Friday, 28 June 2013

How to undo a sent Email?


If you've ever hit the send button on an email and immediately regretted it, you'll appreciate the value of an undo button. Sent an email prematurely? Forgot to attach a file? Accidentally addressed it to the wrong person? It happens to the best of us. But what can you do to get it back? Hack into the other person's email account and delete the email before they get a chance to see it? Unless you're a hacker extraordinaire, that option is unlikely. So, what can you do and how is it possible?

Know How...!!!
If the email has already been sent, you're probably out of luck. Even if they didn't read it yet, your chances of retrieving it are slim. But some popular email clients like Gmail do have features built-in that let you pause the sending process, giving you a few seconds to recall your message. Some platforms, like Outlook, actually let you steal it back, as long as it hasn't been read.

I."Recall" feature-Outlook:
1. First, get to the sent message by going to Mail -> Navigation Pane -> Sent Items. From there, click on the Message tab -> Move group -> Actions -> Recall This Message. From there, you have two options:

  • Delete unread copies of this message.
  • Delete unread copies and replace with a new message.
2.Click on OK and if you chose to resend, update the message and send like normal. 
(or)
 You can also just find your sent message and click on File -> Info -> Resend or Recall.




II. "Undo" option-Gmail:

1. Sign into your Gmail account.
2. Click on the Options cog in the upper-right corner of the Web page.

  • 3. Click on the "Labs" tab.
    4. Scroll to locate the "Undo Send" tool. Click the radio button next to "Enable" to turn on the undo feature.
    5. Click on the "Save Changes" button.

  • Note: 
    • From now on, when you hit send on an email and your inbox comes back up, the yellow notification block will have the "Undo" option next to the standard message saying "Your message has been sent." Simply click "Undo" when the option comes up. The message will not be delivered to the addressee, and will be saved as a draft so you can go back and edit or delete the message
    • The default window for hitting "Undo" after sending an email is five seconds. You can increase this to 30 seconds in "Mail Settings" within the Options cog.

    III. Yahoo! Mail:
    Unfortunately, Yahoo can't undo sent messages at the moment. And you can't use something like Outlook, since that only works with a Microsoft Exchange account. Yahoo recommends saving drafts first and thinking twice before sending.

    IV. AOL Mail:
    AOL does have a way to undo sent emails, but it only works when exchanging emails with other AOL users. To do this:
      1. Select Mail | Sent Mail from the menu in AOL.
      2. Highlight the message you want to take back.
      3. Click the Unsend button.
    Note: You can undo a sent message if...
    • The message was sent to AOL recipients only.
    • You sent the message from AOL itself, not from an email client using IMAP and SMTP to access an AOL email account.
    • The message has not yet been read by any recipient.
    Know How's tip: You can always just pull out your Ethernet cable right after you send your email in hopes of catching it before it sends. Last option of course...!!!

    Better option: When sending email, pause before clicking the Send button and be sure you’re ready for that email to go out. This gives you peace of mind than any others :)

    Why do ISPs change your IP address?

    Why does IP change? If you rely on any sort of service that requires you to know the IP address of your home internet connection, there’s a good chance you’ve noticed that the number (however frequently or infrequently) changes. Why is that?


    Know Why...!!!

    Infact, ISP's don't change your IP address, they just forget your last assigned address after a period of non-use. 


    1.The reason that the ISP releases your address to the pool is because there are more potential devices than the pool of addresses could handle. Most large ISP's have a Class-A IP range which means they can subassign 16,777,214 unique IP addresses. AT&T, Verizon and other ISP's certainly have more than 16,777,214 customers. Smaller ISP's, usually regional cable companies get by with a Class-B ISP range which can contain 65,534 unique IP addresses. Still not enough if a cable company serves a half-dozen towns. The IPV6 protocol would provide enough unique IP addresses to give every person on earth billions of unique addresses, with 4.7994692e+29 addresses per person. We may never run out of IPV6 addresses even when every person, appliance, vehicle and light bulb gets one. The problem is that much of what is on the internet cannot yet handle IPV6. Windows 7 and 8 can handle V6 addresses as well as most ISP's, but there are still many consumer routers and upstream DNS servers that aren't ready for V6.

