Kings XI Punjab v Rajasthan Royals, IPL

Sunday, April 26, 2009


  1. Kings XI Punjab 139 for 6
  • Sangakkara 60
  • Irfan 39
  1. Rajasthan Royals 112 for 7
  • Jadeja 37
  • Abdulla 3-21
  • Irfan 2-26


Result-Kings XI Punjab beat Rajasthan Royals by 27 runs

Analysis
Two pairs of left-handers played key roles as Kings XI Punjab steamrolled Rajasthan Royals in Cape Town. Punjab struggled after early losses and it was left to Kumar Sangakkara to weigh in with his first half-century of the tournament and the star of the day,
Irfan Pathan, to provide the momentum for a fightback. Then, defending a total of 139, Punjab were indebted to double-wicket overs from Irfan and Yusuf Abdulla at the start. Both left-arm seamers did a sterling job under the Newlands lights, mixing their line and length impressively to check a shaky batting line-up. Rajasthan, who had set themselves a realistic chance of victory in the field fell 27 runs short. Rajasthan's chase of 140 wasn't a tall order, but their fate was sealed by a rampant left-arm seam attack who snaffled four wickets in the first five overs. Having contributed with the bat, Irfan grabbed two wickets in his opening over. He drew a top edge from Swapnil Asnodkar with a short ball and produced a thin edge off Graeme Smith's bat with a fuller, away-swinging delivery. Rajasthan were 9 for 2. Yuvraj Singh had opened the bowling with Ramesh Powar but Irfan's success encouraged him to go for an all-pace attack. Adbulla's first over was tidy, costing just six, and his second was disastrous for Rajasthan. Rob Quiney got a faint tickle on one down the leg side and a leaden-footed Dimitri Mascarenhas heard the death rattle second ball when he played around an offcutter. That left Rajasthan 27 for 4, anxiously needing a partnership and Yusuf Pathan - Man of the Match in their last game - to fire. Yusuf began by picking his brother for a couple fours only to perish sweeping in Piyush Chawa's first over. Another bowling change had worked and Punjab were all over Rajasthan. Chawla tossed it up and was rewarded with another wicket. The asking-rate kept increasing and it proved too much for Ravindra Jadeja (37) and Shane Warne, who scampered smart singles but couldn't find the boundaries during their 60-run association. Abdulla came back with Rajasthan needing 38 from two overs and cleaned up Jadeja first ball. Irfan gave just six in the last over to cap a great game. That Rajasthan didn't manage one six told a story. Irfan's two early wickets were crucial defending a small total but that could have been smaller without his contribution with the bat when Punjab were four down for not much. Karan Goel was run out first ball - the second time in the day a wicket had fallen in that manner - before Kamran Khan and Munaf Patel struck. Warne's decision to use each of his pace bowlers in one-over bursts worked wonderfully. There were no consecutive overs for any bowler from the Wynberg end and each time Kamran and Munaf came back they struck first ball. Kamran removed Ravi Bopara courtesy an athletic dive from Munaf at mid-on and Munaf rcame back to dismiss Yuvraj with one that swung way. Punjab slipped to 48 for 4 when Mahela Jayawardene scooped Munaf to a sliding Kamran at mid-off. It was Irfan who provided much-needed ammunition. He wasn't always assured against spin, but backing himself to swing freely through the on side he helped Punjab rebuild. Warne and Yusuf were hit for a six each by Irfan, the quicker deliveries were smartly worked square on the off side, and a handy partnership of 75 in 59 balls had begun. Irfan kept up the momentum with some sweetly-timed strokes on the off side, the best of the lot being a cut off Warne when he came back on. Sangakkara's 60 held the innings together. So often a calm, controlled batsman, he combined his usual elegance with a range of aggressive shots; cutting deftly, pulling powerfully and even launching Warne into a raucous crowd. Mascarenhas found just a hint of swing but too often served up four-balls; Sangakkara took him for three cracking boundaries. A powerful partnership had set up a final flourish but Rajasthan dismissed Irfan and Sangakkara in the 19th over to set themselves a gettable target. But in the end there was no denying Punjab, piloted to victory by the all-round heroics of Irfan, their brightest star

Read more...

