Showing posts with label Solutions. Show all posts
Showing posts with label Solutions. Show all posts




Hello folks Today I have tried to gather some common PC errors that we face and their temporary solutions. I hope you guys would love the post :)




1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data cables, RAM, Display Card , CPU connections.

2. CONTINUOUS THREE BEEPS

Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short)

Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE

Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOUS NON-STOP BEEPING

Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOUSLY
Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL

Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.

8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection

9. SHOWING CMOS ERROR

Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer­ CMOS Setup chart) Enter your search terms.Submit search form.

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY

Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.

13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem

14. SHAKING SCREEN

a. Earthing problem
b. Magnetic waves comes around.

15. CPU CABINET SHOCK

a. Check Earthing
b. Check main power cord.

16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM
The System files missing namely Ie; command.com} -User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR

May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set properly.
b. Operating system used for formatting is not valid.

20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED

a. Check Power Connector
b. Check Data Cables
c. Check Jumpers

24. PARTITION NOT SHOWN

Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.

25. MMX/DLL FILE MISSING
May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH

a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND

May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device...

Keep visiting : ) 
” Pen Drive is showing some error while you are pasting informaion into it and it was “Write Protected”, even I tried to format the Pen Drive still it was showing the same error.

Then lets continue this is FROG IN THE WATER

Gurr, Pen Drive should work now L L Then I used some of the commands to “remove the write protection from Pen Drive”

Step 1) Start Menu > Run > cmd.exe

Step 2) diskpart

Step 3) list disk

Step 4 & 5) select disk 1
Attributes disk clear readonly

 And whooaaa, Pen Drive is working very fine, now I can get all those images with me also if I want to have fun to with my friends I can convert their in to “Write Protected” mode only

Step 6) To setup a prank for your friend, you can make his/her Pen Drive Write Protected

Attributes disk set readonly Enjoy Hacking

Keep visiting :)
Hello folks, here is the solution for those who permanently delete their files and  after deleting they realize that deleting them is like a blunder.

Follow these steps to get back your deleted files:

1. Download “Kissass Undelete” software.
2. To start searching for the files, select the drive from the Left panel of the Windows and Click the scan button. The Scan might take up to 10 seconds.
3.When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.
4. Now you can select the file to be recovered.

Note: Only if the data on that drive is not re-occupied (or written). That means the space which was available after the deletion is not been occupied after the deletion.

keep visiting
Step 1: Create a system restore point just incase if something goes wrong you can roll back to the primary settings. Make a back up copy of explorer.exe in a safe place, maybe in a different folder. aa

Step 2: You would need to download a small freeware utility called Resource Hacker. "Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems." excerpt from Resource Hacker's Website


...............................................................................................................



Click This Download Link



Click here to download Resource Hacker
..................................................................................................................

Step 3: Open Resource Hacker utility. Click on File ---> Open. Type "explorer.exe" in the text box.




Step 4: Expand String Table --->  37 from the tree view and click on 1033 as shown in the figure below





Step 5: From the right window next to where start is written in front of 578 edit the text to what you want on your start button. For example I edited it to Wintipz as shown in the figure below:




Step 6: Click on the "Compile Script" button on top of the right window. Now click on File ---> Save as ----> wintipz.exe as shown in Figure Below:


..........................................................................................................................
Click This Download Link 



.......................................................................................................................... 


Step 7: Open registry editor by clicking on Start ---> Run and typing "regedit" at the text box. Navigate to HKEY_Local_Machine -> Software -> Microsoft -> Windows NT -> CurrentVersion -> Winlogon






From the right pane double click on shell and replace "explorer.exe" with "GDDon.exe" as shown in figure below and then exit registry editor:

Step 8: Restart your computer to see the changes.




Keep visiting :) 
hey guys. It often happen with us that whenever we try to Install any utility or try to play any game then it requires a large RAM than the currently installed in our system.
I'm sharing a simple trick by which you can treat your USB drive as Random Access Memory and can fulfill such requirements.
This Hack is also helpful in case you're running any Virtual Operating System. By increasing your RAM you can boost up all the present applications.

This trick actually varies with the Operating System. Here, I'm sharing both of the Tricks

For Windows 7/Vista:


  • Insert your USB drive.
  • Backup all its data and Format it using FAT32(default) file system
  • Right click on it > select properties
  • click on ReadyBoost tab
  • here click on Dedicate this device to ReadyBoost
  • Adjust the size to be used according to your need.


