http://onlinecasino.us/ Send Free SMS Worldwide,Earn Money,Download Game Software: 2009

শনিবার, ১৪ নভেম্বর, ২০০৯

শুক্রবার, ১৩ নভেম্বর, ২০০৯

Free SMS to Mobile

Anyone can send free sms to some countries of the world from the following site:

http://www.160by2.com/

Free SMS Worldwide

Send Free sms to some countries by this website:

http://www.sendation.de/

Free SMS Site

Free SMS site:

www.awalsms.com

Free SMS Site

Free SMS site:

www.teck.in

Free SMS Worldwide

Send Free sms From the following site:

www.teck.in

Free SMS to Mobile

Free sms site name:
www.textmefree.com

Free SMS

Send free sms worldwide from this site now:
www.sms1.in

Free SMS Site

Send free sms from following site today at worldwide:

www.hot.it/sms
Free sms site:

www.smsfree4all.com

Free SMS Site

Free sms site:

www.sendsmsnow.com

Free SMS Site

Free sms site:

www.sendsmsnow.com

Free SMS Site

Free sms site:

www.quick-sms.de

Free SMS

Free sms site:

www.sendsmsnow.com

Free sms

Free Sms site:

www.youtring.com/free-international-sms.aspx

Free SMS Sending

Free sms site:

www.open-sms.net

Free sms

another free sms site:

www.seasms.com

বুধবার, ১১ নভেম্বর, ২০০৯

free sms

free sms(worldwide) sites are given below:

www.wadja.com

শুক্রবার, ২৩ অক্টোবর, ২০০৯

Dhaka University

University is a place to churn out finished manpower .It is the factory where our workforce is shaped.It is also a place where individuals spruce themselves up not only for their career but also for their decent social life as the best citizens of the country .Regrettably the situation in Bangladesh is quite different.Funnily enough ,when we walk around the campus of DU,we routinely have some unpleasant experience .Lunatics and drug-addicts occupy large stretches of the pavement.They happen to take shelter on the sidewalks and usually relieve themselves here and there which creates stinking smell and contributes to the unhygienic atmosphere.Moreover students and outsiders tend to throw garbage such as wrappers ,paper,bottles etc here and there since there are no specific dustbins inside the campus.During the rain ,fetid and stagnant water worsens the situations .We know academic activities are partially hampered if hygiene issue is given short shrift.

বুধবার, ১৬ সেপ্টেম্বর, ২০০৯

Free Software download

anyone can download free internet cafe manager from the following link:

http://www.blogcatalog.com/blog/free-software-download-free-licensed-software-freeware-software/e0f6661828bc0b641185ccd554c9e0f5

মঙ্গলবার, ১৫ সেপ্টেম্বর, ২০০৯

Freeware,Shareware Software Download

Computer security is a major problem of the day. There are uncountable security risks especially while you are surfing on internet. Without internet life is dump but unfortunately internet is a major source to spreading Computer viruses, Malwares, Trojans and Spywares so we are bound to use internet. These softwares are harmful and can damage your security. On one side many Viruses, Malwares, Trojans and Spywares are working while other side many Anti-Viruses, Anti Spywares and Anti Trojans are available to fight against security risks. Viruses can damage your data files and data files are much more important for corporate users and developers. Spywares can take and store your personal information and send to others. Trojans are more harmful or in other words Trojans are advanced form of Spywares. Trojans collect your personal information including your typed passwords and credit card information and send to others, this kind of information certainly harmful for everyone so you need to install security software like Anti Virus, Anti Spyware and Anti Trojans.

I have generated list of some good and famous antivirus list. You can choose any antivirus for you.

AVG Antivrus Free Official Site:http://free.avg.com/
Avast Antivrus Free for non-Commercials Official Site :http://www.avast.com/eng/avast_4_home.html
Comodo Antivirus Free Official Site:http://antivirus.comodo.com/
McAfee Antivirus Paid Official Site :http://www.mcafee.com/us/
Norton Antivirus Paid Official Site: http://www.symantec.com/norton/products/overview.jsp?pcid=is&pvid=nav2008
Only antivirus is not enough to secure your computer. You have to install anti spyware and enable firewalls on your system. We also generated list of some firewalls.Anybody can download it from those sites now.

শনিবার, ১২ সেপ্টেম্বর, ২০০৯

Optimizing Display system

I am telling how to optimize the display system of PC in this blog.
Windows XP can look sexy but displaying all the visual items can waste system resources. To optimize:

1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons

শুক্রবার, ১১ সেপ্টেম্বর, ২০০৯

Multi Google Talk Creating

some techniques to create/make multi google talk are given below:

1)Right click on the Google Talk shortcut.
2)click on Properties.
3)Go to Shortcut tab on Google Talk Properties window.
4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).
“c:\program files\google\google talk\googletalk.exe” /nomutex
5)Click on OK.

I didn't have to do anything after this nd clicking on the shortcut multiple times just gave me different google talk window.

another way::

To create a new shortcut for Google Talk:

1)Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2)Select New on the right click context menu.
3)Then select Shortcut.
4)Copy and paste the following line to the text box when prompted to type the location of the item:
“c:\program files\google\google talk\googletalk.exe” /nomutex
5)Click on Next.
6)Give the shortcut a proper name such as Google Talk or Google
Talk Multiple or Google Talk Polygamy.
8)Click OK until you are done.
enjoy.

Error free computer

one can delete the unnecessary things from compter to make it faster and smoother.Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:

Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation
To disable these services:

Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable"
then see the change on your pc/laptop.

বুধবার, ৯ সেপ্টেম্বর, ২০০৯

firefox speeding tips

this method will improve the speed & load time of firefox. And you will be able to surf faster.
Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.

1.

network.http.max-connections-per-server =32
2.

network.http.max-persistent-connections-per-proxy =16
3.

network.http.max-connections = 64
4.

network.http.max-persistent-connections-per-server = 10
5.

network.http.pipelining = true
6.

network.http.pipelining.maxrequests = 200
7.

network.http.request.max-start-delay = 0
8.

network.http.proxy.pipelining = true
9.

network.http.proxy.version = 1.0
Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy quick surfing

how Increse your internet speed

everytime you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:

Note that you must have to do this step by step:;
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d

now after that,Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.

মঙ্গলবার, ২১ জুলাই, ২০০৯

Attacks on bangladesh

The Pakistan Army raped the women of our country in full knowledge of the public . they were routinely abducted to special camps near army barracks to be gangraped , brutalized , and killed , or to live with the eternal shame of their violation. Many committed suicide. A large section of the intellectual community of Bangladesh was murdered by Al Badr and AL Shams when they saw the defeat was coming .We have strong evidence and documents against the people who were involved in war crimes during the Liberation War and what is needed now is to bring the culprits to justice. For unknown reasons , the subsequent governments of Bangladesh failed to take any actions against them. They are pointing out that its main agenda is to form a religious state which is in contradiction to the democratic , judicial , constitutional and social structure of the country . But I find it funny that a supposed Bangladeshi sees it fit to blame Sheikh Mujib and those who fought for us and led us, rather that blaming those who oppressed us. At least publicly everyone agrees that any parties responsible for such atrocities should not be allowed to operate as our political leaders . Therefore we must establish once and for all who these people are and what they did and for this judgement to be reached transparently by respected and universally accepted court/ commission/panel. I hope that the government will punish those criminals who insulted a freedom fighter a few days ago.

