Did you ever wounder how to download all Indian Language Mp3 songs at single website?? Here comes your one-stop-download-portal for downloading songs, Mp3's of Tamil, Hindi, Telugu, Kannada and Malayalam movies. Also to listen to online Songs for FREE.
- Download your Favourite , Latest songs, Old Songs all for Free.
Tamil Movie songs, Tamil film music, Tamil Devotional songs, Tamil Lyrics, Tamil Top 10 countdown, Tamil new releases, CDs.
- Latest Tamil songs, Download tamil mp3, free tamil mp3, free online movies, , best website for tamil mp3 songs, Tamil Online radio, FM radio, Top Ten Tamil ...
- Tamil music site providing tamil mp3 songs, video songs, latest trailers, comedy clips, mp3 database.
- Tamil Movie songs, Tamil film music, Tamil Devotional songs, Tamil Lyrics, ... Login FREE
- Here has fine collections of Tamil new video songs and non-stop Tamil MP3 player, Tamil actor and galleries, Tamil movie news, Tamil food recipes, ...
- A Online Tamil Songs Portal which carries more than 46000 Tamil Songs and More than 6400 Tamil Movies.Tamil Devotional Songs,Tamil Pop Albums,Tamil Remix ...
- Tamil songs, Tamil Music, Tamil Radio, Tamil Movies, Non stop online Tamil radio, Tamil movie songs, devotional songs and folk songs.
- Free Download Tamil New movie mp3 songs old new movies video songs comedy clips watch live TV programe videos watch 100% Free stories online tamil movies.
- A complete Indian movie portal with latest movie reviews on Hindi, Tamil, Telugu, Kannada, Bhojpuri,Malayalam and Hollywood movies.
- On our website you can download Tamil songs for free. We providing this service without any cost. Thanking for your support via email.
A complete Free Song Download portal with latest on Tamil, Hindi, Telugu, Kannada and Malayalam movies.
Thursday, May 28, 2009 | 0 Comments
Have you ever received an SMS from your bank, service provider, or a company, that has been prefixed with codes? For example: An SMS from ICICI Bank that reads: IZ-ICICIBANK. Ever wondered what these codes really mean?
Telecom Regulatory Authority of India (TRAI) introduced these codes in order to curb bulk SMS providers from unsolicited commercial communication. Now that these codes are implemented, the sender can be traced, if necessary, as these codes reveal the location, the name of the company and the service provider.
This is how the code should look like:
XY-name of the company
X = Code of the service provider
Y = Location
Which means, IZ-ICICIBANK would be:
I = Idea Cellular (service provider)
Z = Maharashtra (location)
So, I am sure next time you get an SMS with a code like this, you’ll know what it is
Wednesday, May 20, 2009 | 0 Comments
Many newbie programmers search a lot for tutorials pages to learn some codings starting from "Hello world" to some advance programming and to put an end this , here is a complete tutorial of almost all programming language in a single page. Do bookmark this page for future reference.
Introduction to C Programming
C Optimization Tutorial
Compiling C and C++ Programs on UNIX Systems - gcc/g++
Building and Using Static and Shared C Libraries
Programming in C: UNIX System Calls and Subroutines Using C
C Programming Class Notes
ANSI C for Programmers on UNIX Systems
Sams Teach Yourself C in 24 Hours
Sams Teach Yourself C in 21 Days (4th Ed.)
The Standard C Library for Linux - Part 1: file functions
The Standard C Library for Linux - Part 2: character input/output
The Standard C Library for Linux - Part 3: formatted input/output
The Standard C Library for Linux - Part 4: Character Handling
The Standard C Library for Linux - Part 5: Miscellaneous Functions
Programming in C: A Tutorial
An Introduction to C Development on Linux
C Programming Course
C Language Tutorial
CScene: An Online Magazine for C and C++ Programming
Understanding C++: An Accelerated Introduction
An Introduction to C++ Class Hierarchies
Introduction to Object-Oriented Programming Using C++
Compiling C and C++ Programs on UNIX Systems - gcc/g++
C++ FAQ Lite
C++ Programming Language Tutorials
Reducing Dependencies in C++
C++ Exception Handling
Part 1: Unicode
Part 2: A Complete String Class
Making C++ Loadable Modules Work
Sams Teach Yourself C++ in 21 Days (2nd Ed.)