  • Click Apply. That's it enjoy the hack now.:)
For windows XP:

  • Insert your USB drive.
  • Backup all its data and Format it using FAT32(default) file system
  • Right Click on My Computer.
  • Click on Advanced tab then in the Performance section click on Settings.
  • In the new Box go to Advanced Tab.
  • In the Virtual memory section click on Change
  • Select your USB drive here, assuming its J:
  • Set the size according to your requirement.
  • Click Ok. Restart your PC to take effects.
Alternatively for Windows XP, you can also use a small software here called ebooster. Get it from here 


Keep Learning. Keep Rocking :) keep visiting 
  • To Boot Your USB Follow These Steps -:
  • Click on start..
  • Search cmd
  • Right Click On it
  • Then Click On Run as Administration
  • After Opening Cmd
  • A new windows Will apeear
  • Then Type DISK-PART      ............Then Press Enter
  • Insert Your Pen Drive then...
  • Type-:    List Disk   ......press enter
  • You See That Disk
  • Now  type-: Select Disk 1    ......press enter
  • Type-: Clean     ......press enter
  • Type-:  Create partition primary  ......press enter
  • Type-: Select partition 1
  • Type-: Select Partition 1   ......press enter
  • Type-: active   ......press enter
  • Type-: Format fs=ntfs quick     ......press enter
  • Type-: Assign      ......press enter

Copy Windows File and paste in Booted pen drive And Enjoy........
Hi guys. Sometimes its very irritating when you insert any USB and it shows many shortcuts of My Documents and all the important data and files become invisible. This is due to a shortcut virus. It is usually present in many computers of office, college or cyber cafes. Many of my friends are facing the problems with this virus. So here is a simple trick by which you can remove this virus from your pen drive.

  •     Open command prompt. go to start > run > type cmd.
  •     Insert your USB flash drive. Assuming it is drive I:
  •     In the command prompt window type the following code and hit enter
 attrib -h -r -s /s /d I:\*.*
 here replace I: with your drives name.
  •     That's it. Now you can see the magic that all your invisible files are back now.

You have successfully removed the shortcut virus from your pen drive.

Keep Learning. Keep Rocking. Keep Visiting !!
Format an Unformattable Pen Drive with simple DOS Command, Perhaps these days almost all of us are well aware of pen drives and use them a lot for files transfers from one PC to another or sometimes use them to listen music or videos stored on the flash drives. But sometimes the excess use of these pen drives from one PC to another results into infection with some rare viruses which cause them to malfunction like folders missing, capacity shown less or sometime we even couldn’t format it.
The reason for such a problem a virus residing in the pen drive makes the system busy so from windows environment it becomes hard to format it or access it properly. So below is the simple DOS command thru which you can easily format a pen drive :

  • Go to Start –> Run.
  • Type Cmd & press Enter.
  • Type the following command line
  • Format/x G:
  • Here G: refers to your removable disk drive letter.
  • Press Enter.
Now I hope your problem will be solved if in any case there is still a problem then I will advise you to download the best tool for pen drives “HP Format disk Utility” which is quite a very good application that can fix a lot of pen drive related problem. Below is the 
Download link: Download Pen Drive Format Utility

keep visiting  

Windows 7

Follow these steps to change your product key in Windows 7.

Note: If you bought an edition of Windows 7 other than what's installed on your PC—for example, if you purchased Windows 7 Home Premium, and Windows 7 Ultimate is now installed on your PC—you'll need to perform a custom installation to update your product key.

  • Click the Start button Picture of the Start button, right-click Computer, and then click Properties.
  • Scroll down to the bottom of the window that appears, and then, under Windows activation, click Change product key. If you're prompted for permission to continue the process, click Continue.
  • Follow the instructions to change your product key and activate your copy of Windows 7.

Windows Vista 

Follow these steps to change your product key in Windows Vista.
Note: If you bought an edition of Windows Vista other than what's installed on your PC—for example, if you purchased Windows Vista Home Premium, and Windows Vista Ultimate is now installed on your PC—you'll need to perform a custom installation to update your product key.

  • Click the Start button Picture of the Start button, right-click Computer, and then click Properties.
  • Scroll down to the bottom of the window that appears, and then, under Windows activation, click Change product key. If you're prompted for permission to continue the process, click Continue.




  • Follow the instructions to change your product key and activate your copy of Windows Vista.


  • Windows XP

     Follow these steps to change your product key in Windows XP.

    Note:‌ Microsoft recommends creating a > system restore point < before making any operating system changes.

      To update your product key
    •  Open the Windows Product Key Update Tool.
    •  When prompted to run or save the Windows Product Key Update Tool installer, click Run.
    •  Follow the instructions in the installer. 
    After updating your product key, you will be required to activate Windows XP. If you still have issues after running the tool or with activation, visit the Windows XP Solution Center on the Microsoft Support website for additional assistance.
    Step #1: Making a yahoo email. So for this method you will in fact need a yahoo email address.
    Note: when creating an account you will need to confirm your account via a mobile device. Once you have created your account: login.