রবিবার, ১৯ জুলাই, ২০০৯

youtube

youtube should increase its option. free video should be release more. You tube should be offline.

মঙ্গলবার, ১৪ জুলাই, ২০০৯

Nokia

Nokia is a largest selling mobile phone company of the world.It has now a lot of subscribers.
Nokia has large network at the whole world. Nokia has recently released few sets. Nokias set has a lot of function . Its features are many like as follows:
games
software
memory care
touch screeen
free hand writing
java enabled
other lots of multifunction set it has made. But its price is still valuable to many customars. So , It should reduce its price specially in bangladesh.Nokia should make a mobile like Iphone which will control only by hand. It should have 30 gb memory card compatiabiltiy. It should increase some new features.

শুক্রবার, ১০ জুলাই, ২০০৯

Earn Money

It is easy to earn money from internet.For earning money you can earn money through yahoo publisher, Casino game etc.In casino Someone has to deposit money .Data entry is another source.

বুধবার, ৮ জুলাই, ২০০৯

Online earning ways

there are a lot of way to earn money from internet.Such as Ptc,ptr,ppc,survey,gaming ,outsourcing etc.But everyone must have account at alertpay.com or moneybookers.com and then make an account at www.christyclix.com and do the work according to thier rules .Its is easy.Another earning site is woldwinner .com .Any one can play this site and win money.

সোমবার, ১৮ মে, ২০০৯

about animal and plants

Humans , animals and plants are all important elements of the natural environment . But humans are cruelly destroying plants and animal and thereby creating the extinction of various plants and animals everyday . These losses are particularly severe in the areas of tropical forest which cover only 7% of the surface of the globe, but which provide the living space for between 50% and 80% of all our wildlife . Many wild animals and birds such as pandas , bears tigers alligators , whales ,wolves ,eagles falcons kites and buzzards are faced with the threat of extinction today . Their decline has been accelerated by the destruction of their feeding and nesting places , by the collection of eggs and above all by the widespread use of chemicals and pesticides which enter their food chains leading to sterility and a mass deaths. Hunting of birds and animals is another cause of their extinction. Men kill birds for food and feathers, hunt big cats to make fur coats and slaughter alligators and other reptiles for shoes and bags . In addition , whale hunting has also drastically reduced the number of blue whales in the Atlantic Ocean. We know that all species are important for maintaining ecological balance.

শনিবার, ৯ মে, ২০০৯

the life of british peoples

The
British have a reputation for keeping their emotions private and for being reserved in their public behaviour. There are some obvious things that people from overseas notice in British behaviour. For example , on public transport, people do not usually talk to other passengers. On meeting people do not embrace and often simply shake hands on a first introduction. In theatres , concert halls and cinemas, audiences are quiet during performances and reactions are often restrained . None of this behaviour traits , however , need to be interpreted by visitors as unfriendliness and in general , if a visitor makes the first move to start a conversation, they will , they will find that British people are friendly and very considerate. On the other hand , some aspects of British behaviour might seem too informal for foreigners . An example is the informal use of first names among staff holding different status at work. Although it would be a blasphemy for a student to call his/her teachers by their first names in Bangladesh, it is quite common in British colleges and universities . Britain lies in the temperate region. In winter, it is very cold and windy . You should carry warm clothes with you. Moreover , there are a number of significant differences in norms and behaviour . Here are some useful tips for those visiting U.K.
people in Britain often socialize at home , but unless you know someone very well it is not usual to just drop in without at least telephoning first to make sure that it is convenient.
If you accept an invitation for a meal in someones home , it is regarded as a definite appointment and it would be considered bad manners not to turn up. If you really do have to cancel an invitation, do let your hosts know as soon as possible , before they making preparations.
If there are certain foods that you cannot or do not eat , do let your host know in advance, in order to save embarrassment on the day .
Whether you are visiting just for a meal or for a longer stay , it is customary to take a small gift for your host flowers or chocolates, for example.
If you stay with a British family , you should act thoughtfully at all times . Be on time for meals . If you need to miss a meal let your host know if you are going to be staying out late so that they wont worry about you Offer to help with household chores – your offer will probably be turned down but will still be appreciated.

বুধবার, ৬ মে, ২০০৯

ABOUT INTERNATIONAL SPACE STATION

The first Space Station Salyut was launched by the Russians in 1971 .Since then four Space Stations have been launched by the Russians and one American to conduct experiments in Space . Scientists have launched Space Stations which provide laboratories for living and conducting experiments . It is a 17-nation project which marks unprecedented international co-operation in Space research. The Space Station is expected to be completed by the year2006 .

Living in a space

Scientists have been experimenting with the idea Living In Space for a long time . But it is not easy to live in Space. There is no gravity and the body needs a lot of adjusting to do. One of the scientists reported that his heart beat had become slower , and bones and muscles had felt weaker as calcium had been decreasing from them . His head had felt heavy as there was no gravity to keep blood down in the legs and there was also a feeling of Space sickness which is like travel sickness . Doing everyday jobs also becomes difficult . Water cannot be poured because it stays ion one place like a big ball. .If you want a drink , you must do it with straw from a closed container . If you sprinkle salt , it spreads all around you and heavy objects can be moved with one finger as they have no weight . Astronauts , therefore , need months of training to be able to adjust to conditions in Space.

মঙ্গলবার, ৫ মে, ২০০৯

about trendpc-cillin software

I have written here details about trend Pc-cillin software,like how to install, how to configure it ,how to use ,why it has been used by many peoples etc.
1. About Trend Micro PC-cillin Internet Security 2005
========================================================================
Trend Micro PC-cillin Internet Security 2005 delivers comprehensive
protection against all types of viruses, worms, Trojans, and blended
threats, including network viruses. It also blocks hackers, spyware,
phishing attacks, inappropriate content, and spam. Featuring Home
Network Control and Wi-Fi Intrusion Detection, it is the first
personal Internet security solution designed to extend desktop
security to your home and wireless networks.

1.1 Overview of This Release
=====================================================================
Trend Micro PC-cillin Internet Security 2005 version 12.40 provides
the Pattern Rollback Tool. This tool ensures that PC-cillin is
using a stable virus pattern file to keep the machine environment
secure.

This release also enables PC-cillin Internet Security to support
incremental pattern file updates to reduce the size of downloads
when updating product components.


2. What's New
========================================================================

Pattern Rollback Tool
---------------------
The Pattern Rollback Tool removes the latest virus pattern file in a
user's computer and restores the previous one. Users can run this tool
when PC-cillin Internet Security does not start normally after loading
the latest virus pattern file.


Incremental pattern file update
-------------------------------
Updating pattern files incrementally results in smaller file sizes,
which allows faster downloads when updating program components.


Subscription renewal
--------------------
PC-cillin Internet Security subscription can now be renewed from the
Registration screen of the PC-cillin console.


