer does not have text editor or you text editor has been attacked by virus. So without wasting much time lets check this marvelous trick.
Following steps can change text editor :




Step 1:

you can open the any browser i suggeshed google chrome.

Step 2:

Type copy paste the code.
data:text/html, <html contenteditable>

Keyboard short cuts:
Ctrl  + B  This will make your selected text bold.
Ctrl  + I    This will Italicize your selected text.
Ctrl  + U  This will underline your selected text.


Indian First Blogger

Now blogging is became a full time job for all the bloggers, but you need to known the indian first blogger .
Amit Agarwal holds an Engineering degree in Computer Science from I.I.T. and has previously worked at ADP Inc. for clients like Goldman Sachs and Merrill Lynch. In 2004,Amit quit his job to become India’s first and only Professional Blogger.



Amit authors the hugely popular and award-winning Digital Inspiration blog where he write's how to guides around computer software, consumer gadgets, and web apps. He has also written columns on personal technology for major publications including The Wall Street Journal India, The Financial Express, Outlook Magazine, CNN IBN, CNBC TV18 and The Hindustan Times.
Amit has appeared on various TV channels and radio shows including CNN IBN, BBC Radio, CNBC, NDTV, and more. HT mentions Amit as the founder of the Indian blogging revolution, The Economic Times calls.

Amit is the author of The Most Useful Websites, an ebook that discusses the lesser-known but incredibly useful sites on the web.

him as an out-of-the-box thinker while the prestigious Straits Times of Singapore included Amit in their list of Asia’s Blog Stars alongside Chinese actress Xu Jinglei (see press mentions).
Amit is a regular speaker at technology and blogging conferences. Microsoft awarded him the Most Valuable Professional award for five years in a row (2007-2011).
In 2010, Amit launched India Blog School, a non-profit initiative that aims to spread blogging culture in India. He is the curator of India Blogs, a directory of Indian bloggers.
Some of his other tech projects include Sleeping Time, Hundred Zeros, Podcast Gallery, Tall Tweets,RSS Search, HTML Mail, Online Dictation and the AdSense Sandbox.

Blogging

Now a days blogging is became a good way to make money from online, once upon a time blogging is starting like a hobby but now blogging is full and part time job for the so many bloggers.



Things We Need For Blogging

  • There is no need of  qualification
  • Your hard work is main thing we need in the blogging world
  • You have to learn your self
  • Just concentrate on your blog posts
  • Never copy the posts in other blogs, always post original content in your blog
  • Do friendship with the professional blogger
  • Forget about money
  • Always think that your hardwork gain you to earn money
  • Create a blog that in which topic you are interested in and publish it on blogger or  wordpress or anything else
  • Professional bloggers are also newbie’s when they are start their blogs, so never think that  you are newbie
  • Attract the visitors with your posts
  • You need to use social networking sites too, because now a day’s social networking sites  play a major role to get a lot of traffic to your blog.. so don’t waste your time in social    networking sites, just use social networking sites for get a lot of traffic to your blog
  • If you have money then buy a custom domain, because custom domain have always good ranking.
  • Don’t post those things that you never about deeply, because sometimes its not work. so i suggest you to post what you know about deeply