    Step #2: Preparing to pull emails. Now navigate up to the top where it says "Mail", with a purple envelope next to it. Click it, and it should take you to your inbox. Once in your inbox, go to the top left and hit the "contacts" tab.

    Step #3: Getting the emails So once you have done all this, it comes to the easy part. Towards the middle of your screen you should see a main form where it asks you various ways to import contacts... (Yes you guessed it!) You click on "Import New" directly to the right of the Facebook icon

    As you proceed to do this, a Facebook pop-up will appear; asking you to login. Obviously you login. And That's it! All of your friends on your Facebook friends list will appear in your contacts. And the email they use to login will be displayed right under their name.


    1. Method – Using 3D-Analyze

    3D Analyze is a powerful application that allows to play many DirectX based games using video hardware officially unsupported and unable to run these.With it you can optimize efficiency, above all if your CPU will permit, although still with a low range card. This program supports Direct3D as much as OpenGL, whichever it may be to optimize your system.Now I’will show you how to install and configure 3D-Analyze main settings to play gamesfor this just follow the following steps:-

    • First of all download the 3D analyze.
    • Now install and run the 3D analyze.
    • Now click on select option as below and then a window opens where you have to select the exe file of the game which you wants to run
    • Now you can see names, vendorID and deviceID of different graphics cards. Select any one of them and enter the VendorID and DeviceID in the column at the left side.
    • Just click on Run button and Enjoy

                                                     2 Method – Using SwiftShader

    SwiftShader’s modular architecture is capable of supporting multiple application programming interfaces, such as DirectX® 9.0, and OpenGL® ES 2.0, the same APIs that developers are already using for existing games and applications. SwiftShader can therefore be directly integrated into applications without any changes to source code.It is also similar to 3D analyze.
    •     First of all download the SwiftShader.
    •     * Download Swiftshader 3.0 for x86bits
    •     * Download Swiftshader 3.0 for x64bits
    •     Now extract the zip file of SwiftShader.
    •     Now copy d3d9.dll file from the extracted folder.
    •     Paste the d3d9.dll file to the game’s directory.
    •     Just click on exe file of your game where you placed the d3d9.dll file and Enjoy !!

    How To Run Games Without Graphics Card 2015 – That’s it i am sure it will help you. If you are facing any problem then just comment below. Thanks, In this way you able to run games without graphics cards. Don’t forget to share with your friends





    1. Phishing scams

    Lucky you! A Nigerian prince has selected you to help smuggle millions out of his country. For a little bit of effort — a few simple wire transfers — you’ll get a substantial cut. What could be easier?

    I bet you’re asking yourself, “Who would fall for that?” Well, tens of thousands of people do every year. That’s why Nigerian scams, known as 419 scams, are still very popular.

    Other versions might say you won a contest or have a job offer. Maybe someone wants to meet you, or you can make money for shipping some goods.

    The catch is that you have to send in personal or banking information, or pay a fee. Of course, your information and money is going straight to hackers.

    Use common sense before reacting to any e-mail. Scams rely on making you act quickly. If you think about things long enough, you can usually see through them. Just remember the old saying, “If it looks too good to be true … ”

    2. Trojan horse

    Many hackers want to slip a virus on your computer. Once installed, a virus can record everything you type and send it back to the hacker. It can send out spam e-mail or attack other computers.

    To do this, the hackers disguise the virus as something harmless. This is called a Trojan horse, or just Trojan.

    One of the most popular ways to deliver a Trojan is a variation of the phishing e-mail scams.

    For example, the e-mail might say it’s from a shipping service, bank or other reputable company. There’s been a problem with a transaction! To learn more, you have to open an e-mail attachment.

    The attachment might look like a normal file, but it really contains a Trojan. Clicking on the file installs it before you can do anything.

    Similar scams appear on Facebook and Twitter. You think you’re going to watch a funny video your friend posted. Instead, a popup tells you to update your video player. The “update” file it provides is really a Trojan.

    The key to defeat this tactic, as with phishing e-mails, is common sense. However, up-to-date security software is essential as well. It should detect and stop most Trojans before they can install.

    3. Drive-by downloads

    Security software is good, but it isn’t always enough. Programs on your computer might have weaknesses that hackers can use to bypass security software.

    To take advantage of these weaknesses, hackers set up websites embedded with viruses. You might get there by clicking a malicious link in a phishing e-mail or on social media. You can even find these sites in a search for popular programs or topics.

    It isn’t just malicious sites, though. Hackers can sneak malicious code on to legitimate websites. The code scans your computers for security holes. If it finds one, a virus can download and install without you doing anything.