2.1 Resolved Known Issues (from 12.10 version)
=====================================================================

Initialization
--------------
Initializing PC-cillin Internet Security usually takes some time to
complete. In release 12.40, PC-cillin Internet Security was optimized
for faster initialization.


Rescue Disk
-----------
When scanning viruses using a pattern file rescue disk, failure to
read the division pattern may occur. After installing this version,
this problem will no longer occur.


Network virus pattern loading
-----------------------------
The process of loading network virus patterns has been improved so
that users will not get the message "Unable to update the network
virus pattern for the personal firewall".


Manual Scan
-----------
Users can now stop Manual Scan on demand even if scanning is not yet
complete.


Processing time for big debug log file
--------------------------------------
PC-cillin Internet Security has been optimized for faster processing
of large debug logs.


Security Check
--------------
This version allows the "Results" screen of Security Check to be
closed.


Manual Scan with compressed file
---------------------------------
In the "Manual Scan" result screen, uncleanable viruses in compressed
files are grayed out and cannot be selected.


Private Data Protection
-----------------------
When detecting private data sent by Internet Messenger, the detection
screen shows the receiver's name all the time.


3. Documentation Set
========================================================================

In addition to this readme file, the documentation set for this
product includes the following:

o Online help -- Context-sensitive help screens that provide guidance
for performing a task

o Quick Start Guide -- product overview, installation planning,
installation and configuration instructions, and basic information
intended to get you "up and running"

o Knowledge Base -- a searchable database of known product issues,
including specific problem-solving and troubleshooting topics.
http://kb.trendmicro.com/solutions/

Electronic versions of the printed manuals are available at:
http://www.trendmicro.com/download


4. System Requirements
========================================================================

Operating System:
-----------------
Microsoft(TM) Windows(TM) 98
Microsoft Windows 98 SE
Microsoft Windows Me
Microsoft Windows 2000 Professional with Service Pack 4 or above
Microsoft Windows XP Home or Professional with Service Pack 1, 2
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition


CPU:
----
* Intel Pentium(TM) 233MHz or equivalent processor for
Windows 98, 98SE, Me
* Intel Pentium 300MHz or equivalent processor for Windows 2000, XP
* Intel Hyper-Threading supported


Memory:
-------
* 64MB of RAM for Windows 98, 98SE, Me, 2000
(128MB or above is recommended)
* 128MB of RAM for Windows XP


For all installations:
----------------------
* Internet Explorer 6.0 with Service Pack 1 or above
* 100MB of available hard disk space for installation
* Adobe(TM) Acrobat(TM) is required to view documentation that is
provided in PDF format. You can download the free Acrobat Reader(TM)
software at http://www.adobe.com.
* RAID is not supported.
* A monitor with a resolution of 800 x 600 pixels or more, and
High Color (65536 colors) or more


Email software and Web browser required for some features:
----------------------------------------------------------

Email software for Mail Scan and Anti-spam
------------------------------------------
The following software has been verified to work correctly with
Mail Scan, Anti-spam, and Private Data Protection:
- Microsoft Outlook Express 6.0
- Microsoft Outlook 2000, 2002, and 2003
- Netscape 7.1
- Eudora Pro 6.0
- Becky! Internet Mail version 2


Services and for Webmail Scan
-----------------------------
The following services have been verified to work correctly with
Webmail Scan:
- AOL Mail
- Yahoo! Mail
- MSN Hotmail

Note: Webmail Scan does not work with Hotmail when it is accessed by
Microsoft Outlook Express, Microsoft Outlook, or MSN Explorer.


Web Browsers for Webmail Scan, Private Data Protection and
the URL Filter
----------------------------------------------------------
The following software has been verified to work correctly with
Webmail Scan, Private Data Protection and the URL Filter:
- Microsoft Internet Explorer 6.0 Service Pack 1 or above
- Netscape 7.1
- AOL 7.0


Instant Messengers for Private Data Protection
----------------------------------------------
The following software has been verified to work correctly with
Private Data Protection:
- Windows Messenger 4.7, 5.0
- MSN Messenger 6.2
- ICQ 4 Lite Edition


Internet connection required for some functions:
------------------------------------------------
* An Internet connection is necessary to register online, download
updates, obtain virus information, browse pages on the Trend Micro Web
site, or send email messages.
* If you use a router to connect to the Internet, make sure your router
doesn't automatically start a dial-up connection for the Intelligent
Update feature because this could result in an extra connection fee.
Modify the router settings as required, or disable Intelligent
Update.


5. Installation
========================================================================

Installing Trend Micro PC-cillin Internet Security 2005 is simple and
only takes a few minutes.

If a previous version of Trend Micro PC-cillin, other than PC-cillin
Internet Security 2004 or PC-cillin Antivirus 2004, or any other virus
protection or firewall program is installed on your computer, remove it
before installing Trend Micro PC-cillin Internet Security 2005.

If Trend Micro PC-cillin Internet Security 2004 or PC-cillin Antivirus
2004 is installed, PC-cillin Internet Security 2005 will use the
existing serial number.


How to install Trend Micro PC-cillin Internet Security 2005
-----------------------------------------------------------
To install Trend Micro PC-cillin Internet Security 2005:

1. Insert the Trend Micro PC-cillin Internet Security 2005
program CD into your CD-ROM drive, and do the following:
* If the menu automatically appears, click Install Program, and
then click Next.
* If the installation program doesn't automatically start, click
Start > Run. In Open, type D:\Setup\setup.exe and click OK
(where D:\ is the drive letter of your CD-ROM). Click Next.

2. Click "I accept the terms in the license agreement" to accept and
continue installing Trend Micro PC-cillin Internet Security 2005.
The installation procedure will quit if you do not accept the terms.

3. Click Next, and then continue to follow the onscreen instructions.

4. Restart the computer.

Refer to the Trend Micro PC-cillin Internet Security 2005 Quick Start
Guide for detailed installation instructions.


6. Post-Installation Configuration
========================================================================
This section provides a list of the most important tasks you have to
complete to get up and running with Trend Micro PC-cillin Internet
Security.

To effectively use Trend Micro PC-cillin Internet Security and start
protecting your computer, Trend Micro strongly recommends that you
perform all of these tasks.

* Register Trend Micro PC-cillin Internet Security.

Register your software to enable updates. Trend Micro PC-cillin
Internet Security 2005 needs to update pattern and program files to
stop the latest viruses (see "Registering Trend Micro PC-cillin
Internet Security" in the Quick Start Guide for instructions).


* Perform a Manual Update.

Trend Micro recommends you update your scan engine and virus
pattern files immediately after installing the product, and regularly
update thereafter. Enable the Intelligent Update option to let Trend
Micro PC-cillin Internet Security automatically update itself (see
"Updating Trend Micro PC-cillin Internet Security" in the Quick Start
Guide for instructions).


* Manually Scan all files.

Perform a complete scan of your computer to ensure there are no
viruses or other malicious programs hiding on your PC (see "Scanning
your entire computer" in the Quick Start Guide for instructions).


Note: Trend Micro recommends that you update your scan engine and
virus pattern files immediately after installing the product.


