Saturday, November 1, 2008

norton internet security




Norton Internet Security 2008
Key Technologies
* Spyware protection
* Anti virus
* Antispam and Parental Controls **
* Two-Way Firewall
* Advanced Phishing Protection
* Intrusion Prevention
* Rootkit Detection

Features
* Spyware protection: detects and eliminates spyware
* Removes viruses and Internet worms automatically
* Anti virus security: protects email and instant messaging from viruses
* Protects against hackers
* Blocks identity theft by phishing Web sites
* Improved performance delivers faster starts and scans. NEW
* One click access to expert support. NEW
* Network security monitoring helps protect your wireless network. NEW
Norton Identity Safe delivers enhanced identity theft protection. NEW
* Works quietly in the background. NEW
* Prevents virus-infected emails from spreading
* Rootkit detection searches underneath the operating system using patented technology
* Includes protection updates and new product features as available throughout the renewable service period ***
* On-going Protection option automatically renews your subscription ****
Award-Winning Protection
* May 2008 PC World: The 100 Best Products of 2008
* February 2008 Computer Shopper's "Shopper's Choice Awards":
Best Software for Internet Security
* December 2007 PC Magazine: Best Software of the Year
* December 2007 PC World: PC World Best Buy
* September 2007 PC Magazine: Editors' Choice Award *****
* January 2007 LAPTOP Magazine: Editors' Choice Award
* January 2007 Computer Shopper Magazine: Best Internet Security Software
* January 2007 Small Business Computing: Product Excellence Award
* November 2006 PC Magazine: Best of 2006
* October 2006 PC Magazine: Editors' Choice Award *****
* May 2006 RedmondMag.com: Reader’s Choice Award
* May 2006 PC World: Best Buy Award
SYSTEM REQUIREMENTS:
Windows Vista® Home Basic/ Home Premium/Business/Ultimate â€*
Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center
Edition
Designed for Windows
* 300MHz or higher processor
* 256MB of RAM
* 350MB of available hard disk space
â€* Must meet minimum Windows Vista operating system requirements.
Email scanning supported for POP3 and SMTP compatible email clients.
Supported instant messenger clients:
* AOL® – 4.7 to 5.9
* Yahoo!® – 5.x and 6.x
* Microsoft® – 6.0 or higher
* Trillian™ – 3.1 or higher
Internet browsers (phishing protection)
* Microsoft® Internet Explorer 6.0 (32-bit only) or higher
* Mozilla® Firefox® 2.0 or higher

download:

Friday, October 31, 2008

folderlock software

Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and notebooks. Protection works even if files are taken from one PC to another on a removable disk, without the need to install any software. It locks files in Windows, DOS and even Safe Modes. Additional Options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer. It is Windows Vista/2003/XP/2000/NT/Me/98/98S compatible and works on all kinds of disk types like FAT16, FAT32, NTFS. Folder Lock is the most downloaded file-security program in the market today.
download
http://www.ziddu.com/download/2538229/Folder_Lock_5.7.0_FULL.rar.html

Thursday, October 30, 2008

nenu meku thelusa mp3 songs

Starring Manchu Manoj Kumar,Sneha Ullal
MusicAchu
Emaindo Gaani Chusthu Chusthu
Singer(s): Sriram Parthasarathy
Lyrics: Sirivennala Seetharama Sastry


Enduko Madi
Singer(s): Hemachandra, Bombay Jayashree
Lyrics: Sirivennala Seetharama Sastry


Mabbe Masakesindile
Singer(s): Simbhu, Geetha Madhuri
Lyrics: Veeturi


Cheppaka Thappaduga
Singer(s): Achu, Sunitha Sarathy
Lyrics: Sirivennala Seetharama Sastry


