Enter your email address:

Delivered by FeedBurner

Download Free Tamil Mp3 Songs | All Indian Songs FREE

Labels: ,

Did you ever wounder how to download all Indian Language Mp3 songs at single website?? Here comes your one-stop-download-portal for downloading songs, Mp3's of Tamil, Hindi, Telugu, Kannada and Malayalam movies. Also to listen to online Songs for FREE.

Why Ramulax???

  1. Download your Favourite , Latest songs, Old Songs all for Free.
    Tamil Movie songs, Tamil film music, Tamil Devotional songs, Tamil Lyrics, Tamil Top 10 countdown, Tamil new releases, CDs.

  2. Latest Tamil songs, Download tamil mp3, free tamil mp3, free online movies, , best website for tamil mp3 songs, Tamil Online radio, FM radio, Top Ten Tamil ...
  3. Tamil music site providing tamil mp3 songs, video songs, latest trailers, comedy clips, mp3 database.

  4. Tamil Movie songs, Tamil film music, Tamil Devotional songs, Tamil Lyrics, ... Login FREE

  5. Here has fine collections of Tamil new video songs and non-stop Tamil MP3 player, Tamil actor and galleries, Tamil movie news, Tamil food recipes, ...

  6. A Online Tamil Songs Portal which carries more than 46000 Tamil Songs and More than 6400 Tamil Movies.Tamil Devotional Songs,Tamil Pop Albums,Tamil Remix ...

  7. Tamil songs, Tamil Music, Tamil Radio, Tamil Movies, Non stop online Tamil radio, Tamil movie songs, devotional songs and folk songs.

  8. Free Download Tamil New movie mp3 songs old new movies video songs comedy clips watch live TV programe videos watch 100% Free stories online tamil movies.
  9. A complete Indian movie portal with latest movie reviews on Hindi, Tamil, Telugu, Kannada, Bhojpuri,Malayalam and Hollywood movies.

  10. On our website you can download Tamil songs for free. We providing this service without any cost. Thanking for your support via email.



A complete Free Song Download portal with latest on Tamil, Hindi, Telugu, Kannada and Malayalam movies.

What do the codes in your SMS mean?


Have you ever received an SMS from your bank, service provider, or a company, that has been prefixed with codes? For example: An SMS from ICICI Bank that reads: IZ-ICICIBANK. Ever wondered what these codes really mean?

Telecom Regulatory Authority of India (TRAI) introduced these codes in order to curb bulk SMS providers from unsolicited commercial communication. Now that these codes are implemented, the sender can be traced, if necessary, as these codes reveal the location, the name of the company and the service provider.

This is how the code should look like:
XY-name of the company

X = Code of the service provider

Y = Location

Which means, IZ-ICICIBANK would be:

I = Idea Cellular (service provider)

Z = Maharashtra (location)

So, I am sure next time you get an SMS with a code like this, you’ll know what it is

Complete programming tutorials - Bookmark for sure


Many newbie programmers search a lot for tutorials pages to learn some codings starting from "Hello world" to some advance programming and to put an end this , here is a complete tutorial of almost all programming language in a single page. Do bookmark this page for future reference.