7. Known Issues
========================================================================

7.1 Software Compatibility
======================================================================

NTT Flets ADSL Connection Tool
------------------------------
When using the Personal Firewall with the NTT Flets ADSL Connection
Tool, configure the NTT Flets ADSL Connection Tool to use Protocol
Driver mode. If it is configured to use Filter Driver mode, the
following functions will not be available:
- Wi-Fi Detection
- Automatic Profile Change


VPN and firewall software
-------------------------
Errors may occur if PC-cillin Internet Security is installed with the
following software:
- AT&T VPN Client
- ZoneAlarm Firewall 5.1

Uninstall these applications before installing PC-cillin Internet
Security 2005.

Uninstall Norton Personal Firewall 2002/2003 before installing
PC-cillin Internet Security 2005 on Windows98/ME, or install PC-
cillin Internet Security in "Antivirus only" mode.

When using some VPN software, the following functions may not be
available:
- Wi-Fi Detection
- Automatic Profile Change


Windows Firewall
----------------
If you enable Personal Firewall, Trend Micro recommends turning off
Windows Firewall to reduce resource usage.


7.2 Personal Firewall
======================================================================

Adding or removing the Personal Firewall
----------------------------------------
You can choose whether to install the Personal Firewall during
installation. However, the Personal Firewall cannot be added or
removed after installation.


Enabling or disabling the Personal Firewall
-------------------------------------------
Close all running programs before you enable or disable the
Personal Firewall. Some systems could experience a temporary slowdown
while starting Trend Micro PC-cillin Internet Security 2005, Internet
Explorer, or other applications immediately after you modify the
Personal Firewall settings.


Changing your Personal Firewall profiles
----------------------------------------
Close all running programs before you change Personal Firewall
profiles. Some systems could experience a temporary slowdown
while starting Trend Micro PC-cillin Internet Security 2005, Internet
Explorer, or other applications immediately after you modify the
Personal Firewall settings.


Exception Rule list priorities
------------------------------
The priority of Exception List rules is based on the location in the
list. Higher location on the list means higher priority. For example,
if you set two rules (the first one to allow port 100 traffic and the
second to deny port 100 traffic), port 100 traffic is permitted
because the first rule is higher on the list. You can change the
priority with arrow buttons on the Exception Rule screen.


Illegal characters for the Exception List rule "Explanation" field
------------------------------------------------------------------
You cannot use the character "|" in the Exception List rule
"Explanation" field.


Personal Firewall security level and displayed Exception List rules
-------------------------------------------------------------------
Depending on the security level you set for the Personal Firewall, the
Exception List rules may or may not be displayed.


Specifying incoming and outgoing ports for Exception List rules
---------------------------------------------------------------
When creating Exception List rules, remember that for incoming rules,
the specified port number is describing a port number on your own
computer. For outgoing rules the port number is describing a port
number on another computer.


About Network Virus Emergency Center
------------------------------------
The Network Virus Emergency Center function is integrated into the
Personal Firewall. Therefore, when the Personal Firewall is disabled,
this function also becomes disabled.


Personal Firewall profile settings for shared network resources
---------------------------------------------------------------
By default, the Personal Firewall provides maximum security to protect
users from network attacks. However, to access local area network
resources (such as file sharing or printer sharing) you must use the
Office network profile in the Firewall Profiles settings.

To apply this Personal Firewall profile, in the system tray,
right-click the program icon and click User profile > Office
network. (The system tray is next to the clock, on the bottom right
hand side of your screen.)


7.3 Other Issues
======================================================================

Connections established before enabling Trend Micro PC-cillin Internet
Security 2005
----------------------------------------------------------------------
Starting Trend Micro PC-cillin Internet Security 2005 shuts down
network connections established while Trend Micro PC-cillin Internet
Security 2005 was disabled.


Wi-Fi Detection
---------------
* Wi-Fi Detection is designed not to run in the following situations:
(1) When the bit mask length of a subnet mask is smaller than 22
(2) When all network adapters are disabled
(3) If no IP address is correctly assigned to it

* If the firewall on the target PC blocks NetBIOS, the host names will
not be displayed.


Update once after installing Trend Micro PC-cillin Internet Security
2005 without registering
--------------------------------------------------------------------
Within a few moments after typing your serial number on the Trend
Micro Internet Security 2005 main screen, a window appears prompting
you to update. After installing Trend Micro PC-cillin Internet
Security 2005 and before registering online, you are permitted to
update only once. Once you close this window, you must register
online to update.


Schedule during manual task scanning
------------------------------------
Scheduled scan tasks are not executed if a Manual Scan was performed
on the same date. Also, if the multiple scan tasks conflict, only the
first scan task is executed, while others are disabled.


How to enable or disable your scheduled scan tasks
--------------------------------------------------
You can enable or disable scan tasks by selecting or clearing the scan
task check box on the left side of the list in the Scan Task screen.
If you clear the check box, the task won't be performed when
scheduled.


All drives scanning
-------------------
The Main UI [Scan For Viruses] and specified scan tasks can scan all
local drives. However, mapped network drives are not included in the
scan. A scan task that includes [Scan For Viruses] and [Scan
Everything] can scan removable disks, such as floppy disks, and CD-ROM
drives. If no media is inserted, it automatically skips and continues
to scan the next drive.


Manual scanning and progress bar status during scan tasks
---------------------------------------------------------
The progress bar calculates the total number of files divided by the
number of scanned files. In the beginning of a Manual Scan or during a
scan task, the progress bar appears to be around 100% because the
number of files initially scanned is almost identical to the
number of files counted. Later the files will be counted much quicker
than they will be scanned and the progress bar will more accurately
reflect the scan progress.


How to clean compressed files
-----------------------------
The ZIP clean (compressed file cleaning) function can handle infected
files in the first layer of compression (files compressed once).
Infected files compressed and divided in more than two layers (for
example, ZIP files compressed again using the ZIP format) cannot be
cleaned automatically.


Turbo Scan
----------
Before beginning Manual Scan with Turbo Scan enabled, PC-cillin
Internet Security checks the target files for modifications
since the last time they were scanned. If there are an extremely
large number of files, enabling Turbo Scan may not provide
a speed improvement.


Security Check
--------------
After completing an update from Windows Update, Security Check
sometimes still detects known security vulnerabilities. Check the
Microsoft Web Site for other security patches such as Office Update.


Spyware Scan
------------
Some items detected by Spyware Scan may not be harmful, and may be
necessary for other software to function properly. Removal of these
items cannot be undone, so practice caution because you are removing
them at your own risk.


Spyware Removal
---------------
Some spyware and other grayware may not be deleted. If this occurs,
check the spyware information by clicking "More Information", then
perform the recommended action or actions.


About Mail Scan
---------------
* If you need to set the specific proxy type with your application
software, the Email Scan may not be performed.
* If your incoming mail server uses a port other than port 110,
incoming (POP3) mail scanning will not function.
* Mail Scan does not support IMAP.
* If your email software's setting leaves a copy of your email on
the mail server, after installing Trend Micro PC-cillin Internet
Security 2005, the messages previously downloaded from the server
will download again.