Yenno Yenno

Singer(s): Premji, Harini
Lyircs: Manchu Manoj Kumar, Thirumala Kishore


Kannu Theristhe Jananamele
Singer(s): Naveen, Ranjith
Lyrics: Ajay Sastry

enno enno
Theme Music

for all songs

Sunday, September 28, 2008

solution to adminstrator password problem

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the passwordof the account that is locked out. You can also use the default Administrator account that is built into Windows XP.
First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about
3 times a second.3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.
Once you are at the Account Log on Screen, click on the iconfor the user account with administrator rights, or click on the iconfor the administrators account.Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.For PRO you can do this in normal mode
When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.8.Then close all Windows, reboot the system and try to log in.
There are also applications that can recover the password for you.The following companies provide these applications at a cost.iOpus® Password Recovery XP here.LostPassword.com, here.Asterisk Password Recovery XP v1.89 here.Windows XP / 2000 / NT Key here.
If the above information does not help in recovering the password, the only option left is to
format the hard drive then reinstall Windows and the system software.

tips increase the speedup computer

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.
The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.
Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.
Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.
Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

Saturday, September 27, 2008

avg 8.0 internet security antivirus

Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office.

* Easy to install and use
* Protection against all Internet threats
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP.


Features:

All-in-one protection
* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Anti-Spam: filters out unwanted and fraudulent e-mails (anti-phishing)
* Web Shield & LinkScanner: protection against malicious websites
* Firewall: protection against hackers
* System Tools: for easy system management

Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:
* All files including documents, pictures and applications
* E-mails (all major email programs like MS Outlook and Thunderbird supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other links you click on

Internet security with peace of mind
The new web shield checks every web page at the moment you click on the link to ensure you’re not hit by a stealthy drive-by download or any other exploits. All links on search results pages in Google, Yahoo, and MSN are analyzed and their current threat level is reported in real time before you click on the link and visit the site.

Easy system management
The new system tools let you easily configure your privacy settings, connections, and browser plug-ins all in one place.

The best Windows protection - trusted by millions of users
AVG's award-winning antivirus technology protects millions of users and is certified by major antivirus testing organizations (VB100%, ICSA, West Coast Labs Checkmark). View all AVG awards & certifications
Comprehensive protection for your computer! This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide.
Unique Internet security thanks to new technology - Only AVG gives you real-time protection against malicious websites thanks to our new LinkScanner technology.


Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office.

* Easy to install and use
* Protection against all Internet threats
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP.


Features: 

All-in-one protection
* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Anti-Spam: filters out unwanted and fraudulent e-mails (anti-phishing)
* Web Shield & LinkScanner: protection against malicious websites
* Firewall: protection against hackers
* System Tools: for easy system management 

Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:
* All files including documents, pictures and applications
* E-mails (all major email programs like MS Outlook and Thunderbird supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other links you click on 

Internet security with peace of mind
The new web shield checks every web page at the moment you click on the link to ensure you’re not hit by a stealthy drive-by download or any other exploits. All links on search results pages in Google, Yahoo, and MSN are analyzed and their current threat level is reported in real time before you click on the link and visit the site.

Easy system management
The new system tools let you easily configure your privacy settings, connections, and browser plug-ins all in one place.

The best Windows protection - trusted by millions of users
AVG's award-winning antivirus technology protects millions of users and is certified by major antivirus testing organizations (VB100%, ICSA, West Coast Labs Checkmark). View all AVG awards & certifications
Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office.

* Easy to install and use
* Protection against all Internet threats
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP.


Features:

All-in-one protection
* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Anti-Spam: filters out unwanted and fraudulent e-mails (anti-phishing)
* Web Shield & LinkScanner: protection against malicious websites
* Firewall: protection against hackers
* System Tools: for easy system management

Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:
* All files including documents, pictures and applications
* E-mails (all major email programs like MS Outlook and Thunderbird supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other links you click on

Internet security with peace of mind
The new web shield checks every web page at the moment you click on the link to ensure you’re not hit by a stealthy drive-by download or any other exploits. All links on search results pages in Google, Yahoo, and MSN are analyzed and their current threat level is reported in real time before you click on the link and visit the site.