Bangalore Royal Challengers v Delhi Daredevils, IPL

  1. Delhi Daredevils 150 for 4
  • Dilshan 67*
  1. Bangalore Royal Challengers 149 for 7
  • Pietersen 37
  • Nehra 2-34

Result-Delhi Daredevils beat Bangalore Royal Challengers by six wickets

Analysis

For a while it looked like Delhi Daredevils' batsmen had been a tad complacent while chasing a modest target, which Bangalore Royal Challengers' bowlers defended tenaciously, but an unbeaten half-century from Tillakaratne Dilshan completed their third consecutive win in the tournament. The six-wicket victory took Delhi level with Deccan Chargers on top of the points table, with six each.
The only highlight for Bangalore, who suffered their fourth consecutive defeat, was the performance of their weak bowling attack, who kept them in the game longer than most people expected. Their top-order batsmen, despite changes to personnel and order, disappointed once again. Their overseas players failed to fire, and their fielding went to pieces just when they had a sniff at pulling off an upset win.
Delhi lost their openers, Virender Sehwag and Gautam Gambhir, early and Dilshan and AB de Villiers went about chasing the target of 150 calmly. They hardly attempted expansive shots, preferring instead to play the ball into gaps and run swiftly between the wickets. The spinners, Anil Kumble and KP Appanna, bowled a tight line and length and conceded few boundaries. As a result Delhi had scored only 64 for 2 after 10 overs but the equation - 86 runs off the last 10 - was manageable.
Dilshan was perhaps lucky to survive a run-out appeal soon after the tactical time-out. He was short of his crease when Ross Taylor's throw hit the stumps, but the third umpire was not convinced that Boucher had not broken the stumps with his glove before the ball found its target. de Villiers, however, fell soon after, bowled by a delivery from Appanna that turned past the bat from outside leg to hit leg stump. Dinesh Karthik started brightly, clouting a four and a six, but fell soon after, caught by Jacques Kallis at deep cover, and left Delhi at 106 for 4.
At this point Bangalore had 43 runs to defend in the last four overs. That was when they needed to raise their game but their fielding let them down during the 17th over, which was bowled by Kallis. Dilshan took a single after smashing the third ball out of St George's Park, and Mithun Manhas lofted the next towards long-on. Robin Uthappa, who's having a nightmare of a tournament with the bat, misjudged the catch: he came in too far only for the ball to fly over his head for four. Manhas pulled the next ball to deep midwicket where Appanna mis-fielded to allow another boundary. Delhi scored 19 runs off the over, needed only 24 off the last three, which they managed with ease.
Delhi's batsmen have been their strength so far in the tournament, but today their bowlers laid the platform for victory by restricting Bangalore to 149. They were challenged by Pietersen and Taylor during an aggressive partnership, but the two spinners, Daniel Vettori and Amit Mishra, struck on either side of the strategic time-out to throw Bangalore off course.
Delhi's dominance began with the first ball of the match. Dirk Nannes produced a perfectly pitched delivery which angled across Kallis, who had replaced Jesse Ryder as opener. Kallis thought the ball could be left and shouldered arms, only to hear it clip the top of off stump. It was the fifth time in five matches that a Bangalore opener had been dismissed for a duck.
Uthappa had scored 32 runs in four innings at a strike-rate of 71 before today, but Bangalore have almost no option but to play him. His innings ended on 3 when he top-edged a pull off the front foot against Ashish Nehra, when he should have been playing back.
Pietersen had said at the toss that he "had to do something today". He and Taylor made slow starts, but stepped up a gear against Nehra in the fourth over. Bangalore were 45 for 2 after the Powerplay at which point Virender Sehwag introduced spinners from both ends. Mishra was able to tie the batsmen down, but Vettori wasn't. Taylor cut him deftly for four, and Pietersen charged and hit him over long-on to take 13 runs off his compatriot's first over. In his second, Pietersen swept powerfully to the boundary but a moment's rashness cost him his wicket the very next delivery. Pietersen attempted to switch-hit Vettori's quicker ball through midwicket, but missed and was bowled, falling for 37 in the last over before the tactical time-out.
Mishra dealt Bangalore a crippling blow in the first over after the break, trapping Taylor leg before with a googly. Bangalore were struggling at 78 for 4, but managed to reach 149 largely due to Boucher's blows over the leg-side boundary in the penultimate over.

Read more...

VOIP


Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. Some VoIP services may only allow you to call other people using the same service, but others may allow you to call anyone who has a telephone number - including local, long distance, mobile, and international numbers. Also, while some VoIP services only work over your computer or a special VoIP phone, other services allow you to use a traditional phone connected to a VoIP adapter.

Working of VOIP

VoIP services convert your voice into a digital signal that travels over the Internet. If you are calling a regular phone number, the signal is converted to a regular telephone signal before it reaches the destination. VoIP can allow you to make a call directly from a computer, a special VoIP phone, or a traditional phone connected to a special adapter. In addition, wireless "hot spots" in locations such as airports, parks, and cafes allow you to connect to the Internet and may enable you to use VoIP service wirelessly.