    2.There is also a security concern. If everyone had Public IPs, then hacking your neighbor or a specific person would be much easier. Since most people don't keep track of this, having the outside IP address rotate occasionally means people just can't guess your IP. Unless there is a local app that calls home and reports your new IP to a hacker, rebooting your modem and retrieving a new IP will stop any outside traffic from gaining access to your PC. This also prevents home grown servers, as previously said.

    3. There is also less hassle with dynamic. Internet Routers grab whatever IP is available out of a pool. It allows companies from having to keep a list of what they can or can't reassign.


    4.  By providing two types of Ip, i.e. dynamic and static, ISPs can easily distinguish between “consumer” and “professional” services–by reserving static IPs for customers who pay more, it gives customers who need that feature an incentive to upgrade their service level.

    So, there are a lot more advantages of dynamic IP than we know.. Thanks for reading :)

    How to safely remove USB drives just by unplugging them?

    Most Windows users have become conditioned over time to never unplug a USB flash drive or hard drive without first clicking Safely Remove Hardware in the System Tray.
    Why is that necessary?  In theory, it's to ensure that Windows isn't busy reading from or writing to the drive when you remove it, something that could result in corrupted data or even a damaged drive. As it turns out, however, you can safely sidestep Safely Remove Hardware with little to no loss of performance. In fact, this option may already be enabled on your system, and you just didn't know it. Yep, you may have been wasting extra clicks all this time.
    Know How...!!!
    1. Plug your USB drive into your PC, then open Device Manager. (Note: These steps are based on Windows 7. Things might look different in previous versions of Windows.)
    2. Expand Disk Drives, then find the entry for your removable drive. On my system, for example, it's called "USB2.0 Flash Disk USB Device."
    3. Right-click that entry, then click Properties.
    4. Click the Policies tab; you should see something like this:

    5. If the first option, Quick removal, is already selected, you're good to go. As noted in its description, "you can disconnect the device safely without using the Safely Remove Hardware notification icon." If Better performance is selected, switch to Quick removal and click OK.

    So, what are giving up by disabling write caching? According to the test results posted at 7tutorialsalmost nothing. The performance impact was negligible. Your mileage may vary, of course, but I think it's worth a few milliseconds to avoid the hassles of having to mess with Safely Remove Hardware all the time.

    Note: The Windows dialog shown above is misleading. If you unplug your USB device while data is being written to it – for example, while you’re moving files to it or while you’re saving a file to it – this can result in data corruption. No matter which option you use, you should ensure that your USB device isn’t in-use before unplugging it – some USB sticks may have lights on them that blink while they’re being used. Ensure you have no data being written while unplugging the USB.

    What if you are not satisfied with quick removal, but want Safely remove option without taking much time?

    Create a Shortcut icon on the desktop for safely remove hardware option.Here's how you can do it...

    1. Right-click anywhere on the desktop and choose New \ Shortcut:

    2. Then paste in the following into the location box:

    RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll

    3. Give it a name, and you’ll have a shortcut icon…
    Click on the shortcut and...that will pull up the Safely Remove Hardware dialog.

    You can assign a  hotkey for it too:
    This is how...
    1. You can right-click the icon and open the properties dialog, then go to the Shortcut tab.


    2. Add in the shortcut key and close the dialog. 

    As long as the shortcut is on your desktop you shouldn’t have to restart anything for the hotkey to work. You can also move the shortcut to another folder, for instance your quick launch bar.

    Try it out...It saves a lot of time.Never say : "Safely remove hardware?Ain't nobody got time for that..." 

    Have a nice day :)

    How to access facebook on any mobile without internet?

    Some of us often do have the mobile phones of Mesozoic era, rofl ;) such as Nokia 1100 which has no internet browser or some times, even though you have a smart phone or android mobile, but you are in a remote location, where you have no internet access possible, you can still access facebook.