About Malformed mail warning
----------------------------
When you enable Anti-spam, Private Data Protection, or Email Scan, you
may receive an email message with the title "Malformed mail warning".
This means that Trend Micro PC-cillin Internet Security 2005 has
detected an email that may contain malicious contents and has attached
it to this new email message as a text file. If you need to read the
original email message, Trend Micro recommends you open it as a
text file. To prevent infection, do not save the original email as an
email file and do not reply to this email.


Displaying the virus property of your files
-------------------------------------------
Trend Micro PC-cillin Internet Security 2005 will scan for viruses if
you right-click a file and choose Property from the short-cut menu,
then click the Virus Property tab. However, for some versions of
Windows, the image file types .AWD, .DCX, .PCX, .TIFF, .TIF, .WIF, and
.XIF are associated with a program. Trend Micro recommends that you
don't scan these file types by right clicking them because system
performance could become unstable. Instead, Trend Micro recommends
that you perform a Manual Scan.


Backup files
------------
If you configure Trend Micro PC-cillin Internet Security to create
backup files before the virus cleaning process, these files will be
saved in the Quarantine folder. Backup files can be deleted or
restored using the Quarantine Folder actions. Refer to Trend Micro
PC-cillin Internet Security 2005 online help for detailed instructions
on handling files in the Quarantine Folder.


Default setting for URL Filter, Private Data Protection, and Anti-spam
----------------------------------------------------------------------
By default, the URL Filter, Private Data Protection and Anti-spam
functions are disabled. You need to manually enable these functions.


URL Filter and Private Data Protection do not support all protocols
-------------------------------------------------------------------
The URL Filter function only checks traffic using the HTTP protocol.
The Private Data Protection function only checks traffic using the
HTTP, SMTP, or IM (ICQ, MSN) protocols.

The URL Filter and Private Data Protection functions do not use the
following protocols to check traffic:
- HTTPS
- FTP
- Encrypted communication protocols, such as SSL
- Hyperlinks, such as Microsoft Word/Excel

Also, traffic will not be checked When Proxy Auto-Config (PAC)
is being used.


Webmail Scan and Proxy Auto-Config (PAC)
----------------------------------------
The Webmail Scan function does not support PAC.


Private Data Protection for Instant Messenger
---------------------------------------------
Enabling or disabling Private Data Protection shuts down the
Instant Messenger (ICQ, MSN) connections.


Home Network Control
--------------------
Disable or configure Windows Firewall if it is installed with
Home Network Control. Otherwise, it will block network communication
for Home Network Control. (Home Network Control uses UDP 40116
and TCP 62471. The process name is PcCtlCom.exe.)


Font size on your screen
------------------------
If you select large font size from your computer's Screen Property,
some Trend Micro PC-cillin Internet Security layouts will be distorted.
Trend Micro suggests using small font size.


Trend Micro PC-cillin Internet Security 2005 Online help
--------------------------------------------------------
Install Microsoft Internet Explorer 6.0 Service Pack 1 or above to
correctly view Trend Micro PC-cillin Internet Security 2005 online
help.


Windows XP Guest account
------------------------
The Windows XP Guest account is not supported.


Upgrading Microsoft Windows OS or Service Pack
----------------------------------------------
Remove Trend Micro PC-cillin Internet Security 2005 before upgrading
Windows or the Service Packs.


Pattern files and Scan engine
-----------------------------
You may download pattern files and scan engine updates while your
support period is valid. Note that you are responsible for any fees
charged by your service provider(s) for downloads. For more information
about the product and virus protection, visit the Trend Micro Web site
or the Customer Care Center.


8. Release History
========================================================================
Trend Micro(TM) PC-cillin Internet Security 2005 (12.30) August 2005
Trend Micro(TM) PC-cillin Internet Security 2005 (12.10) December 2004
Trend Micro(TM) PC-cillin Internet Security 2005 (12.0) September 2004

9. Contact Information
========================================================================
A license to the Trend Micro software usually includes the right to
product updates, pattern file updates, and basic technical support for
one (1) year from the date of purchase only. After the first year,
Maintenance must be renewed on an annual basis at Trend Micro's
then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us
at:

http://www.trendmicro.com

Evaluation copies of Trend Micro products can be downloaded from our
Web site.

Global Mailing Address/Telephone Numbers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For global contact information in the Asia/Pacific region, Australia
and New Zealand, Europe, Latin America, and Canada, refer to:

http://www.trendmicro.com/en/about/overview.htm

The Trend Micro "About Us" screen displays. Click the appropriate
link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.


10. About Trend Micro
========================================================================
Trend Micro, Inc. provides virus protection, anti-spam, and
content-filtering security products and services. Trend Micro allows
companies worldwide to stop viruses and other malicious code from a
central point before they can reach the desktop.

Copyright 2005, Trend Micro Incorporated. All rights reserved.
Trend Micro, the t-ball logo, PC-cillin are trademarks of Trend Micro
Incorporated and are registered in some jurisdictions. All other
marks are the trademarks or registered trademarks of their respective
companies.


11. License Agreement
========================================================================
Information about your license agreement with Trend Micro can be
viewed at:

http://www.trendmicro.com/en/purchase/license/

Third-party licensing agreements can be viewed:
- By selecting the "About" option in the application user
interface
- By referring to the "Legal" page of the Getting Started Guide or
Administrator's Guide

শনিবার, ২ মে, ২০০৯

About Nokia Phone suite software

Nokia is large company in telecommunication sector. Its application is of various kinds by which nokia phone set connect to Pc.It is very important to know all user that how it works .Here are some of its feature of Nokia Pc suite software which can be connet with PC for data transferring works:;::

Nokia PC Suite applications:
Content Copier allows you to back up and restore personal data between a compatible phone and a compatible PC. It also lets you copy information between two compatible Nokia phones.

Nokia PC Sync allows you to synchronise contacts, calendar items, notes, to-do items, and e-mails between a compatible phone and a compatible PC Personal Information Manager (PIM).

Nokia Phone Browser allows you to manage the folders of a compatible phone through Windows Explorer.

Nokia Contacts Editor allows you to view and edit the contacts of a compatible phone on your PC. You can also create, delete and organise contacts in the Contacts view in Nokia Phone Browser.

Nokia Text Message Editor allows you to write and send text messages and print them from your PC. You can also organise text messages in the Messages view in Nokia Phone Browser.

Nokia Application Installer allows you to install Symbian and JavaTM applications from a compatible PC to a compatible phone.

Nokia Audio Manager allows you to create and organise digital music files on a compatible PC and transfer them to a compatible phone.

Nokia Image Converter allows you to modify images and transfer them to a compatible phone as wallpapers, portrait images, and MMS pictures.

Nokia Multimedia Player allows you to play multimedia messages, audio files and video files, and create playlists of your favourite multimedia files. You can also save video and audio files in a format that allows you to use them in a compatible mobile phone or attach them to MMS messages.

Nokia Sound Converter allows you to convert General MIDI ringing tones into Scalable Polyphony MIDI tones and transfer them to a compatible phone.