C++ Portability Guide
C++ Language Tutorial
CScene: An Online Magazine for C and C++ Programming
C++ Libraries FAQ
CGI Programming Tutorial
CGI Programming 101
CGI Manual of Style
CGI Developer's Guide
CGI Programming Unleashed
Sams Teach Yourself CGI Programming with Perl 5 in a Week (2nd Ed.)
CGI/Perl Tips, Tricks and Hints
A Tour of HTML Forms and CGI Scripts
Reading CGI Data: URL-Encoding and the CGI Protocol
CGI Programming FAQ
A Brief Tutorial on CORBA
CORBA 2.0 Specification
Sams Teach Yourself CORBA in 14 Days
Linux Network Programming, Part 3 - CORBA: The Software Bus
CORBA Program Development, Part 1
CORBA Program Development, Part 2
CORBA Program Development, Part 3
Emacs: The Software Engineer's ``Swiss Army Knife''
GNU Emacs Lisp Reference Manual
Programming in Emacs Lisp
GNU Emacs Manual
A Tutorial Introduction to Emacs
EMACSulation: Ediff - An Emacs interface to diff and patch
EMACSulation: Emacs as a Server
EMACSulation: Customizing Emacs
EMACSulation: Templating Mechanisms
Emacs Macros and the Power-Macros Package
Polyglot Emacs 20.4
Advanced Programming in Expect: A Bulletproof Interface
Automating Tasks with Expect
What Can you Expect?--A Data Collection Project Using Linux
Professional Programmer's Guide to Fortran 77
Fortran 90 and Computational Science
User Notes on Fortran Programming
Fortran Programming for Physics and Astronomy
A Fortran 90 Tutorial
Using GNU Fortran
Fortran 90: A Course for Fortran 77 Programmers
Fortran 90 for the Fortran 77 Programmer
Introduction to Fortran
GIMP Tutorial Index
A Tutorial for Perl GIMP Users
A Scheme Tutorial for GIMP Users
The GIMP User Manual
Pseudo 3-D with GIMP
Graphical Photocomposition with GIMP
Creating Text with the GIMP
Creating Fire Effects with the GIMP
Creating and Editing Animations with GIMP
GIMP-Perl: GIMP Scripting for the Rest of Us
Writing a GIMP Plugin
GIMP: The RRU Tutorial
GIMP User FAQ
The Quick Start Guide to the GIMP, Part 1
The Quick Start Guide to the GIMP, Part 2
The Quick Start Guide to the GIMP, Part 3
The Quick Start Guide to the GIMP, Part 4
Application Programming Using the GNOME Libraries
Part 1: Everything You Need to Get Started
Part 2: Building a Sample Genealogy Program
Part 3: Adding File Saving and Loading Using libxml
Creating GTK+ Widgets with GOB: An Easier Way to Derive New GTK+ Widgets
Handling Multipel Documents: Using the GnomeMDI Framework
Livening Things Up: Graphics Made Easy Using the GNOME Canvas
Developing Gnome Applications with Python - Part 1
GDK Reference Manual
GLib Reference Manual
GTK+ Reference Manual
The GIMP Toolkit
GTK V1.2 Tutorial
Drawing and Event Handling in GTK
An Introduction to the GIMP Tool Kit
Differential Equation Basics
Energy Functions and Stiffness
Particle System Dynamics
An Introduction to Physically Based Modeling
Rigid Body Dynamics I
Rigid Body Dynamics II
Scientific Visualization Tutorials
Gnuplot - An Interactive Plotting Program
GIF Animation Tutorial
HTML Table Tutorial
HTML by Example
How to Use HTML 3.2
Creating a Client-Side Image Map
Advanced HTML: How to Create Complex Multimedia Documents for the Web
The ABCs of HTML
Sharky's Netscape Frames Tutorial
ILU Reference Manual
Using ILU with ANSI C: A Tutorial
Using ILU with Java: A Tutorial
Using ILU with Python: A Tutorial
ipchains: Packet Filtering for Linux 2.2
Setting Up IP Masquerade
Setting Up IP-Masquerading
Ipchains: Easy Links to the Net
Linux Networking Using Ipchains
Enterprise JavaBeans Tutorial
JavaBeans Short Course
Introduction to the JavaBeans API
JDBC Short Course
Essentials of the Java Programming Language, Part 1
Essentials of the Java Programming Language, Part 2
Writing Advanced Applications for the Java Platform
Fundamentals of Java Security
Fundamentals of Java Servlets
Introduction to the Collections Framework
Introduction to CORBA
Fundamentals of RMI
Java Language Specification
Java Tutorial: Servlet Trail
Java Virtual Machine Specification (2nd Ed.)