Easy system management
The new system tools let you easily configure your privacy settings, connections, and browser plug-ins all in one place.
http://www.ziddu.com/download/1964236/AVGInternetSecurityv8.0.164Keygen-HeartBug.rar.html 

Tuesday, September 23, 2008

1920 mp3 songs

Music Director: Adnan Sami

Lyrics: Sameer

Cassettes and CD's on: Big Music

MP3 Bitrate: 320Kbps VBR (~)




Tracklist:

01. 1920 - Vaada Tumse Hain Vaada 

02. 1920 - Bichua 

03. 1920 - Aise Jalta Hai Jiya 

04. 1920 - Tujhe Main Pyar Karu 

05. 1920 - Vaada Tumse Hain Vaada 

06. 1920 - Bichua (Remix) 

07. 1920 - 1920 Theme 
http://rapidshare.com/files/137242191/_5bxDR_5d_201920_20-_2001_20-_20Vaada_20Tumse_20Hain_20Vaada.mp3
http://rapidshare.com/files/137242191/_5bxDR_5d_201920_20-_2001_20-_20Vaada_20Tumse_20Hain_20Vaada.mp3
http://rapidshare.com/files/137242176/_5bxDR_5d_201920_20-_2002_20-_20Bichua.mp3
http://rapidshare.com/files/137242178/_5bxDR_5d_201920_20-_2003_20-_20Aise_20Jalta_20Hai_20Jiya.mp3
http://rapidshare.com/files/137242144/_5bxDR_5d_201920_20-_2004_20-_20Tujhe_20Main_20Pyar_20Karu.mp3
http://rapidshare.com/files/137242197/_5bxDR_5d_201920_20-_2005_20-_20Vaada_20Tumse_20Hain_20Vaada.mp3
http://rapidshare.com/files/137242100/_5bxDR_5d_201920_20-_2006_20-_20Bichua_20_Remix_.mp3
http://rapidshare.com/files/137242036/_5bxDR_5d_201920_20-_2007_20-_201920_20Theme.mp3

Tuesday, September 16, 2008

shouryam mp3 songs

Banner : Bhavya Creations
Cast : Gopichand,Anushka
Music : Mani Sharma
Producer : V Anand Prasad
Director : Shiva 


Track List:

Ammi Ammi
Artist: Hemachandra
Lyricist: Anantha Sriram

Buggalona
Artist(s): Deepu,Malavika
Lyricist: Ramajogaya Sastry

Gira Gira
Artist: Tippu
Lyricist: Bhaskara Bhatla

Hello Miss
Artist(s): Karthik,Priya
Lyricist: Ramajogaya Sastry

Ole Ole
Artist(s): Rahul Nambiar,Suchitra
Lyricist: Bhaskara Bhatla

Pillo Naa
Artist(s): Tippu, Rita
Lyricist: Bhaskara Bhatla
download
http://w16.easy-share.com/1701385829.html

chintakayalaRavi mp3 songs


Starring:Victory Venkatesh, Anushka, Mamata Mohandas
Music: Vishal - Shekar
Lyrics: Chandrabose(All songs)

Track Listing :

01.Bagundey Bagundey
Singer(s): Vijay Prakash, Hansika

02.Oh Sunita
Singer(s): Shankar Mahadevan

03.Shava Shava Balle Balle
 Singer(s): Shankar Mahadevan, Mahalakshmi

04.Merupula
Singer(s): Rajesh, Shreya Goshal

05.Enduko
Singer(s): Sonu Nigam, Mahalakshmi

06.Valla Valla Baby
Singer(s): K.K.Sunidhi Chauhan

Friday, August 15, 2008

kamalhasns marmayogi trailor

As per reports Kamal Haasan has started works for his next film, ‘Marmayogi ‘ and it would be directed by Kamal Haasan himself. His Dasavatharam is almost complete and is releasing on Jan/14/2008- Pongal

A mega-budget movie produced by Reliance Adlabs and music by A R Rahman. Earlier we reported that Kamal Haasan and Nagarjuna to feature in Reliance ADLABS produce movies

Almost all has been quiet on the Kamal front of late. Of course, that means that something is brewing. The mystery was finally resolved through reliable sources Kamal’s next movie will be Marma Yogi (”mysterious saint”, shall we say?), directed and produced by himself. With a curious title, the surprises are that it’s supposed to be an action thriller — and I thought Kamal would direct only ’serious’ movies (Hey Ram, Virumaandi) — and that the music will be done by AR Rahman. Talks are on to rope in a Bollywood heroine, as the movie will be released in Tamil, Telugu and Hindi. Oscar Ravichandran, UTV and Adlabs are all in talks related to production and distribution. The movie might be launched in January. We can see that the domain name is already registered and it mentions Raaj Kamal Films International, Kamal’s production house.