Image Store allows you to store images and videos from a compatible phone on a PC and view the images and videos after storing using Nokia Multimedia Player or Windows Explorer.

One Touch Access allows you to connect your PC to the Internet using packet data (in GPRS or 3G networks, depending on the phone and network capabilities).

about speedboat attack game

Here I have written about various things about speedboat attack game from where you will be able to know many things about this good racing games. This informative blog contains many thing about the game like how to install ,technical support, how to configre, how to play , about various features of the game.
Technical Support
-----------------
If you experience any problems please contact:

Technical Support
Telstar Electronic Studios Ltd.
The Studio
62-64 Bridge Street
Walton-on-Thames
Surrey
KT12 1AP
U.K.

Tel: + 44 1932 232299
Fax: +44 1932 252702
Email: games.support@telstar.co.uk

IMPORTANT - PLEASE READ THIS ADDENDUM TO THE SPEEDBOAT ATTACK MANUAL BEFORE CONTACTING TECHNICAL SUPPORT


1. To upload your scores to the Internet Hall of Fame launch the 'Upload scores' option in the Speedboat Attack group on your Windows Start menu rather than from within the game itself.
2. In order to proceed to the next championship league you need to finish in third or higher position at the END of the championship league not in each race as written in the manual.
3. Some functions will only work in certain modes, for example:
· You can only call the repair helicopter when you are playing Action mode
· The special effects camera, toggle map and rear view mirror on/off keys will only work in cockpit view
4. Pressing F12 will save a screen shot to disk. You will find any saved screen shots located in the game directory on your hard disk. The default directory is
c:/program files/criterion studios/speedboat attack/
5. After uninstalling the game some data files may be left behind in the game directory. These will have the file extension .css and are the data for any championship or time trials you saved. If you reinstall the game into the same directory without deleting these files you will still be able to access previously saved games. In addition any screen shots will also remain until you choose to delete them.
6. Please note that 3dfx is the only 3D graphics hardware supported by Speedboat Attack.
7. If you experience any problems with the keys locking in 2 player mode please see below for help.

Network hints and tips

Starting a network game via the Internet, LAN or modem

1. Creating a network game

In any network game one player will act as the game 'host', i.e. that player will create a game and then all the other players will connect to the host's machine. As host you choose the course and game style from the appropriate option screens. Then go to the Network option screen and follow the instructions below.

Note that when you select Network screen you may get a message alerting you to the fact that IPX is not installed on your machine. If so, please see the trouble shooting section below for information on how to install IPX.

a) Select the method of connection, LAN, Modem or Internet
b) Select 'race' or 'deathmatch'
c) Select 'create session'
d) Select the total number of players (if you are playing a modem game this will be a maximum of 2)
e) Click OK
f) If a modem game had been selected the modem dialup box will be displayed. Select 'connect'.
g) Wait for other players to join. Information on which players have joined and how many are left to join will be displayed at the bottom of the screen. Once all players have joined the game will begin.
h) Once in the game any player can pause the game by pressing 'p'. Similarly if any player presses the Escape key the game will be paused. If that player chooses to exit the game at this point a message will be displayed on the other players machines saying, for example, 'James retired' If a player retires from a 2 player game the race is over and will automatically exit to the network screen. All other games will continue whilst there are at least 2 players in the race.

2. Connecting to a game

Once a player has created a game, then you can choose to join that game as follows:

a) Select Network from the main menu. At this point you may get a message alerting you to the fact that IPX is not installed on your machine. If so, please see the trouble shooting section below for information on how to install IPX.
b) Choose the method of connection, i.e. LAN, Modem or Internet
c) Select 'connect'.
d) All current sessions will be displayed; select the session to which you wish to join
e) If 'Internet' game has been selected a dialogue will appear asking you to enter the IP address of the Host machine. Enter IP address as supplied by the Host (you will need to ask the host for this) or alternatively leave blank to search for available sessions.
f) If 'modem' game has been selected a dialogue will appear asking you to enter the phone number of the Host's modem. Again, the Host will need to give you this.


TROUBLE SHOOTING

Common problems

1. IPX not installed

When playing a LAN or modem game you will need to ensure that you have IPX installed on your machine. The easiest way to check whether this is the case is to try and create a LAN game following the instructions above. If IPX is not installed a dialogue will be displayed, both when you enter the network screen and again when you try and create a game. To install IPX follow the instructions below:
1. From the 'Start' button go to 'Settings' and then 'Control Panel'
2. Double click on 'Network' icon
3. In the Configuration window select 'Add'
4. Double click on 'Protocol' and then select 'Microsoft'
5. Select 'IPX/SPX-compatible Protocol' and click OK.
6. You will now be back at the configuration window. In the list of network components double click on the Adapter and select 'Bindings'.
7. Make sure that the box next to IPX/SPX-compatible Protocol is checked.
8. Click OK
9. You will have to restart Windows for the new settings to take effect.

2. Network Connection not working

When attempting to play any network game first ensure that your are connected to the appropriate service. The easiest way to do this is as follows:
LAN:
Try connecting to your network server. If you are unable to do this it is likely that there is a problem with your connection rather than with the game. Contact your network administrator for help.
Modem and Internet:
Try connecting to your service provider. If you are unable to do this it is likely that there is a problem with your connection. Contact your service provider for help.

3. How to find out your IP address

If you are acting as the game host in an Internet game you will need to provide other people with your IP address. Your IP address may change each time you log on. In order to find out your IP address during a particular session follow the instructions below:

1. From the Windows Start Menu select the MS-DOS Prompt
2. At the prompt type 'winipcfg' (Win 95) or ipconfig (Windows NT)
3. Your IP address will be supplied on screen. Make a note of it and then type EXIT to return to Windows.

4. Improving performance

The minimum specification machine required to run Speedboat Attack is a P90 with 16 Mb RAM. Obviously the slower your machine the slower the game will run. However, there are ways you can improve performance:

1) Close all other programs before starting Speedboat Attack.
2) When racing in cockpit view press F3 to turn off the rear view mirror.
3) Select a lower graphics setting. To do this, select 'Configuration' from the 'Game Options' sub-menu and then select 'Graphics'. The default setting is 'High' but you can select 'Medium' or 'Low', this reduces the graphic detail displayed.

5. Keys locking in 2 player mode
Because of the way in which some keyboards are designed you may find that the keys 'lock' when more than 4 keys are used at any one time, for example, when playing 2 player split screen mode. One solution is for one of the players to use the mouse or a joystick/joypad.

To reconfigure the controls used by either player select 'controls' from the 'configuration' sub menu and select which method will be used be each, i.e. keyboard, mouse or joystick. If keyboard is the selected option for both players, select 'configure' next to 'Player1' and once in the configuration screen click on '2 players'. This will display the keys for both players on the screen.