Glossary of Java and Related Terms
The Java Language Environment
Java Look and Feel Design Guidelines
Story of a Servlet: An Instant Tutorial
Introduction to Java
Java2D: An Introduction and Tutorial
Java Servlet Tutorial
Brewing Java: A Tutorial
Shlurrrppp ... Java: The First User-Friendly Tutorial on Java
Swing: A Quick Tutorial for AWT Programmers
Thinking in Java
Java RMI Tutorial
Java for C++ Programmers
The Advanced Jav/aJ2EE Tutorial
Hacking Java: The Java Professional's Resource Kit
Java Developer's Guide
Java Developer's Reference
Sams Teach Yourself Java in 21 Days (Professional Reference Ed.)
Java Unleashed (2nd Ed.)
Java 1.1 Unleashed (3rd Ed.)
Java Game Programming Tutorial
Java Networking FAQ
Java Tutorial: A Practical Guide for Programmers
Sockets Programming in Java
Programming with Java - Part I
Programming with Java - Part II
Setting Up a Java Development Environment for Linux
Beginner's Guide to JDK
GUI Development in Java
Java Servlets: An introduction to writing and running Java servlets on Linux
Common Lisp Hints
Common Lisp the Language (2nd Ed.)
Lisp Programming Tutorial
Common Lisp HyperSpec
An MPI Tutorial
Tutorial on MPI
MPI: Portable Parallel Programming for Scientific Computing
Tuning MPI Applications for Peak Performance
MPI: From Fundamentals to Applications
MPI: The Complete Reference
Introduction to Parallel Programming Using MPI
Basics of MPI Programming
The Soar 8 Tutorial Home Page
Source : smashtech
Monday, April 06, 2009 | 0 Comments
I don't know who put this list together, but according to the source, these are all real, none of them are made up.
1. I am very detail-oreinted.
2. My intensity and focus are at inordinately high levels, and my ability to complete projects on time is unspeakable.
3. Thank you for your consideration. Hope to hear from you shorty!
4. Enclosed is a ruff draft of my resume.
5. It’s best for employers that I not work with people.
6. Here are my qualifications for you to overlook.
7. I am a quick leaner, dependable, and motivated.
8. If this resume doesn’t blow your hat off, then please return it in the enclosed envelope.
9. My fortune cookie said, “Your next interview will result in a job.” And I like your company in particular.
10. I saw your ad on the information highway, and I came to a screeching halt.
11. Insufficient writing skills, thought processes have slowed down some. If I am not one of the best, I will look for another opportunity.
12. Please disregard the attached resume-it is terribly out of date.
13. Seek challenges that test my mind and body, since the two are usually inseparable.
14. Graduated in the top 66% of my class.
15. Reason for leaving last job: The owner gave new meaning to the word paranoia. I prefer to elaborate privately.
16. Previous experience: Self-employed-a fiasco.
17. Exposure to German for two years, but many words are inappropriate for business.
18. Experience: Watered, groomed, and fed the family dog for years.
19. I am a rabid typist.
20. I have a bachelorette degree in computers.
21. Excellent memory; strong math aptitude; excellent memory; effective management skills; and very good at math.
22. Strengths: Ability to meet deadlines while maintaining composer.
23. I worked as a Corporate Lesion.
24. Reason for leaving last job: Pushed aside so the vice president’s girlfriend could steal my job.
25. Married, eight children. Prefer frequent travel.
26. Objective: To have my skills and ethics challenged on a daily basis.
27. Special skills: Thyping.
28. My ruthlessness terrorized the competition and can sometimes offend.
29. I can play well with others.
30. Personal Goal: To hand-build a classic cottage from the ground up using my father-in-law.
31. Objective: I want a base salary of $50-$60,000 dollars, not including bonus. And some decent benefits. Like a retirement plan, health insurance, personal or sick days.