Marma Yogi is also an old MGR flick, known as the first Tamil movie to receive an ‘A’ certification. Kamal’s penchant for old titles (Apoorva Sagodharargal, Sathi Leelavathi, etc.) continues.

expected story

Its a 7th centurey story, there are two powerfull dynesty as neigbour countries,the both thinks
the other as a contemporary ravials, and the queen of the dynesty wants to destory the other dynesty’s
king’s family totally, as a result she kills all the members of the kings family except the heir of
the king (the prince)
and the cheif commander saves the child(prince) and guards him, and the queen wants the princes
to be killed,
but the c.commander breaks the plan and guards the little prince, and like wise the story moves on and at last the c.commander wons and make prince to rule the kingdom is the climax

queen— Dream girl (hemamalini)
c.commander——– one and only (kamal hassan)
heroine ———– thanda karumam (padma priya)



Thursday, August 14, 2008

STEP 4(VERY IMPORTANT)

DO AND DON'TS
GOOGLE HAVE ENOUGH TOOLS TO FIND THE FRAUD OR INVALID ACTIVITIES
GOOGLE ADSENSE IS NOT A PROCESS THROUGH WHICH YOU CAN BECOME RICH IN SINGLE NIGHT, IT REQUIRES LOT WORK AS A RESULT YOUR WORK GIVES DOUBLE THE INCOME.
SO DON'T BE OVER SMART TO CHEAT OR FRAUD GOOGLE, BECAUSE GOOGLE HAS RIGHT TO DELETE YOUR ADSENSE ACCOUNT IMMEDIATELY .
ALL THE WORK YOU HAVE DONE WILL BE WORTHLESS, IF YOU TRY TO CHEAT
  • FIRST AND FOREMOST YOU SHOULD NOT CLICK YOUR OWN ADS, IT COMES UNDER INVALID CLICKS.
  • AND DON'T MAKE REGULAR CLICKS OR DON'T USE THE WORD CLICK ADS IN THE POST
  • DON'T CLICK REGULARLY ON ADS FROM SAME PLACE.

STEP 3

REGISTRING TO ADSENSE
  • WHEN YOU CREAT A NEW POST YOU ARE GIVEN THE FOLLOWING OPTIONS
  • POSTING
  • SETTING
  • LAYOUT
  • YOU SELECT LAYOUT OPTION, WHEN YOU CLICK LAYOUT YOU ARE GIVEN WITH FOLLOWING OPTIONS
  • ADD A GADGET
  • BLOG ARCHIVE
  • ABOUT ME
  • YOU SELECT ADD GADGET
  • YOU ARE GIVEN WITH MANY OPTIONS
  • SELECT ADSENSE OPTION.
  • HERE IT WILL ASK YOUR EMAIL ID
  • PRESS CONTINUE
  • GOOGLE WILL SEND A LETTER TO YOUR E-MAIL BOX YOU MENTIONED ABOVE IT WILL STAND FOR LESS TIME. SO FIRST CHECK YOUR MAIL AND SEARCH FOR ADSENSE MAIL.
  • HERE YOU WILL BE GIVEN A CONFIRMATION LINK, CLICK IT
  • HERE YOU WILL BE ASKED TO FILL GOOGLE ADSENSE FORM. FILL OUT THE STEPS
  • AT THE END YOU WILL BE ASK TO GIVE ACCOUNT PAYEE NAME SO PLEASE BE ALERT TO GIVE CORRECT NAME WHICH IS ON YOUR BANK ACCOUNT BECAUSE CHEQUE WILL BE ISSUED ON THAT NAME. GIVE THE CORRECT RESIDENCE ADDRESS SO THAT THE CHEQUE WILL BE RECIEVED TO THAT ADDRESS.
  • GOOGLE WILL VERIFY YOUR BLOG AND SEND ANOTHER CONFIRMATION FROM THAT TIME YOUR BLOG WILL BE CRAWLED BY GOOGLE ADS.
  • YOU SHOULD PROMOT YOUR BLOG AND IMPROVE CONTENT.
  • IT WILL SEND A MAIL TO YOU