    To stay safe, you have to keep your programs up-to-date. Every month, Microsoft releases updates for Windows and Internet Explorer. These updates close critical security holes that hackers exploit.

    Other critical programs to patch are Adobe’s Flash and Reader, and Oracle’s Java. Using old versions of these programs is like sending hackers an engraved invitation.

    You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.

    4. Bypassing passwords

    In Hollywood movies, hackers are masters of guessing account passwords. In the real world, however, very few hackers bother.

    Instead, they go around passwords. They might get your password from a data breach at a company or website you use.

    It’s important that you use a different password for every account. That way, if a hacker discovers one, they can’t get in to every account.

    Perhaps the hacker slipped a virus on to your system. It records your passwords and sends them to the hacker; no guessing needed.

    As I mentioned above, you can stop viruses with up-to-date security software and programs.

    A hacker might tackle your account’s security question. Most security questions can be answered with information people post publicly.

    You should change how you answer security questions. Give a random answer that has nothing to do with the question. That way, no one can guess it.

    5. Using open Wi-Fi

    I’m sure you have a Wi-Fi network at home. Is it encrypted? If you don’t know the answer, then it’s probably, “no.”

    That means hackers, and neighbors, can connect to your network from outside. They can see and record everything you do. They can surf to bad websites and download illegal files on your connection. You might be getting a visit from the police.

    You need to take a few minutes and secure your network. Trust me; it’s worth it. The instructions will be in your Wi-Fi router’s manual.

    Script section code:


    <script src="http://ajax.googleapis.com/ajax/libs/jquery/1/jquery.min.js"></script>
    <script type="text/javascript">
    $(document).ready(function(){
        $("#button").click(function(){
            $("#img1").css("color", "red").slideUp(2000).slideDown(2000);
    $("#img2").css("color", "red").slideUp(2000).slideDown(2000);
    $("#img3").css("color", "red").slideUp(2000).slideDown(2000);
    $("#img4").css("color", "red").slideUp(2000).slideDown(2000);
        });
    });

    </script>

    CSS section code:

    <style type="text/css">
    #img1{
    float:left; height:400px; width:400px;
    }
    #img2{
    float:left; margin-left:10px; height:400px; width:400px;
    }
    .clear{
    clear:both;
    }
    #img3{
    float:left; height:400px; width:400px;
    }
    #img4{
    float:left; margin-left:10px; height:400px; width:400px; position:absolute;

    }

    Body section code:

    <input type="button" name="chaining" id="button" value="Click" />
    <div>
    <img src="Your path" id="img1" />
    </div>

    <div>
    <img src="Your path" id="img2" />
    </div>
    <div class="clear"></div><br />
    <div>
    <img src="Your path" id="img3" />
    </div>

    <div>
    <img src="Your path" id="img4" />

    </div>
    To animate image right to left you need to use jquey "animate" class in script.The code for animate image given below

    Script section code:

    <script src="http://ajax.googleapis.com/ajax/libs/jquery/1/jquery.min.js"></script>
    <script type="text/javascript">
    $(document).ready(function(){
        $("#button").click(function(){
            $("#img").animate({left: '500px'});
        });
    });

    </script>

    CSS section code:

    <style type="text/css">
    #img{
    position:absolute;
    }

    </style>

    Body section code:

    <input type="button" name="button" id="button" value="Start Animation" />

    <div id="img"><img src="Your image path" height="200" width="200" /></div>
    To animate up & down in php write below code in script section:

    <script src="http://ajax.googleapis.com/ajax/libs/jquery/1/jquery.min.js"></script>
    <script type="text/javascript">
    $(document).ready(function(){
        $("#down").click(function(){
            $("#img").animate({"top":"100px","left":"100px","height":"150px","width":"150px", "border-width":"3px solid #FF0000"},1000);
        });
    $("#up").click(function(){
            $("#img").animate({top:"0","left":"0","border-width":"1px solid #FF0000"},1000);
        });
    });
    </script>

    To animate up & down in php write below code in body section:

    <div>
    <input type="submit" name="down" id="down" value="Down" />
    <input type="submit" name="up" id="up" value="Up" /><br />
    <img src="Interval/3.jpg" id="img" />

    </div>

    For animation you need to write given style in css:

    <style type="text/css">
    #img{
    height:100px; width:100px; position:relative;
    border:1px solid #FF0000;
    }
    </style>

    Thanks for visit
    Give your feedback in comment

    1.flybutton.php:write below code in dreamweaver and save file with .php extension