Introduction to C Programming
C Optimization Tutorial
Compiling C and C++ Programs on UNIX Systems - gcc/g++
Building and Using Static and Shared C Libraries
Programming in C: UNIX System Calls and Subroutines Using C
C Programming Class Notes
ANSI C for Programmers on UNIX Systems
Sams Teach Yourself C in 24 Hours
Sams Teach Yourself C in 21 Days (4th Ed.)
The Standard C Library for Linux - Part 1: file functions
The Standard C Library for Linux - Part 2: character input/output
The Standard C Library for Linux - Part 3: formatted input/output
The Standard C Library for Linux - Part 4: Character Handling
The Standard C Library for Linux - Part 5: Miscellaneous Functions
Programming in C: A Tutorial
An Introduction to C Development on Linux
C Programming Course
C Language Tutorial
CScene: An Online Magazine for C and C++ Programming
Enterprise JavaBeans Tutorial
JavaBeans Short Course
Introduction to the JavaBeans API
JDBC Short Course
Essentials of the Java Programming Language, Part 1
Essentials of the Java Programming Language, Part 2
Writing Advanced Applications for the Java Platform
Fundamentals of Java Security
Fundamentals of Java Servlets
Introduction to the Collections Framework
Introduction to CORBA
Fundamentals of RMI
Java Language Specification
Java Tutorial: Servlet Trail
Java Virtual Machine Specification (2nd Ed.)
Glossary of Java and Related Terms
The Java Language Environment
Java Look and Feel Design Guidelines
Story of a Servlet: An Instant Tutorial
Introduction to Java
Java2D: An Introduction and Tutorial
Java Servlet Tutorial
comp.lang.java FAQ
Brewing Java: A Tutorial
Shlurrrppp ... Java: The First User-Friendly Tutorial on Java
Swing Tutorial
Swing: A Quick Tutorial for AWT Programmers
Thinking in Java
Java RMI Tutorial
Java for C++ Programmers
The Advanced Jav/aJ2EE Tutorial
Hacking Java: The Java Professional's Resource Kit
JFC Unleashed
Java Developer's Guide
Java Developer's Reference
Sams Teach Yourself Java in 21 Days (Professional Reference Ed.)
Java Unleashed (2nd Ed.)
Java 1.1 Unleashed (3rd Ed.)
Java Game Programming Tutorial
Java Networking FAQ
Java Tutorial: A Practical Guide for Programmers
Sockets Programming in Java
Programming with Java - Part I
Programming with Java - Part II
Setting Up a Java Development Environment for Linux
Understanding Java
Beginner's Guide to JDK
GUI Development in Java
Java Servlets: An introduction to writing and running Java servlets on Linux
The Soar 8 Tutorial Home Page

Source : smashtech

Stuff people put on their resumes - Funny

Labels: ,

I don't know who put this list together, but according to the source, these are all real, none of them are made up.

1. I am very detail-oreinted.

2. My intensity and focus are at inordinately high levels, and my ability to complete projects on time is unspeakable.

3. Thank you for your consideration. Hope to hear from you shorty!

4. Enclosed is a ruff draft of my resume.

5. It’s best for employers that I not work with people.

6. Here are my qualifications for you to overlook.

7. I am a quick leaner, dependable, and motivated.

8. If this resume doesn’t blow your hat off, then please return it in the enclosed envelope.

9. My fortune cookie said, “Your next interview will result in a job.” And I like your company in particular.

10. I saw your ad on the information highway, and I came to a screeching halt.

11. Insufficient writing skills, thought processes have slowed down some. If I am not one of the best, I will look for another opportunity.

12. Please disregard the attached resume-it is terribly out of date.

13. Seek challenges that test my mind and body, since the two are usually inseparable.

14. Graduated in the top 66% of my class.

15. Reason for leaving last job: The owner gave new meaning to the word paranoia. I prefer to elaborate privately.

16. Previous experience: Self-employed-a fiasco.

17. Exposure to German for two years, but many words are inappropriate for business.

18. Experience: Watered, groomed, and fed the family dog for years.

19. I am a rabid typist.

20. I have a bachelorette degree in computers.

21. Excellent memory; strong math aptitude; excellent memory; effective management skills; and very good at math.

22. Strengths: Ability to meet deadlines while maintaining composer.

23. I worked as a Corporate Lesion.

24. Reason for leaving last job: Pushed aside so the vice president’s girlfriend could steal my job.

25. Married, eight children. Prefer frequent travel.

26. Objective: To have my skills and ethics challenged on a daily basis.

27. Special skills: Thyping.

28. My ruthlessness terrorized the competition and can sometimes offend.

29. I can play well with others.

30. Personal Goal: To hand-build a classic cottage from the ground up using my father-in-law.

31. Objective: I want a base salary of $50-$60,000 dollars, not including bonus. And some decent benefits. Like a retirement plan, health insurance, personal or sick days.