STEP 2

COLLECTING DATA
  • IN THE SECOND STEP WE SHOULD COLLECT THE DATA RELEVENT TO THE TITLE DEPENDING ON THE DATA WE ARE GOING TO ATTRACT THE BROWSERS.
  • GOOGLE ALSO CHECKS THE DATA DOESN'T ENCOURAGE MORE IMAGES, GOOGLE PREFERS THE CONTENTS, SO AS POSIBLE AS WE CAN POST DATA CHOOSE THE TEMPLETS WHICH WE LIKE AND WHICH CAN ATTRACT BROWSERS.
  • THE AMOUNT MONEY YOU EXPECT TO EARN DEPENDS UPON NUMBER OF POSTS YOU MADE AND THE AMOUNT OF CONTENT IN EACH POST.
  • GOOGLE DOESN'T SUPPORT EMPTY BLOGS, SO DON'T POST EMPTY BLOGS IT MAY CREATE A PROBLEM.
  • AND START POSTING WITH CONTENT (MATTER )STRICTLY RECOMMENDED.

google adsense programe step 1

CREATING A SITE OR A BLOG
CREATING A BLOG OR A SITE IS EASY ONE WHISCH IS OF NO COST. THERE IS NO REQUIRMENT OF INVESTMENT.
TO CREAT A BLOG WE SHOULD HAVE A GMAIL ACCOUNT.
CLICK THE LINK TO GO AND REGISTER.
BLOGSPOT
INTHE PROCESS OF REGESTRING WE SELECT BLOG TITLE WHICH SHOULD BE RELEVENT TO THE DATA YOU COLLECT AND GOING TO PUBLISH, SO SELECT A TITLE SUCH THAT IT MATCHES THE CONTENT AND GOOGLE MAY PLACE MATCHED ADS ON YOUR BLOG.

Tuesday, August 12, 2008

GREAT SAYINGS FROM LEGENDS

ADULF HITLER
IF U WIN YOU NEED NOT EXPLAIN................
BUT IF YOU LOSE YOU SHOULD NOT BE THERE TO EXPLAIN...........
BONNIE BLAIR
WINNINF DOESNT ALWAYS MEAN BEING FIRST......
YOUR DOING BETTER THAN WHAT YOU HAVE DONE EARLIER
CHARLES
NEVER BREAK FOUR THINGS IN YOUR LIFE
TRUST,PROMISE,RELATION, HEART

BECAUSE WHEN THEY BREAK THEY DONT MAKE MUCH NOISE
BUT PAINS ALOT EINDTEIN IF SOME FEELS THAT HAD NEVER MADE A MISTAKE IN THEIR LIFE THAT MEANS THEY HAVENT TRIED A
NEW THING IN THEIR LIFE

LEOTOLSTOY
EVERYONE THINKS OF CHANGING
the world
but dont think to change themselves

APJ ABDULKALAM WORDS TO YOUTH

WINGS OF FIRE

articles from great life historys

bread baked without butter is bitter1 feeds but half a mans
it has a meaning in it search and post if u can
here is a great article
BEAUTIFUL HANDS ARE THOSE THAT DO
WORK THAT IS EARNEST AND BRAVE AND TRUE
MOMENT BY MOMENT THE LONG DAY THROUGH

ANOTHER ARTICAL

GOD HAS NOT PROMISED
SKIES ALWAYS BLUE
FLOWER -STREWN PATH WAYS
ALL OUR LIFE THROUGH.
GOD HAS NOT PROMISED
SUN WITHOUT RAIN
JOY WITHOUT SORROW
PEACE WITHOUT PAIN
BUT GOD HAS PROMISED
STRENGTH FOR DAY
REST FOR THE LABOUR
LIGHT FOR THE WAY.
IT ALSO CONSIST A MEANING PLEASE SEARCH AN D REAPLY

THERES A GOOD SAYING
IF THE DEAF ARE TO HERE ,THE SOUND HAS TO BE VERY LOUD.
ANOTHER BY JOHN BARYMORE
A MAN IS NOT OLD UNTILL REGRET TAKE PLACE OF DREAMS