    <!DOCTYPE html><html class=''>
    <head><meta charset='UTF-8'><meta name="robots" content="noindex"><link rel="canonical" href="http://codepen.io/adelbalso/pen/FwJcq/" />

    <link rel='stylesheet prefetch' href='//codepen.io/assets/reset/reset.css'>
    <style class="cp-pen-styles">* {
      -webkit-transition: all 0.15s;
      -moz-transition: all 0.15s;
      -o-transition: all 0.15s;
      -ms-transition: all 0.15s;
      transition: all 0.15s;
      outline: none;
    }
    button {
      font-size: 19px;
      font-family: 'Pacifico';
      overflow: visible;
      -webkit-border-radius: 3px;
      border-radius: 3px;
      position: relative;
      padding-right: 30px;
      background-color: #ecfbff;
      border: 2px solid #a6e0ee;
      color: #2d7586;
      display: block;
      margin: 13% auto;
      height: 60px;
      width: 200px;
      cursor: pointer;
    }
    button:hover {
      background-color: #ddf7ff;
    }
    button:hover svg {
      -webkit-transform: rotate(10deg);
      -moz-transform: rotate(10deg);
      -o-transform: rotate(10deg);
      -ms-transform: rotate(10deg);
      transform: rotate(10deg);
      -webkit-transition: -webkit-transform 0.15s;
      -moz-transition: -moz-transform 0.15s;
      -o-transition: -o-transform 0.15s;
      -ms-transition: -ms-transform 0.15s;
      transition: transform 0.15s;
    }
    button svg {
      position: absolute;
      top: 13px;
      right: 25px;
      height: 30px;
      width: auto;
      -webkit-transition: -webkit-transform 0.15s;
      -moz-transition: -moz-transform 0.15s;
      -o-transition: -o-transform 0.15s;
      -ms-transition: -ms-transform 0.15s;
      transition: transform 0.15s;
    }
    button svg path {
      fill: #2d7586;
    }
    button.clicked {
      background-color: #cff5b3;
      border: 2px solid #cff5b3;
      color: #6aaa3b;
      padding-right: 6px;
      -webkit-animation: bounce-in 0.3s;
      -moz-animation: bounce-in 0.3s;
      -o-animation: bounce-in 0.3s;
      -ms-animation: bounce-in 0.3s;
      animation: bounce-in 0.3s;
      cursor: default;
    }
    button.clicked svg {
      -webkit-animation: flyaway 1.3s linear;
      -moz-animation: flyaway 1.3s linear;
      -o-animation: flyaway 1.3s linear;
      -ms-animation: flyaway 1.3s linear;
      animation: flyaway 1.3s linear;
      top: -80px;
      right: -1000px;
    }
    button.clicked svg path {
      fill: #6aaa3b;
    }
    @-moz-keyframes flyaway {
      0% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 25px;
        height: 30px;
      }
      5% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 0px;
        height: 30px;
      }
      20% {
        -webkit-transform: rotate(-20deg);
        -moz-transform: rotate(-20deg);
        -o-transform: rotate(-20deg);
        -ms-transform: rotate(-20deg);
        transform: rotate(-20deg);
        top: 13px;
        right: -130px;
        height: 45px;
      }
      40% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: -40px;
        right: -280px;
        opacity: 1;
        -ms-filter: none;
        filter: none;
      }
      100% {
        -webkit-transform: rotate(60deg);
        -moz-transform: rotate(60deg);
        -o-transform: rotate(60deg);
        -ms-transform: rotate(60deg);
        transform: rotate(60deg);
        top: -200px;
        right: -1000px;
        height: 0;
        opacity: 0;
        -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=0)";
        filter: alpha(opacity=0);
      }
    }
    @-webkit-keyframes flyaway {
      0% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 25px;
        height: 30px;
      }
      5% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 0px;
        height: 30px;
      }
      20% {
        -webkit-transform: rotate(-20deg);
        -moz-transform: rotate(-20deg);
        -o-transform: rotate(-20deg);
        -ms-transform: rotate(-20deg);
        transform: rotate(-20deg);
        top: 13px;
        right: -130px;
        height: 45px;
      }
      40% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: -40px;
        right: -280px;
        opacity: 1;
        -ms-filter: none;
        filter: none;
      }
      100% {
        -webkit-transform: rotate(60deg);
        -moz-transform: rotate(60deg);
        -o-transform: rotate(60deg);
        -ms-transform: rotate(60deg);
        transform: rotate(60deg);
        top: -200px;
        right: -1000px;