Equipments needed for VOIP

A broadband (high speed Internet) connection is required. This can be through a cable modem, or high speed services such as DSL or a local area network. A computer, adaptor, or specialized phone is required. Some VoIP services only work over your computer or a special VoIP phone, while other services allow you to use a traditional phone connected to a VoIP adapter. If you use your computer, you will need some software and an inexpensive microphone. Special VoIP phones plug directly into your broadband connection and operate largely like a traditional telephone. If you use a telephone with a VoIP adapter, you'll be able to dial just as you always have, and the service provider may also provide a dial tone.

Advantages of VOIP

  • Some VoIP services offer features and services that are not available with a traditional phone, or are available but only for an additional fee.
  • You may also be able to avoid paying for both a broadband connection and a traditional telephone line.

Disadvantages of VOIP

  • Some VoIP services don't work during power outages and the service provider may not offer backup power.
  • Not all VoIP services connect directly to emergency services through 9-1-1. For additional information,
  • VoIP providers may or may not offer directory assistance/white page listings.

VOIP queries

  • Can I Take My Phone Adapter with me When I Travel?

Some VoIP service providers offer services that can be used wherever a high speed Internet connection available. Using a VoIP service from a new location may impact your ability to connect directly to emergency services through 9-1-1. For additional information, see VoIP & 911 Advisory.

  • Does my Computer Have to be Turned on?

Only if your service requires you to make calls using your computer. All VoIP services require your broadband Internet connection to be active.

  • How Do I Know If I have a VoIP phone Call?

If you have a special VoIP phone or a regular telephone connected to a VoIP adapter, the phone will ring like a traditional telephone. If your VoIP service requires you to make calls using your computer, the software supplied by your service provider will alert you when you have an incoming call.

  • Does the FCC Regulate VoIP?

In June 2005 the FCC imposed 911 obligations on providers of “interconnected” VoIP services – VoIP services that allow users generally to make calls to and receive calls from the regular telephone network. You should know, however, that 911 calls using VoIP are handled differently than 911 calls using your regular telephone service. Please see our consumer fact sheet on VoIP and 911 services for complete information on these differences.

Read more...

How To Add Flash Animated Label Cloud Widget For Blogger

Saturday, April 25, 2009

This is very nice widget designed byAmanda Fazani (www.bloggerbuster.com)

If you like this widget follow simple steps below.

1.Log in to your dashboard--> layout- -> Edit HTML

2.Without "Expand Widget Templates",Scroll down to where you see this:-



3.Now Paste the below codes immediately after the above code.








<object type="application/x-shockwave-flash" data="http://halotemplates.s3.amazonaws.com/wp-cumulus-example/tagcloud.swf" width="250" height="200" allowscriptaccess="always" >
<param name="movie" value="http://halotemplates.s3.amazonaws.com/wp-cumulus-example/tagcloud.swf" />
<param name="bgcolor" value="#ffffff" />
<param name="flashvars" value="tcolor=0x000000&mode=tags&distr=true&tspeed=100&tagcloud=<tags>



</tags>" />
<p>Blogumulus by <a href='http://www.roytanck.com/'>Roy Tanck</a> and <a href='http://www.bloggerbuster.com'>Amanda Fazani</a></p>
</object>








4.Click on "Save Templates" and Refresh your site.

Read more...

How To Replace Newer, Home and Older Post Link With your own Images

First you must upload these 3 images to your hosting image service.Replace "URL of your own image" with your real Urls

1.Log in to your dashboard--> layout- -> Edit HTML

2.Click on "Expand Widget Templates"

3.Now follow these steps to replace codes :-

(A)Scroll down to where you see this:-

<data:newerPageTitle/>

Replace above line with



(B)Scroll down to where you see this:-



Replace above line with



(C)Scroll down to where you see this:-



Replace above line with



4.Click on "Save Templates" and Refresh your site.

Read more...

Play Real Media Files Without Real Player



Here is a free software called Real Alternative that is capable of playing RealAudio files like .ra .rpm, RealMedia files like .rm .ram .rmvb .rpx .smi .smil, RealText files like .rt and ReadPix files like .rp. This player can perform almost all the functions that real player can and also have some more advantages over Real Player :



  • Quick and easy install
  • It’s easy to make an unattended installation
  • Proper uninstallation
  • No background processes
  • Use a player of your own choice
  • Low on resources
  • No advertising, no registration forms, nothing annoying

ALERT : Click here to download this application.

Read more...