Getting Started
---------------
The Speedboat Attack manual explains the various game elements and controls for the game. For those of you who don't like reading manuals here are the key things you will need to know:

Default keys

· Up arrow Accelerate/Forward
· Down arrow Brake/Reverse
· Left arrow Left
· Right arrow Right
· Ctrl Machine-gun fire
· Space Missile fire
· P Pause
· H Call for Repairing Helicopter
· F2 Toggle through available views
· F3 Cockpit mirror on/off
· F6 Special effects Camera on/off
· F7 Music on/off
· F12 Save screen shot to disk
· Esc Heat aborted, return to main menu

and in two player mode the default keys are:

Player 1

· S Accelerate/Forward
· X Brake/Reverse
· Z Left
· C Right
· Ctrl Machine-gun fire
· Tab Missile fire
· P Pause
· R Call for Repairing Helicopter
· Esc Heat aborted, return to main menu

Player 2

· Up arrow Accelerate/Forward
· Down arrow Brake/Reverse
· Left arrow Left
· Right arrow Right
· Insert Machine-gun fire
· Delete Missile fire
· P Pause
· ] Call for Repairing Helicopter
· Esc Heat aborted, return to main menu

The default keys can be changed in the 'configuration' sub menu.

description about bijoy

I have written a lot of things about bijoy in this blog.How to install, Bijoy-2000 versions good sides, how this bangla font works in pc, why it is improtnat for users ,how to configre it into PC etc. It is a documentary blog .Not every people choice it but choice who need it. Here it is below:::::
Hello, it is great to release a software for writing Bangla when we are
into the new millenium.
Please note the following:
1. Before you install Bijoy-2000 please install Bijoy Fonts to your systems which
will help you to read Bijoy Guide.
2. Make sure that you use the authorised Bijoy Keyboard for eaxct typing as there
are a few updates on Bijoy Keyboard. Presently only Perfect Keyboard is the
authorised Keyboard.
3. Bijoy 2000 is the latest version of our most popular software Bijoy. Make sure
you do not have an old copy of Bijoy installed in your system.
4. This version is good for Win NT 4.0 and Windows 2000 as other versions of
Bijoy does not work good with these two OSes.It will however run on
Windows 95 and Windows 98 also.
If you have an older system like Windows 3.1, please ask for the older version
of Bijoy which will be Bijoy 4.0.
5. As this is a 32 bit software we have changed some behaviour of Bijoy-2000
which are as follows.
a) Putting the cursor on the Bijoy Icon at the bottom which is popularly
known as task bar click right mouse button to open the dialogue box of Bijoy.
b) You can make Bijoy active or inactive from the Bijoy dialogue box/startup menu.
You can also have Help from Bijoy dialogue box.
c) Bijoy Logo is no more in the menu bar area. It is in the bottom.
d) You will have a Color Logo now.
6) We have given two Folders wihthin Bijoy-2000 Folder. One folder contains installer.
Another folder has the Fonts.
7) Bijoy 2000 includes Bijoy Keyboard only. If you need more keyboards like
Munir, National, Satyajit, Gitanjali etc, you might ask for Bijoy Pro.
Bijoy Pro is scheduled to be released in March 2000.
8) When you install Bijoy you are asked to put a serial number. Please write your
Licence number there. However Bijoy will work even if you write any other number
in the field.
9) Please note that Bijoy is licensed only with the signature of
Mustafa Jabbar. Any software which does not include a original signed licence from
Mustafa Jabbar is not an original software.

Enjoy writing with Bijoy-2000.

Thanking You,

Mustafa Jabbar
Ananda Computers
8/6, Segun Bagicha,
Dhaka-1000, Bangladesh
Ph: 9554731, 9560669.
Fax: 8802-9562517
E-Mail: ananda@bdlink.com

BCS Computer City, Dhaka Office:
Srishty
101, BCS Computer City, IDB Bhavan
Dhaka-1215

Chittagong:
870, Sheikh Mujib Road, Chittagong
Phone: 031-712254, 712207

Motijheel Office:
188 Motijheel Circular Road, Dhaka-1000

Bogra Office:
Sherpur Road (Opposit Satani House)
Bogra

India Distributor
Sonolite
55, Eliot Road, Calcutta-700016
Phone:2299967
E-Mail: hyder@vsnl.com

Keyboard Licencee
Computer Source
House#11/B, Road No 12 (New)
Dhanmondi R/A
Phone: 9127592, 9132827, 8125970
E-Mail:source@citechco.net


$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $
$ S/N: B2000-01-0001301 $
$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$

about trendpc-cillin software

I have wrote here some words about how to install trend pc-cillin antivirous software in your laptop or desktop pc and why it is different from other antivirous software. I have also written that why I have choice that and its various features which can attract anyone choosing this antivirous software for their PC.I have mentioned some informations about Trend PC-Cillin software 2005 version below:::::


1. About Trend Micro PC-cillin Internet Security 2005
========================================================================
Trend Micro PC-cillin Internet Security 2005 delivers comprehensive
protection against all types of viruses, worms, Trojans, and blended
threats, including network viruses. It also blocks hackers, spyware,
phishing attacks, inappropriate content, and spam. Featuring Home
Network Control and Wi-Fi Intrusion Detection, it is the first
personal Internet security solution designed to extend desktop
security to your home and wireless networks.

1.1 Overview of This Release
=====================================================================
Trend Micro PC-cillin Internet Security 2005 version 12.40 provides
the Pattern Rollback Tool. This tool ensures that PC-cillin is
using a stable virus pattern file to keep the machine environment
secure.

This release also enables PC-cillin Internet Security to support
incremental pattern file updates to reduce the size of downloads
when updating product components.


2. What's New
========================================================================

Pattern Rollback Tool
---------------------
The Pattern Rollback Tool removes the latest virus pattern file in a
user's computer and restores the previous one. Users can run this tool
when PC-cillin Internet Security does not start normally after loading
the latest virus pattern file.


Incremental pattern file update
-------------------------------
Updating pattern files incrementally results in smaller file sizes,
which allows faster downloads when updating program components.


Subscription renewal
--------------------
PC-cillin Internet Security subscription can now be renewed from the
Registration screen of the PC-cillin console.


2.1 Resolved Known Issues (from 12.10 version)
=====================================================================

Initialization
--------------
Initializing PC-cillin Internet Security usually takes some time to
complete. In release 12.40, PC-cillin Internet Security was optimized
for faster initialization.


Rescue Disk
-----------
When scanning viruses using a pattern file rescue disk, failure to
read the division pattern may occur. After installing this version,
this problem will no longer occur.


Network virus pattern loading
-----------------------------
The process of loading network virus patterns has been improved so
that users will not get the message "Unable to update the network
virus pattern for the personal firewall".


Manual Scan
-----------
Users can now stop Manual Scan on demand even if scanning is not yet
complete.


Processing time for big debug log file
--------------------------------------
PC-cillin Internet Security has been optimized for faster processing
of large debug logs.


Security Check
--------------
This version allows the "Results" screen of Security Check to be
closed.


Manual Scan with compressed file
---------------------------------
In the "Manual Scan" result screen, uncleanable viruses in compressed
files are grayed out and cannot be selected.


Private Data Protection
-----------------------
When detecting private data sent by Internet Messenger, the detection
screen shows the receiver's name all the time.