        height: 0;
        opacity: 0;
        -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=0)";
        filter: alpha(opacity=0);
      }
    }
    @-o-keyframes flyaway {
      0% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 25px;
        height: 30px;
      }
      5% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 0px;
        height: 30px;
      }
      20% {
        -webkit-transform: rotate(-20deg);
        -moz-transform: rotate(-20deg);
        -o-transform: rotate(-20deg);
        -ms-transform: rotate(-20deg);
        transform: rotate(-20deg);
        top: 13px;
        right: -130px;
        height: 45px;
      }
      40% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: -40px;
        right: -280px;
        opacity: 1;
        -ms-filter: none;
        filter: none;
      }
      100% {
        -webkit-transform: rotate(60deg);
        -moz-transform: rotate(60deg);
        -o-transform: rotate(60deg);
        -ms-transform: rotate(60deg);
        transform: rotate(60deg);
        top: -200px;
        right: -1000px;
        height: 0;
        opacity: 0;
        -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=0)";
        filter: alpha(opacity=0);
      }
    }
    @keyframes flyaway {
      0% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 25px;
        height: 30px;
      }
      5% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: 13px;
        right: 0px;
        height: 30px;
      }
      20% {
        -webkit-transform: rotate(-20deg);
        -moz-transform: rotate(-20deg);
        -o-transform: rotate(-20deg);
        -ms-transform: rotate(-20deg);
        transform: rotate(-20deg);
        top: 13px;
        right: -130px;
        height: 45px;
      }
      40% {
        -webkit-transform: rotate(10deg);
        -moz-transform: rotate(10deg);
        -o-transform: rotate(10deg);
        -ms-transform: rotate(10deg);
        transform: rotate(10deg);
        top: -40px;
        right: -280px;
        opacity: 1;
        -ms-filter: none;
        filter: none;
      }
      100% {
        -webkit-transform: rotate(60deg);
        -moz-transform: rotate(60deg);
        -o-transform: rotate(60deg);
        -ms-transform: rotate(60deg);
        transform: rotate(60deg);
        top: -200px;
        right: -1000px;
        height: 0;
        opacity: 0;
        -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=0)";
        filter: alpha(opacity=0);
      }
    }
    @-moz-keyframes bounce-in {
      0% {
        padding-right: 30px;
      }
      40% {
        padding-right: 6px;
      }
      50% {
        padding-left: 30px;
      }
      100% {
        padding-left: 6px;
      }
    }
    @-webkit-keyframes bounce-in {
      0% {
        padding-right: 30px;
      }
      40% {
        padding-right: 6px;
      }
      50% {
        padding-left: 30px;
      }
      100% {
        padding-left: 6px;
      }
    }
    @-o-keyframes bounce-in {
      0% {
        padding-right: 30px;
      }
      40% {
        padding-right: 6px;
      }
      50% {
        padding-left: 30px;
      }
      100% {
        padding-left: 6px;
      }
    }
    @keyframes bounce-in {
      0% {
        padding-right: 30px;
      }
      40% {
        padding-right: 6px;
      }
      50% {
        padding-left: 30px;
      }
      100% {
        padding-left: 6px;
      }
    }
    </style></head><body>
    <link href='http://fonts.googleapis.com/css?family=Pacifico' rel='stylesheet' type='text/css'>
    <button>
      <p>Send</p>
      <svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 512 512" enable-background="new 0 0 512 512" xml:space="preserve">
        <path id="paper-plane-icon" d="M462,54.955L355.371,437.187l-135.92-128.842L353.388,167l-179.53,124.074L50,260.973L462,54.955z
    M202.992,332.528v124.517l58.738-67.927L202.992,332.528z"></path>
      </svg>
    </button>
    <script src='//assets.codepen.io/assets/common/stopExecutionOnTimeout.js?t=1'></script><script src='//cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js'></script>
    <script>
    $('button').click(function () {
        $(this).toggleClass('clicked');
        $('button p').text(function (i, text) {
            return text === 'Sent!' ? 'Send' : 'Sent!';
        });
    });
    //@ sourceURL=pen.js
    </script>
    <script src='//codepen.io/assets/editor/live/css_live_reload_init.js'></script>
    </body></html>