Best Audio Converter : Convert All Your Audio Files With A Single Tool


A powerful audio converter called XreCode that will convert almost every audio to your desired format. Below is a list that I found on their official website :

  • M4A to WMA, M4A to OGG, M4A to WAV, M4A to FLAC, M4A to APE, M4A to AAC, M4A to ALAC (M4A), M4A to Wavpack
  • M4B to WMA, M4B to OGG, M4B to WAV, M4B to FLAC, M4B to APE, M4B to AAC, M4B to ALAC (M4A), M4B to Wavpack
  • MP3 toWMA, MP3 to OGG, MP3 to WAV, MP3 to FLAC, MP3 to APE, MP3 to AAC, MP3 to ALAC (M4A), MP3 to Wavpack
  • WMA to MP3, WMA to OGG, WMA to WAV, WMA to FLAC, WMA to APE, WMA to AAC, WMA to ALAC (M4A), WMA to Wavpack
  • OGG to MP3, OGG to WMA, OGG to WAV, OGG to FLAC, OGG to APE, OGG to AAC, OGG to ALAC (M4A), OGG to Wavpack
  • WAV to MP3, WAV to WMA, WAV to OGG, WAV to FLAC, WAV to APE, WAV to AAC, WAV to ALAC (M4A), WAV to Wavpack
  • FLAC to MP3, FLAC to WMA, FLAC to OGG, FLAC to WAV, FLAC to APE, FLAC to AAC, FLAC to ALAC (M4A), FLAC to Wavpack
  • APE to MP3, APE to WMA, APE to OGG, APE to WAV, APE to FLAC, APE to AAC, APE to ALAC (M4A), APE to Wavpack
  • MPC to MP3, MPC to WMA, MPC to OGG, MPC to WAV, MPC to FLAC, MPC to AAC, MPC to ALAC (M4A), MPC to Wavpack
  • RealAudio (ra,rm) to WMA, RealAudio (ra,rm) to OGG, RealAudio (ra,rm) to WAV, RealAudio (ra,rm) to FLAC, RealAudio (ra,rm) to APE, RealAudio (ra,rm) to AAC, RealAudio (ra,rm) to ALAC (M4A), RealAudio (ra,rm) to Wavpack
  • Wavpack to MP3, Wavpack to WMA, Wavpack to OGG, Wavpack to WAV, Wavpack to FLAC, WavPack to AAC, WavPack to ALAC (M4A), Wavpack to APE
  • DTS to FLAC, DTS to WAV, DTS to OGG
  • Big WAV, FLAC, APE, WMA, WavPack files to small ones using CUE file

Moreover it can extract audio from video files also and also supports file splitting. According to me its the best converting tool and is a must have application.

ALERT : Click here to download this application from the official website.

Read more...

A to Z Windows command

Wednesday, April 22, 2009

A

  1. ARP Address Resolution Protocol
  2. ASSOC Change file extension associations
  3. ASSOCIAT One step file association
  4. AT Schedule a command to run at a later time
  5. ATTRIB Change file attributes
B
  1. BOOTCFG Edit Windows boot settings
  2. BROWSTAT Get domain, browser and PDC info
C
  1. CACLS Change file permissions
  2. CALL Call one batch program from another
  3. CD Change Directory - move to a specific Folder
  4. CHANGE Change Terminal Server Session properties
  5. CHKDSK Check Disk - check and repair disk problems
  6. CHKNTFS Check the NTFS file system
  7. CHOICE Accept keyboard input to a batch file
  8. CIPHER Encrypt or Decrypt files/folders
  9. CleanMgr Automated cleanup of Temp files, recycle bin
  10. CLEARMEM Clear memory leaks
  11. CLIP Copy STDIN to the Windows clipboard.
  12. CLS Clear the screen
  13. CLUSTER Windows Clustering
  14. CMD Start a new CMD shell
  15. COLOR Change colors of the CMD window
  16. COMP Compare the contents of two files or sets of files
  17. COMPACT Compress files or folders on an NTFS partition
  18. COMPRESS Compress individual files on an NTFS partition
  19. CON2PRT Connect or disconnect a Printer
  20. CONVERT Convert a FAT drive to NTFS.
  21. COPY Copy one or more files to another location
  22. CSVDE Import or Export Active Directory data
D
  1. DATE Display or set the date
  2. Dcomcnfg DCOM Configuration Utility
  3. DEFRAG Defragment hard drive
  4. DEL Delete one or more files
  5. DELPROF Delete NT user profiles
  6. DELTREE Delete a folder and all subfolders
  7. DevCon Device Manager Command Line Utility
  8. DIR Display a list of files and folders
  9. DIRUSE Display disk usage
  10. DISKCOMP Compare the contents of two floppy disks
  11. DISKCOPY Copy the contents of one floppy disk to another
  12. DNSSTAT DNS Statistics
  13. DOSKEY Edit command line, recall commands, and create macros
  14. DSADD Add user (computer, group..) to active directory
  15. DSQUERY List items in active directory
  16. DSMOD Modify user (computer, group..) in active directory