32. Experience: Provided correct answers to customers’ questions.

33. Education: Graduated from predatory school with honors.

34. Never been fired, although it could happen anytime now.

35. I have happily been a “kept man” for the past 10 years.

36. Have extensive experience in turkey manufactures as well as new product development and implementation.

37. I am accustomed to speaking in front of all kinds of audiences. I make points as well as I can.

38. Personal: Five children. Dog: Jasper. Cat: Morris. Gerbil: Binky.

39. While in military, was instrumental in creation of a treat detection system.

40. My compensation package at my last job included a base salary of $64,500 with excellent benefits including flextime. I am looking for a position in which I can work a more flexible schedule.

41. Hire me and you won’t regret it - I am funny, cute, smart and creative… really.

42. Referees available upon request.

43. Previous rank: Senior instigator.

44. I have recently sold my home and I now live in a large RV so I will be able to relocate quickly.

45. Reason for leaving: They stopped paying me.

46. Cover letter: Desire the chance to showcase my delightful personality, intelligence and superior judgment, which are so hard to find these days.

47. Personal achievements: Successfully played “Chop Sticks” on a toy piano with my big toes.

48. Objective: To obtain a position where I can make a difference, infecting others with my professionalism, enthusiasm and dedication.

49. Strengths: Impersonal skills.

50. Special interests: I like any projects that are fun.

51. Please explain any breaks in your employment career: 15 minute coffee break while working at a home improvement store.

52. Vocational plans: Sea World.

Source : Madconomist

Copy Text from Image - Free tool JOCR


How many times you have felt the need to copy text from images ? I am sure wont be less then ten times. Most of the time, when we require the Text part from images we just start typing the whole Text part by referring to the image. This seems to be only option we have.

But guess what if its whole scanned document do you think of typing whole document as viable solution? if not then here good freeware application JOCR which enables you to capture the image on the screen and convert the captured image to text.

JOCR is useful tool to revive the protected files whose text can not be copied. JOCR enables you to copy text from any files and images on the screen such as protected Web pages, PDF files, error messages. The program offers several capture modes.

Screenshot of JOCR Image Capture and Character Recognition Tool

JOCR requires Microsoft Office 2003 or higher version. If JCOR does not work, please manually install “Microsoft Office Document Imaging” (MODI) that is included in the setup file of Microsoft Office. You can find MODI under “Office Tools” of the setup file.

Download JOCR Image Capture and Character Recognition Tool

Source: BlogDNA [Techsurface]

Protect your system from virus that spreads on April Fool's day


W32.Downadup is a worm that propagates on local and network drives by taking advantage of the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability. W32.Downadup also create its own Service on Windows to run itself each time Windows is started.

Other Alias: Win32/Conficker.A, W32/Downadup.A, Conficker.A, Net-Worm.Win32.Kido.bt

We have a tool from Symantec to remove this virus
How to download and run the tool

Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.

Follow these steps to download and run the tool:

1. Download the FixDwndp.exe file from: here.
2. Save the file to a convenient location, such as your Windows desktop.
3. Close all the running programs.
4. If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
5. If you are running Windows Me or XP, turn off System Restore. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
Locate the file that you just downloaded.
6. Double-click the FixDwndp.exe file to start the removal tool.
7. Click Start to begin the process, and then allow the tool to run.
NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.

8. Restart the computer.
9. Run the removal tool again to ensure that the system is clean.
10. If you are running Windows Me/XP, then re enable System Restore.
11. If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.
12. Run Live Update to make sure that you are using the most current virus definitions.

When the tool has finished running, you will see a message indicating whether the threat has infected the computer. The tool displays results similar to the following:

* Total number of the scanned files
* Number of deleted files
* Number of repaired files
* Number of terminated viral processes
* Number of fixed registry entries

What the tool does
The Removal Tool does the following:

* Terminates the associated processes
* Deletes the associated files
* Deletes the registry values added by the threat

Source : Karunya Intranet

Free Kaspersky AntiVirus for Windows 7

Labels: ,

Kaspersky Lab releases technical preview of Kaspersky Anti-Virus for Windows 7
Kaspersky Lab, a leading developer of secure content management systems, announces the release of a technical prototype of Kaspersky Anti-Virus for Windows 7.