    2.flybutton.css:write below code in dreamweaver and save file with .css extension

    @import "nib"
    
    * {
      transition: all .15s;
      outline: none;  
    }
    
    button {
      font-size: 19px;
      font-family: 'Pacifico';
      overflow: visible;
      border-radius: 3px;
      position: relative;
      padding-right: 30px;
      background-color: #ECFBFF;
      border: 2px solid #A6E0EE;
      color: #2D7586;
      display: block;
      margin: 13% auto;
      height: 60px;
      width: 200px;
      cursor: pointer;
      
      &:hover {
        background-color: #DDF7FF;
        
        svg {
          transform: rotate(10deg);
          transition: transform .15s;
        }
      }
      
      svg {
        position: absolute;
        top: 13px;
        right: 25px;
        height: 30px;
        width: auto;
        transition: transform .15s;
        
        path {
          fill: #2D7586;
        }
      }
      
      &.clicked {
        background-color: #cff5b3;
        border: 2px solid #cff5b3;
        color: #6AAA3B;
        padding-right: 6px;
        animation: bounce-in .3s;
        cursor: default;
    
        svg {
          animation: flyaway 1.3s linear;
          top: -80px;
          right: -1000px;
          
          path {
            fill: #6AAA3B;
          }
        }
      }
    }
    
    @keyframes flyaway {
      0%   { transform: rotate(10deg);
             top: 13px;
             right: 25px;
             height: 30px; }
      5%   { transform: rotate(10deg);
             top: 13px;
             right: 0px;
             height: 30px; }
      20%   { transform: rotate(-20deg);
              top: 13px;
              right: -130px;
              height: 45px; }  
      40%   { transform: rotate(10deg);
              top: -40px;
              right: -280px;
              opacity: 1; }
      100% { transform: rotate(60deg);
             top: -200px;
             right: -1000px;
             height: 0;
             opacity: 0; }
    }
    
    @keyframes bounce-in {
      0% { padding-right: 30px; }
      40% { padding-right: 6px; }
      50% { padding-left: 30px; }
      100% { padding-left: 6px; }
    }
    In today's generation many people wants to know news related to technology.They want to know what is currently news related to technology.So today i'm going to give you top 10 websites to get news related to technology.

    1.Techcrunch.com:


    2.Thenextweb.com:


    3.Wired.com:



    4.Tech2.com

    5.Gizmodo.com


    6.Cnet.com


    7.Mashable.com:


    8.Theverge.com


    9.Digitaltrends.com:


    10.Techradar.com:


    Thanks for visit.
    Give me your suggestion about my blog.
    At this time in this world social media is very useful to connect with the people.You can expand your business with the use of social media by publish your ad.So,today i'm telling you top 10 best free classified websites to publish your ad.

    01.OLX
    02.Quikr
    03.Click.in
    04.Sulekha
    05.Craiglist
    06.Clickooz
    07.Locanto
    08.KhojLe
    09.VivaStreet
    10.Jagran Classifieds

    Given all websites will help you to publish your ad.
    Tell me if you like or don't my blog and share your reviews in comment.
    Thank You.

    In 1998, the founders of Google set out on a mission to do one thing: organize the world’s information. Google has come a long way since then, however, and so has digital media. Until recently, social media content was somewhat ephemeral: The more content that was created, the more possibilities got lost in the noise.
    Related: New Study Details Who Is Using Social Media and When
    But popular social networks are at last creating order from the chaos, and turning social media content into a powerful research resource for advertisers.
    Social media, after all, is rich with user-generated content from digital creatives, businesses and brands. The effect has been an overwhelming deluge of information about the world, but more specifically, the kinds of things people worldwide tend to be buzzing about on any particular day.
    This data can be particularly useful for marketers looking for timely consumer trends and new ways to engage with online audiences.
    At any given moment, social media users are talking about a multitude of topics; however, the most engaged conversations bubble to the top and become trending topics. From Twitter and Facebook, to newer players like Instagram and Snapchat, each social network has evolved to represent trends unique to its own platform. As new and improved search functions have continue to emerge, each network has shown itself to be useful for different types of research:

    1. Twitter: real-time trends

    Twitter is perhaps the best network for researching real-time trends and conversations. This is true for a variety of topics, but especially for sports, news and entertainment. In fact, the average Twitter user is mostly engaged in conversations around large-scale live events; Twitter's hashtag system turns keywords into search results. Journalists, media personalities and publications are all very active on Twitter, which makes it an excellent resource for collecting real-time commentary from publishers large and small.
    Recently, Twitter took another step by becoming the owner of a live-content category: It allowed Periscope streaming video to play directly in feeds. This move came on the heels of the “Moments” feature which launched in late 2015 and collates all breaking stories in one central tab. Such moves point to the platform’s ongoing strategy to capitalize on its real-time nature.