E

  1. ECHO Display message on screen
  2. ENDLOCAL End localisation of environment changes in a batch file
  3. ERASE Delete one or more files
  4. EXIT Quit the CMD shell
  5. EXPAND Uncompress files
  6. EXTRACT Uncompress CAB files
F
  1. FC Compare two files
  2. FDISK Disk Format and partition
  3. FIND Search for a text string in a file
  4. FINDSTR Search for strings in files
  5. FOR Conditionally perform a command several times
  6. FORFILES Batch process multiple files
  7. FORMAT Format a disk
  8. FREEDISK Check free disk space (in bytes)
  9. FSUTIL File and Volume utilities
  10. FTP File Transfer Protocol
  11. FTYPE Display or modify file types used in file extension associations

G

  1. GLOBAL Display membership of global groups
  2. GOTO Direct a batch program to jump to a labelled line
H
  1. HELP Online Help
  2. HFNETCHK Network Security Hotfix Checker
I
  1. IF Conditionally perform a command
  2. IFMEMBER Is the current user in an NT Workgroup
  3. IPCONFIG Configure IP
K
  1. KILL Remove a program from memory
L
  1. LABEL Edit a disk label
  2. LOCAL Display membership of local groups
  3. LOGEVENT Write text to the NT event viewer.
  4. LOGOFF Log a user off
  5. LOGTIME Log the date and time in a file
M
  1. MAPISEND Send email from the command line
  2. MEM Display memory usage
  3. MD Create new folders
  4. MODE Configure a system device
  5. MORE Display output, one screen at a time
  6. MOUNTVOL Manage a volume mount point
  7. MOVE Move files from one folder to another
  8. MOVEUSER Move a user from one domain to another
  9. MSG Send a message
  10. MSIEXEC Microsoft Windows Installer
  11. MSINFO Windows NT diagnostics
  12. MSTSC Terminal Server Connection (Remote Desktop Protocol)
  13. MUNGE Find and Replace text within file(s)
  14. MV Copy in-use files
N


  1. NET Manage network resources
  2. NETDOM Domain Manager
  3. NETSH Configure network protocols
  4. NETSVC Command-line Service Controller
  5. NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
  6. NETSTAT Display networking statistics (TCP/IP)
  7. NOW Display the current Date and Time
  8. NSLOOKUP Name server lookup
  9. NTBACKUP Backup folders to tape
  10. NTRIGHTS Edit user account rights

P

  1. PATH Display or set a search path for executable files
  2. PATHPING Trace route plus network latency and packet loss
  3. PAUSE Suspend processing of a batch file and display a message
  4. PERMS Show permissions for a user
  5. PERFMON Performance Monitor
  6. PING Test a network connection
  7. POPD Restore the previous value of the current directory saved by PUSHD
  8. PORTQRY Display the status of ports and services
  9. PRINT Print a text file
  10. PRNCNFG Display, configure or rename a printer
  11. PRNMNGR Add, delete, list printers set the default printer
  12. PROMPT Change the command prompt
  13. PsExec Execute process remotely
  14. PsFile Show files opened remotely
  15. PsGetSid Display the SID of a computer or a user
  16. PsInfo List information about a system
  17. PsKill Kill processes by name or process ID
  18. PsList List detailed information about processes
  19. PsLoggedOn Who’s logged on (locally or via resource sharing)
  20. PsLogList Event log records
  21. PsPasswd Change account password
  22. PsService View and control services
  23. PsShutdown Shutdown or reboot a computer
  24. PsSuspend Suspend processes
  25. PUSHD Save and then change the current directory

Q

  1. QGREP Search file(s) for lines that match a given pattern.
R
  1. RASDIAL Manage RAS connections
  2. RASPHONE Manage RAS connections
  3. RECOVER Recover a damaged file from a defective disk.
  4. REG Read, Set or Delete registry keys and values
  5. REGEDIT Import or export registry settings
  6. REGSVR32 Register or unregister a DLL
  7. REGINI Change Registry Permissions
  8. REM Record comments (remarks) in a batch file
  9. REN Rename a file or files.
  10. REPLACE Replace or update one file with another
  11. RD Delete folder(s)
  12. RDISK Create a Recovery Disk
  13. RMTSHARE Share a folder or a printer
  14. ROBOCOPY Robust File and Folder Copy
  15. ROUTE Manipulate network routing tables
  16. RUNAS Execute a program under a different user account
  17. RUNDLL32 Run a DLL command (add/remove print connections)