32. Experience: Provided correct answers to customers’ questions.
33. Education: Graduated from predatory school with honors.
34. Never been fired, although it could happen anytime now.
35. I have happily been a “kept man” for the past 10 years.
36. Have extensive experience in turkey manufactures as well as new product development and implementation.
37. I am accustomed to speaking in front of all kinds of audiences. I make points as well as I can.
38. Personal: Five children. Dog: Jasper. Cat: Morris. Gerbil: Binky.
39. While in military, was instrumental in creation of a treat detection system.
40. My compensation package at my last job included a base salary of $64,500 with excellent benefits including flextime. I am looking for a position in which I can work a more flexible schedule.
41. Hire me and you won’t regret it - I am funny, cute, smart and creative… really.
42. Referees available upon request.
43. Previous rank: Senior instigator.
44. I have recently sold my home and I now live in a large RV so I will be able to relocate quickly.
45. Reason for leaving: They stopped paying me.
46. Cover letter: Desire the chance to showcase my delightful personality, intelligence and superior judgment, which are so hard to find these days.
47. Personal achievements: Successfully played “Chop Sticks” on a toy piano with my big toes.
48. Objective: To obtain a position where I can make a difference, infecting others with my professionalism, enthusiasm and dedication.
49. Strengths: Impersonal skills.
50. Special interests: I like any projects that are fun.
51. Please explain any breaks in your employment career: 15 minute coffee break while working at a home improvement store.
52. Vocational plans: Sea World.
Source : Madconomist
Sunday, April 05, 2009 | 0 Comments
How many times you have felt the need to copy text from images ? I am sure wont be less then ten times. Most of the time, when we require the Text part from images we just start typing the whole Text part by referring to the image. This seems to be only option we have.
But guess what if its whole scanned document do you think of typing whole document as viable solution? if not then here good freeware application JOCR which enables you to capture the image on the screen and convert the captured image to text.
JOCR is useful tool to revive the protected files whose text can not be copied. JOCR enables you to copy text from any files and images on the screen such as protected Web pages, PDF files, error messages. The program offers several capture modes.
Screenshot of JOCR Image Capture and Character Recognition Tool
JOCR requires Microsoft Office 2003 or higher version. If JCOR does not work, please manually install “Microsoft Office Document Imaging” (MODI) that is included in the setup file of Microsoft Office. You can find MODI under “Office Tools” of the setup file.
Download JOCR Image Capture and Character Recognition Tool
Source: BlogDNA [Techsurface]
Friday, April 03, 2009 | 0 Comments
W32.Downadup is a worm that propagates on local and network drives by taking advantage of the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability. W32.Downadup also create its own Service on Windows to run itself each time Windows is started.
Other Alias: Win32/Conficker.A, W32/Downadup.A, Conficker.A, Net-Worm.Win32.Kido.bt
We have a tool from Symantec to remove this virus
How to download and run the tool
Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.
Follow these steps to download and run the tool:
1. Download the FixDwndp.exe file from: here.
2. Save the file to a convenient location, such as your Windows desktop.
3. Close all the running programs.
4. If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
5. If you are running Windows Me or XP, turn off System Restore. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
Locate the file that you just downloaded.
6. Double-click the FixDwndp.exe file to start the removal tool.
7. Click Start to begin the process, and then allow the tool to run.
NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.
8. Restart the computer.
9. Run the removal tool again to ensure that the system is clean.
10. If you are running Windows Me/XP, then re enable System Restore.
11. If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.
12. Run Live Update to make sure that you are using the most current virus definitions.
When the tool has finished running, you will see a message indicating whether the threat has infected the computer. The tool displays results similar to the following:
* Total number of the scanned files
* Number of deleted files
* Number of repaired files
* Number of terminated viral processes
* Number of fixed registry entries
What the tool does
The Removal Tool does the following:
* Terminates the associated processes
* Deletes the associated files
* Deletes the registry values added by the threat
Source : Karunya Intranet
Monday, March 30, 2009 | 0 Comments
Kaspersky Lab releases technical preview of Kaspersky Anti-Virus for Windows 7
Kaspersky Lab, a leading developer of secure content management systems, announces the release of a technical prototype of Kaspersky Anti-Virus for Windows 7.