Windows 7 is the next release of the Microsoft Windows operating system which will replace Windows Vista and is a step forward in the development of Microsoft operating systems. The new OS will incorporate enhanced reliability, greater efficiency, an improved interface and extended working features both in global and local information networks.

The technical preview is a complex solution for securing computers running under Windows 7. The prototype includes not only an antivirus component but an effective and fully functional firewall and anti-spam filter.

At the heart of the new technical prototype is Kaspersky Lab’s new antivirus engine which is even more effective at detecting malicious programs than its predecessor. The new engine dramatically increases system scanning speed thanks to improved processing of objects and optimized use of system resources, particularly on dual- and quad-core processor platforms. The unique product architecture ensures high productivity and one of the lowest uses of system resources in the industry.

The technical preview includes a highly effective heuristic analyzer. The heuristic analyzer detects and blocks as yet unknown malicious programs. If a program signature is not included in the antivirus databases, i.e., the malicious program is unknown, the heuristic analyzer will safely launch the program in an isolated virtual environment, analyze the program’s actions and conclude with a high degree of probability whether it is potentially harmful before it is launched in a live environment.

In addition, the technical prototype includes a new user interface developed to meet the needs of both inexperienced and advanced users.


Technical Preview for Microsoft Windows 7 (exe)

Source : Kaspersky Lab

View your friends' birthdays in Google Calendar


Orkut Binds Google Calender with the friends birthday on a easy click.

If you are a regular Google Calendar user this update is very useful for reminding you, your friends birthdays.

An update from Orkut now allows you to add your Orkut friends birthdays in Google Calendar. You would find a link below the "Upcoming "Birthdays" section. Just click it and add.

Just noticed on Orkut’s upcoming birthday section a link saying - “view your friends’ birthdays in Google Calendar”

There are few advantages of this integration because Google Calender
1. Can send birthday reminder via SMS/Email
2. Can be synced with other services/softwares like outlook on Windows, iCal on Mac, etc.
3. Have official API which can be used to develop third-party applications

There may be more to it! Let us know, if you can figure it out!

Soon Google Voice


Google just started to release a preview of Google Voice, an application that helps you better manage your voice communications. Google Voice will be available initially to existing users of GrandCentral, a service we acquired in July of 2007.Google Voice is currently open only for GrandCentral users. Learn More

The new application improves the way you use your phone. You can get transcripts of your voicemail (see the video below) and archive and search all of the SMS text messages you send and receive. You can also use the service to make low-priced international calls and easily access Goog-411 directory assistance.

Check out the features page for videos and more information on how these features work.

Analysis of IMEI numbers


Analysis of IMEI numbers

All mobile phones are assigned a unique 15 digit IMEI code upon production. Below you can check all known information regarding manufacturer, model type, and country of approval of a handset.

Tip! The IMEI can be displayed on most mobile handsets by dialling *#06#. Otherwise check the compliance plate under the battery.

Enter IMEI number below


Visit here

Chinese mobiles Soon Ban in India !


The International Mobile Equipment Identity or IMEI is a number unique to every GSM and WCDMA mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery. It can be found by typing *#06# on a handset.

The IMEI number is used by the GSM network to identify valid devices and therefore can be used to stop a stolen phone from accessing the network.
For example,
If a mobile phone is stolen, the owner can call his or her network provider and instruct them to "ban" the phone using its IMEI number. This renders the phone useless, whether or not the phone's SIM is changed.

Cyber crime experts explains that, Chinese phones comes without Bill and Warranty, and are pirated, without being equipped with IMEI number, which are helpful for tracing mobiles. As these phones are not equipped with IMEI number, they can easily be used by anti-social elements, proving dangerous to the Nation’s security.

To, those who already have a Chinese handset, do not panic, just wait till any such official notification is out by TRAI or DoT.

Print It or Save As PDF

Print Posts