S

  1. SC Service Control
  2. SCHTASKS Create or Edit Scheduled Tasks
  3. SCLIST Display NT Services
  4. ScriptIt Control GUI applications
  5. SET Display, set, or remove environment variables
  6. SETLOCAL Begin localisation of environment changes in a batch file
  7. SETX Set environment variables permanently
  8. SHARE List or edit a file share or print share
  9. SHIFT Shift the position of replaceable parameters in a batch file
  10. SHORTCUT Create a windows shortcut (.LNK file)
  11. SHOWGRPS List the NT Workgroups a user has joined
  12. SHOWMBRS List the Users who are members of a Workgroup
  13. SHUTDOWN Shutdown the computer
  14. SLEEP Wait for x seconds
  15. SOON Schedule a command to run in the near future
  16. SORT Sort input
  17. START Start a separate window to run a specified program or command
  18. SU Switch User
  19. SUBINACL Edit file and folder Permissions, Ownership and Domain
  20. SUBST Associate a path with a drive letter
  21. SYSTEMINFO List system configuration

T

  1. TASKLIST List running applications and services
  2. TIME Display or set the system time
  3. TIMEOUT Delay processing of a batch file
  4. TITLE Set the window title for a CMD.EXE session
  5. TOUCH Change file timestamps
  6. TRACERT Trace route to a remote host
  7. TREE Graphical display of folder structure
  8. TYPE Display the contents of a text fileUSRSTAT List domain usernames and last login
V

  1. VER Display version information
  2. VERIFY Verify that files have been saved
  3. VOL Display a disk label

W

  1. WHERE Locate and display files in a directory tree
  2. WHOAMI Output the current UserName and domain
  3. WINDIFF Compare the contents of two files or sets of files
  4. WINMSD Windows system diagnostics
  5. WINMSDP Windows system diagnostics II
  6. WMIC WMI Commands
X
  1. XCACLS Change file permissions
  2. XCOPY Copy files and folders

Read more...

MS Word shortcuts

  1. [Alt]+[F] Office Button
  2. [Alt]+[H] Home tab
  3. [Alt]+[N] Insert tab
  4. [Alt]+[P] Page Layout tab
  5. [Alt]+[S] References tab
  6. [Alt]+[M] Mailings tab
  7. [Alt]+[R] Review tab
  8. [Alt]+[V] View tab
  9. [Alt]+[L] Developer tab

Function key Shortcuts

  1. [F1] Invoke helpsystem
  2. [Shift]+[F1] Context-sensitivehelp or reveal formatting
  3. [Alt]+[F1] Next field
  4. [Shift]+[Alt]+[F1] Previous field
  5. [Ctrl]+[Alt]+[F1] Display Microsoft System Information
  6. [F2] Move selection
  7. [Shift]+[F2] Copy selection
  8. [Ctrl]+[F2] Print Preview
  9. [Shift]+[Alt]+[F2] Save
  10. [Ctrl]+[Alt]+[F2] Open
  11. [Shift]+[F3] Change case of selection
  12. [Ctrl]+[F3] Cut selection to the Spike
  13. [Alt]+[F3] Create a Building Block entry
  14. [Shift]+[Ctrl]+[F3] Paste informationfrom the Spike
  15. [F4] Repeat last action
  16. [Shift]+[F4] Repeat last Find or Go To operation
  17. [Ctrl]+[F4] Close window
  18. [Alt]+[F4] Quit
  19. [Shift]+[Alt]+[F4] Quit
  20. [F5] Go To
  21. [Shift]+[F5] Return to last edit location
  22. [Alt]+[F5] Restore program window size
  23. [Shift]+[Ctrl]+[F5] Edit bookmark
  24. [F6] Next pane
  25. [Shift]+[F6] Previous pane
  26. [Ctrl]+[F6] Next window
  27. [Alt]+[F6] Switch between dialog box and document
  28. [Shift]+[Ctrl]+[F6] Previous window
  29. [Shift]+[Alt]+[F6] Previous window
  30. [F7] Spell check
  31. [Shift]+[F7] Thesaurus
  32. [Alt]+[F7] Select next spelling erro rand display Context menu
  33. [Shift]+[Ctrl]+[F7] Update links
  34. [Shift]+[Alt]+[F7] Display Research task pane
  35. [F8] Extend selection
  36. [Shift]+[F8] Collapse selection
  37. [Ctrl]+[F8] (not assigned)
  38. [Alt]+[F8] Display Macros dialog box
  39. [Shift]+[Ctrl]+[F8] Start COL selection mode
  40. [F9] Update fields
  41. [Shift]+[F9] Toggle display of field code or results
  42. [Ctrl]+[F9] Insert field code braces
  43. [Alt]+[F9] Toggle display of all field codes or results
  44. [Shift]+[Ctrl]+[F9] Convert field toregular text
  45. [Shift]+[Alt]+[F9] Run GOTOBUTTON or MACROBUTTON from a field
  46. [F10] Show KeyTips
  47. [Shift]+[F10] Display Context menu
  48. [Ctrl]+[F10] Maximize document window
  49. [Alt]+[F10] Maximize program window
  50. [Shift]+[Alt]+[F10]Control Smart
    Tags
  51. [F11] Next field
  52. [Shift]+[F11] Previous field
  53. [Ctrl]+[F11] Lock a field
  54. [Alt]+[F11] Display VBA editor
  55. [Shift]+[Ctrl]+[F11] Unlock a field
  56. [F12] Save As
  57. [Shift]+[F12] Save
  58. [Ctrl]+[F12] Open
  59. [Shift]+[Ctrl]+[F12] Print