Windows 7 is the next release of the Microsoft Windows operating system which will replace Windows Vista and is a step forward in the development of Microsoft operating systems. The new OS will incorporate enhanced reliability, greater efficiency, an improved interface and extended working features both in global and local information networks.
The technical preview is a complex solution for securing computers running under Windows 7. The prototype includes not only an antivirus component but an effective and fully functional firewall and anti-spam filter.
At the heart of the new technical prototype is Kaspersky Lab’s new antivirus engine which is even more effective at detecting malicious programs than its predecessor. The new engine dramatically increases system scanning speed thanks to improved processing of objects and optimized use of system resources, particularly on dual- and quad-core processor platforms. The unique product architecture ensures high productivity and one of the lowest uses of system resources in the industry.
The technical preview includes a highly effective heuristic analyzer. The heuristic analyzer detects and blocks as yet unknown malicious programs. If a program signature is not included in the antivirus databases, i.e., the malicious program is unknown, the heuristic analyzer will safely launch the program in an isolated virtual environment, analyze the program’s actions and conclude with a high degree of probability whether it is potentially harmful before it is launched in a live environment.
In addition, the technical prototype includes a new user interface developed to meet the needs of both inexperienced and advanced users.
Source : Kaspersky Lab
Sunday, March 29, 2009 | 0 Comments
Orkut Binds Google Calender with the friends birthday on a easy click.
If you are a regular Google Calendar user this update is very useful for reminding you, your friends birthdays.
An update from Orkut now allows you to add your Orkut friends birthdays in Google Calendar. You would find a link below the "Upcoming "Birthdays" section. Just click it and add.
Just noticed on Orkut’s upcoming birthday section a link saying - “view your friends’ birthdays in Google Calendar”
There are few advantages of this integration because Google Calender
1. Can send birthday reminder via SMS/Email
2. Can be synced with other services/softwares like outlook on Windows, iCal on Mac, etc.
3. Have official API which can be used to develop third-party applications
There may be more to it! Let us know, if you can figure it out!
Monday, March 16, 2009 | 0 Comments
Google just started to release a preview of Google Voice, an application that helps you better manage your voice communications. Google Voice will be available initially to existing users of GrandCentral, a service we acquired in July of 2007.Google Voice is currently open only for GrandCentral users. Learn More
The new application improves the way you use your phone. You can get transcripts of your voicemail (see the video below) and archive and search all of the SMS text messages you send and receive. You can also use the service to make low-priced international calls and easily access Goog-411 directory assistance.
Check out the features page for videos and more information on how these features work.
Thursday, March 12, 2009 | 0 Comments
Analysis of IMEI numbers
All mobile phones are assigned a unique 15 digit IMEI code upon production. Below you can check all known information regarding manufacturer, model type, and country of approval of a handset.
Tip! The IMEI can be displayed on most mobile handsets by dialling *#06#. Otherwise check the compliance plate under the battery.
Sunday, March 08, 2009 | 0 Comments
The International Mobile Equipment Identity or IMEI is a number unique to every GSM and WCDMA mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery. It can be found by typing *#06# on a handset.
The IMEI number is used by the GSM network to identify valid devices and therefore can be used to stop a stolen phone from accessing the network.
If a mobile phone is stolen, the owner can call his or her network provider and instruct them to "ban" the phone using its IMEI number. This renders the phone useless, whether or not the phone's SIM is changed.
Cyber crime experts explains that, Chinese phones comes without Bill and Warranty, and are pirated, without being equipped with IMEI number, which are helpful for tracing mobiles. As these phones are not equipped with IMEI number, they can easily be used by anti-social elements, proving dangerous to the Nation’s security.
To, those who already have a Chinese handset, do not panic, just wait till any such official notification is out by TRAI or DoT.
Sunday, March 08, 2009 | 0 Comments