    2. Facebook: trend evolution

    Facebook hasn’t always been the most searchable social network, but it recently announced an improved search tool, with suggestions and results from public posts, and posts from friends. Where Twitter thrives in the moment, conversations and trending topics seem to have a longer life span on Facebook. This could be useful for researching how a conversation shifts and evolves over time.
    Remember, though, that your Facebook search results will show only public content, or content from your friends. So, while Facebook is the biggest social network, most of its public posts will likely come from publications, businesses and public figures, while regular users likely have their posts set to private, rendering them unsearchable.
    Related: How to Use Social Media to Ethically 'Stalk' Competitors and Job Candidates

    3. Instagram and Pinterest: trends In visual mobile content

    Pinterest and Instagram are both image-based platforms, which means they’re most useful for finding pictures related to certain topics. Instagram revamped its application in June last year to allow for easier image discovery: This means that users are able to discover trending hashtags and explore new posts based on what they already follow and like.
    While Instagram’s search is powered mostly by hashtags, Pinterest has become a well-organized archive of visual content searchable through careful user curation and smart infrastructure. Indeed, Pinterest has become a visual-search engine; most recently, the network released a new tool that lets you zoom in on a part of an image and find similar Pins.
    The disappearing feature with Snapchat makes it difficult for brands to do a post-mortem analysis of what content is being created and what is trending. But, a quick look at the “live” section offers an idea of how people get involved with pop culture events like the VMA Awards and how people from certain geographic locations use Snapchat.
    Recently, there was news that a Snapchat API (application program interface) might be in the works, which could present interesting opportunities for advertisers to identify trending “snaps.”
    Related: How to Build a Social-Media Strategy That Works
    In a nutshell, brands that actively and regularly monitor social trends will uncover invaluable insights on what types of content appeal to people, which will greatly inform their content strategy -- and, eventually, brand positioning in the long run.

    The fact that the entire month of October has been designated Cyber Security Awareness Month speaks volumes to its importance – other causes are often only granted a day or a week of observance, if they are lucky. Due to its size and daunting nature, cyber security and the issues surrounding it has been given an entire month.
    Of course, cyber security is something that needs to be employed constantly, 24 hours a day and 365 days a year. Despite its criticality, however, cyber security doesn’t have to be scary.  By taking a few simple precautions, maintaining a clear head and utilizing some good old-fashioned common sense, you can go a long way towards keeping yourself and your identity safe from cyber criminals.
    Here are our top five tips on protecting your online identity:
    1. Secure your devices.  It is surprising how many people don’t use password protection or some kind of PIN on their devices.  This is a crucial first step barrier, whether it is your phone, tablet or PC.  Make sure your screen locks quickly when you are inactive, and that a password, PIN or – if it has the technology – a fingerprint scan is needed to turn the device on again.  It should go without saying: choose your passwords carefully. They should be easy for you to remember, but hard for others to guess.
    2. Your personal information is like your money.  Value it, protect it and only give it to people you trust.  It’s not just your bank details we are talking about - you also need to protect your full name, address and date of birth, not allowing them to be too freely available.  When you are signing up for a new app on your smartphone, take a moment to find out exactly what data that app is going to collect about you – does the fantasy football app really need to access your location or your browser history, for example? Your data is important and valuable – keep it safe.
    3. Keep it clean and current.  Whatever device you are using, keeping it clean and keeping it up to date is important.  You can keep it clean by deleting old apps and clearing out the memory from time to time.  We quite often download an app for a special occasion or activity – maybe a holiday or an event we are attending. Deleting the apps we no longer use not only frees up device memory and may improve the speed of our devices, it also stops those apps from continuing to report on your activity.  While making sure you delete the old apps, do make sure you install the latest updates of the apps you are using, especially those for the operating system and for any security software you are running - they often include security updates.
    4. Does that need to be on?  When you are out and about, some stores and other locations will track your movements using the Bluetooth or Wi-Fi signal from your phone.  Unless you are actually using those connections yourself, do they need to be on?  Switching off Wi-Fi and Bluetooth when you are not using them will not only stop people from tracking you, it will also save you some battery power and give you longer time between charges.  Regarding Wi-Fi, be careful about the services you connect with and what you do on them.  Public hotspots and offers of “free Wi-Fi” can be very convenient, but they can also be rather insecure and maybe not the best connection to use if you want to log into your bank account.
    5. Be sensible, be secure.  Whenever you are about to undertake any financial transaction, ask yourself these questions: is it secure, and do I really know who I am dealing with?  On web addresses, look for ones that begin “https://” or “shttp://”. In both cases that “s” stands for “secure” and means the site takes extra care to protect your information.  Sites that do not have the “s” are less secure.  Also, watch out for those text messages, emails and voice recordings from “friends” who need money urgently, or from web sites demanding payments or that you confirm your details.  Be certain about the outcome before you send any money – never simply click on a link you have been sent to re-register.

    Keeping safe in the online world is much the same as keeping safe in the real world.  Deal with people you trust, and look after your data and your device as much as you do your cash and your wallet.  Verizon Eneterprises' 2015 Data Breach Investigations Report has a great deal of useful information to help you stay protected.
    Previous PostOlder Posts Home