Read more...

5. The Centaurus Hotel Islamabad

Sunday, April 19, 2009



The $350 million, 7-Star Centaurus Hotel in Islamabad, Pakistan will help to put this country on the map for international travellers once the project is completed around 2010.

Read more...

4. Morgan Plaza Beijing


The Morgan Plaza is a super-luxury 7 star hotel under construction in Beijing, China. Although it was set to be finished last month’s, there has been no official confirmation of it completion yet but it definitely going to be completed in time for the Beijing Olympics. When completed it is rumoured to be possibly more luxurious than the Burj Al Arab and has been considered to be the official landmark of China, still in competition with the Shanghai World Financial Center.

The plaza will contain two pavilions, a temple, the world’s best Japanese restaurant and a 600 meter long corridor.

Read more...

3. Emirates Palace Abu Dhabi


The Emirates Palace in Abu Dhabi was named the worlds finest hotel in the middle east in 2007. Featuring some out of this world indulgence, staying in this hotel would be like stepping into thousand and one night.

Huge plush pillows, plasma TV, private butler service, laptops in each room, wireless Internet, private check in and much more will delight visitors to this splendid seven star hotel.

Read more...

2. Burj Al Arab Hotel

Burj Al Arab Hotel? Burj Al Arab Hotel? Burj Al Arab Hotel?

Dubai’s seven star Burj Al Arab Hotel has long become a synonym for grandeur, class and style. Offering limousine service, private transfer for all guests via private golf cart, private butler service and just about anything else that is being associated with luxury, the Burj Al Arab Hotel is located in the premier Jumeirah Beach area of Dubai.

Read more...

1. Town House Galleria

Town House Galleria?Town House Galleria?Town House Galleria?

First up is the seven star luxurious Town House Galleria in Milan, Italy. Located in the heart of the city, this fairly new hotel offers prestige living and a service menu that will gain you immediate entry into waiting lists that are as long as the green mile.

Offering a personal butler, Bentley and only the best in food and drink, Town House Galleria will make all wishes come true while you stay in Milan. Whether you need tickets to Da Vinci’s Last Supper, get entry to the hottest restaurant in town or need a rare import, it can all be arranged for you and seemingly fast if some reports are to go by.


Read more...

How To Disable ‘Use the Web Service to Find the Correct Program’ Displayed in Windows Vista

Saturday, April 18, 2009

Use the Web Service to Find the Correct Program’ Displayed in Windows Vista

When opening a file with unknown extension, normally you will see an additional window popping up that give you options of whether to use the web service to find the correct program or select a program from a list of installed programs. Some times it is quite annoying as you probably already know which program should be used to open the file. To bypass this additional window, you can use a simple registry hack to skip the right program searching option but only pop up “open with” window instead.

Read more...

How to Remove ‘- Shortcut’ Suffix for a Shortcut Created in Windows Vista

Shortcut’ Suffix for a Shortcut Created in Windows Vista?









  • When creating shortcut in Windows Vista, - Shortcut is added as a suffix of the file or folder name.
  • For instance, if you create a shortcut for a text file named as abc123, you will notice the shortcut being created is named as abc123 – Shortcut.
  • If you don’t like the – Shortcut suffix that is tagged along with the file or folder name by default and you would like it to be named as what the original name is, here is a simple trick you can do to remove – Shortcut suffix.

Read more...

How to Enable Disk Quota Management in Windows Vista

Windows Vista? Windows Vista? Windows Vista? Windows Vista? Windows Vista?