3. Documentation Set
========================================================================

In addition to this readme file, the documentation set for this
product includes the following:

o Online help -- Context-sensitive help screens that provide guidance
for performing a task

o Quick Start Guide -- product overview, installation planning,
installation and configuration instructions, and basic information
intended to get you "up and running"

o Knowledge Base -- a searchable database of known product issues,
including specific problem-solving and troubleshooting topics.
http://kb.trendmicro.com/solutions/

Electronic versions of the printed manuals are available at:
http://www.trendmicro.com/download


4. System Requirements
========================================================================

Operating System:
-----------------
Microsoft(TM) Windows(TM) 98
Microsoft Windows 98 SE
Microsoft Windows Me
Microsoft Windows 2000 Professional with Service Pack 4 or above
Microsoft Windows XP Home or Professional with Service Pack 1, 2
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition


CPU:
----
* Intel Pentium(TM) 233MHz or equivalent processor for
Windows 98, 98SE, Me
* Intel Pentium 300MHz or equivalent processor for Windows 2000, XP
* Intel Hyper-Threading supported


Memory:
-------
* 64MB of RAM for Windows 98, 98SE, Me, 2000
(128MB or above is recommended)
* 128MB of RAM for Windows XP


For all installations:
----------------------
* Internet Explorer 6.0 with Service Pack 1 or above
* 100MB of available hard disk space for installation
* Adobe(TM) Acrobat(TM) is required to view documentation that is
provided in PDF format. You can download the free Acrobat Reader(TM)
software at http://www.adobe.com.
* RAID is not supported.
* A monitor with a resolution of 800 x 600 pixels or more, and
High Color (65536 colors) or more

how to install gta

My blog is about installing Grand theft Auto .Some people do wrongs about it.If anyone follow this he or she can do this easily .It is game installation instruction article
Insert Grand Theft Auto III disc one into the CD / DVD drive.
If you have Autoplay enabled then the setup routine will automatically
launch.
If you do not have Autoplay enabled, then use Explorer to navigate
Grand Theft Auto III disc one, and manually launch setup.exe

Footprint
Grand Theft Auto III requires approximately 700 MB of hard disk space.

Save Games
Grand Theft Auto III uses the “My Documents” directory of the currently
logged in user to store the “GTA3 USER FILES” directory. This is where
we store save games. This was chosen to allow each user on Windows 2000
or Windows XP to have their own saves.

Uninstallation
When Grand Theft Auto III is uninstalled, we do not delete the “MP3”,
“SKINS” and “GTA3 USER FILES” directories. It is up to the user to
remove these manually.

job aplication(phase-2)

how to write a job application below:
To,
The General Manager (Admin),
Dhaka Electric Supply Company (LTD),
Banani Model Town,
Dhaka-1213.


Subject : Prayer for the post of “Assistant”


Sir,

In response to your advertisement in daily Ittefaq dated 15th January in 2009 for the post of “Assistant” I beg to offer myself as one of the candidates . If you consider me I would be greatful to you.

May I therefore, hope and pray that you would be kind enough to consider me for the post.



Dated : 30-03-2009 Your faithfully


Md. Kudrat-E-Khuda

job aplication

how to write a job application shortly ,I have wanted to wrote it below .So that

nobody do not do mistake at writing job application easily within a shortest matter

of time. One can do it like below:::::

To,
The General Manager (Admin),
Dhaka Electric Supply Company (LTD),
Banani Model Town,
Dhaka-1213.


Subject : Prayer for the post of “Assistant”


Sir,

In response to your advertisement in daily Ittefaq dated 15th January in 2009 for the post of “Assistant” I beg to offer myself as one of the candidates . If you consider me I would be greatful to you.

May I therefore, hope and pray that you would be kind enough to consider me for the post.



Dated : 30-03-2009 Your faithfully


Md.A

environment pollution

Now a days ,Mouchak road is the busiest road in the city Dhaka.I see here the same problem as I face in the sadarghat area. I find here hardly any existence of trees . The whole area is full of multistoried buildings , shops and markets . the place is crowded with people . Mountebanks and hawkers are found canvassing their goods at the top of their voice through mikes which cause serious sound pollution . Traffic jam is a common scene here . No passenger knows when he will reach his destination . Moreover reckless driving often causes accident for which sometimes people fall a victim of unnatural death. The drivers of the vehicles drive their cars at their sweet well. Smoke emitted from buses, trucks , tempo and other motor vehicles polluted air for which people cant inhale fresh air. It is high time we took necessary measures to get rid of all these problems . The city corporation can play a vital role in this regard . Well planned spacious roads should be constructed to avoid traffic jam. Traffic rules should be imposed strictly so that the drivers are bound to obey them.

shot comment about tress

Now a trees are becoming a very important thing for the world.we should plant more trees to save this world from extinction. Trees are not too pricy . Some of it is cheap . We should plant more for many reasons . Trees are many kinds.

the harmful effects of TV

Today TV is the most important mode of entertainment to all classes and ages of people . In the towns and cities , there is hardly any house where there is not a TV set . Even in the villages , we see that wealthy persons have a TV set . But the young generation is badly addicted to it which set us thinking . Though , all the programmes on the TV are not harmful , we have to think what it is giving and taking away from our young generation . Young people most often watch the exciting films on violence and crime . They also see the obscene films . All these things leave a damaging effect on their soft mind . If once bad things lay root deeply in their soft mind , it will remain in their mind . They will try to commit crimes and violence in an aristocratic way and it needs no telling that young persons are going astray day by day. They are becoming addicted to narcotics . They don’t like any kind of educative programme. So, the guardian should be more cautious in the matter of running TV. They should allow their boys and girls to see only those programmes from which thy can derive much benefit and make the right use to build up their career. Again , we should not forget the proverb that forbidden things always taste sweet.

The bad sides of Dhaka city

Mouchak road is the busiest road in the city Dhaka.I see here the same problem as I face in the sadarghat area. I find here hardly any existence of trees . The whole area is full of multistoried buildings , shops and markets . the place is crowded with people . Mountebanks and hawkers are found canvassing their goods at the top of their voice through mikes which cause serious sound pollution . Traffic jam is a common scene here . No passenger knows when he will reach his destination . Moreover reckless driving often causes accident for which sometimes people fall a victim of unnatural death. The drivers of the vehicles drive their cars at their sweet well. Smoke emitted from buses, trucks , tempo and other motor vehicles polluted air for which people cant inhale fresh air. It is high time we took necessary measures to get rid of all these problems . The city corporation can play a vital role in this regard . Well planned spacious roads should be constructed to avoid traffic jam. Traffic rules should be imposed strictly so that the drivers are bound to obey them

শনিবার, ২৫ এপ্রিল, ২০০৯

picture

picture is a very improtant thing. It it is a necessary thing for job purpose , birth certificate, bank , college/university etc. everyone should have a picture of his/her own. Picture is various kinds .

how to cook

It is easy to cook . it needs to learn first to cooking expert how to cook about various iteams.

রবিবার, ১৯ এপ্রিল, ২০০৯

what is bijoy

bijoy is bangla writing software which has bee used by a lot of users. It works at every pc or laptop. It has got a lot of popularity in bangladesh. Bijoy software has a lot of font files. It is easy to install.