  • We can easily running out of disk space if we keep on saving files without performing disk clean up from time to time or move them to external storage device.
  • In order to avoid such incident from happening, proper control of disk usage is important and Windows Vista
  • has a feature that allows you to set quota of disk space usage besides triggering you when the warning limit is being hit.

Read more...

Free PC Tools Internet Security 2009 Activation License Code Download

Free PC Tools Internet Security 2009? Free PC Tools Internet Security 2009 Free PC Tools Internet Security 2009?


PC Tools Internet Security 2009 is a all-in-one security suite that includes the well-known PC Tools Spyware Doctor anti-spywarefeaturing our award-winning anti-spyware, PC Tools AntiVirus anti-virus, PC Tools Firewall Plus firewall and spam protection
all into one application. With PC Tools Internet Security 2009, protected computer system can detect, remove and blocks all types of spyware, adware, viruses, Trojans, worms, keyloggers and other online threats, in addition to protection from hackers, intruders and other unauthorized software or network attacks, plus spam filtering for protectino against unsolicited email.
PC Tools Internet Security 2009 costs $59.95 for 1 year subscription license which can be used for up to 3 computers. Subscription allows user to have access to all new versions, unlimited smart updates and customer support for 1 year. As part of promotion with Westpac Banking Corporation (WBC), everybody can now grab a copy of 1 year subscription license for PCTools Internet Security 2009 with genuine activation license code.

To get the PC Tools Internet Security 2009 license key to register and activate the full version product, go to the following URL:

http://www.pctools.com/wbc/

Enter the first name, last name, email address and password, and then click on “Signup!” button. The license details for Internet Security with license name and license code will be displayed and email to your mailbox. The license information will be used to activate the PC Tools Internet Security 2009 for one year free usage.

Download PC Tools Internet Security 2009 for Windows: issetup.exe

After installing, PC Tools Internet Security 2009 will be installed as fully functional 15-day evaluation trial version which offers time unlimited real-time protection (free threat blocking), but does not remove threats detected during on-demand scans. To register, click on “Register” on the main screen of the program and entering the name and license key received into the evaluation version. Once valid license information is entered the program, the free registered version of the Internet Security will then be activated.

Read more...

Free Genuine License Activation Key Code for Kaspersky Internet Security (KIS) 2009 (8.0)

Kaspersky Internet Security 2009? Kaspersky Internet Security 2009? Kaspersky Internet Security 2009?

Kaspersky Internet Security 2009 (KIS2009) is the latest version of Internet Security Suite from Kaspersky Lab. KIS 2009 version 8.0 is a new generation product for protection of home users against all types of data-related threats. Kaspersky Internet Security 2009 prevents and blocks all known malware types or threats, proactively defense against new threats of any type with behavior emulation in isolated virtual environment for unknown application and restriction of their access to system

Highlights of features including new enhancements and improvements to Kaspersky Internet Security 2009 8.0:

  • New component for filtration of application activity based on an internal innovational HIPS (Host Intrusion Prevention System) class system that allows control over the functioning of any application on user computer through restriction of their access to system resources (files, registry, peripheral devices, networks).
  • Search and analysis of vulnerabilities in the software installed on host computer (including Microsoft Internet Explorer) to maintain system security on an adequate level preventing exploits of potential threats.
  • New wizards such as Security Analyzer and browser Configuration, and special task monitors have been added for simpler and more convenient user interaction with the application.
  • Use of lists of trusted applications (whitelisting).
  • New tools – Network Monitoring and Network Packet Analysis - facilitate collection and analysis of information about network on your computer.
  • New system restore helps fix system damages after malware attacks.
  • Security of confidental data from the keyboard is ensured by a new tool Virtual keyboardVirtual keyboard.
  • Privacy Cleaner Wizard which deletes from the user’s computer all information about his or her actions which can present an interest to intruders (list of visited websites, opened files, cookies, etc.).
  • Recent Terms server technologies to increase efficiency of anti-spam.
  • Microsoft Office Outlook, Microsoft Outlook Express, The Bat! and Thunderbird extension plug-ins simplifies the process of configuring the anti-spam settings.
  • Revised Parental Control component allows effective restriction of undesirable access of some internet resources by children.
  • Protection against internet intruders has been upgraded due to the extended databases of phishing sites.
  • ICQ and MSN traffic scan has been added which ensures security while working with instant messengers.
  • Security of the use of wireless networks is ensured through the scan of Wi-Fi connections.

Read more...

About This Blog

Lorem Ipsum

  © Free Blogger Templates Columnus by Ourblogtemplates.com 2008

Back to TOP