    Know How...!!!
    Yes this is possible now with the help of Fonetwish. Facebook India has partnered with Fonetwish to bring Facebook on every mobile phone without requiring any apps or even the Internet.
    Here's how to access it:
    1. Dial *325# (or *fbk#) from your mobile.

    2. You get a menu saying: Welcome to facebook by fonetwish.Your request has been accepted.We will shortly send you the menu.Please exit this message
    3. Now, it asks for your username, example: Sriram Krishna (your name as in facebook ).

    4. After processing for validity of username, a window appears and prompts you to enter your password, ensuring secure access.
    5. It provides a menu on Welcome page as:  1. News Feed 2. Update status 3. Post on wall 4. Friend request 5. Messages 6. Notifications 7. Account Setting
    6. If you select messages, i.e. you enter option 5 and click send, then you get a sub-menu for it as : Welcome to messages: 1. Online friends 2. Read message..blah blah blah...!!!
    Fonetwish service is available almost for all service providers in India.
    P.S: Please note that you need to subscribe to the service to use it. It is free only for 15 days , and later the charges would be only 1.00/- per day for unlimited usage.  
    You can also activate Fonetwish directly from your Facebook account at https://apps.facebook.com/fonetwish/

    Something about technology:
    The protocol being used is USSD. Unstructured Supplementary Data (USSD) is used by telecom players to send alerts to their users that inform them about their balance at the end of call or for sending missed call alerts. This protocol helps GSM cellular telephones to communicate with the service provider's computers and USSD messages create a real-time connection during a USSD session. The connection remains open, 
    allowing a two-way exchange of a sequence of data. This makes USSD more responsive than services that use SMS.

    That's it..Go on browsing fb freaks...!!

    Tuesday, 25 June 2013

    How to shutdown Your Computer giving a funny reason?

    Not just you..Your computer gets tired too...! What if your computer can say "I am tired. Please don't tap! tap!!tap!!! me idiot. I am getting irritated"? ROFL...Do you want to try this with your friends' PC or laptop?

    Know How...!!!
    Type shutdown -s  -t 500 -c "I am tired. I don't want to work anymore idiot." (with the quotes) in the Command Prompt and press Enter. The -c switch is used in the code to give the reason for shutting down and what is followed in quotes will be displayed in the dialog box as the reason. This can be used to display all sorts of funny messages. For example: "Can't you do anything right? I can work for myself.You cannot use your PC anymore." Your friend restarts the system, but it shuts down again and again and again... :)

    Now how to stop the shut down?
    Type "shutdown -a" and press Enter. This will stop the system from shutting down if the countdown to shut down has not reached 0.

    Tease your friends now...!!! :)

    How the Wikipedia scanner works?

    If you've ever used the online encyclopedia Wikipedia, you might have noticed that editing an article is as easy as clicking the "edit this page" tab, making your changes and clicking "save." But it's this ease of editing that's both Wikipedia's greatest strength and its weakness: Anyone can edit Wikipedia , even anonymously




    Stories frequently surface about an organization or individual altering a Wikipedia entry, either maliciously or for the sake of a practical joke. But limiting people's ability to easily edit Wikipedia would infringe on one of its most celebrated features and what's arguably the key to its success.


    Wikipedia has a variety of tools to deal with malicious editors. The site offers extensive tutorials about what it looks for in a good encyclopedia entry and how to clean up articles. Many Wikipedians -- frequent editors of the encyclopedia -- show fierce loyalty to the site, acting as its watchdogs and correcting potentially damaging edits. Wikipedia keeps a record of all changes so that a defaced or otherwise unsatisfactory article can easily revert to an older version. The site also has several features that can be used or requested by Wikipedians, including locking down pages, blocking certain users and flagging articles that violate the site's guidelines.

    Despite all of these tools, Wikipedians can't be everywhere. With more than 1.9 million English-language articles alone, the potential for abuse is enormous, especially by anonymous users [source: Wikimedia]. Enter the WikiScanner, a free program unveiled in August 2007 by Virgil Griffith, a graduate student studying computation and neural systems at the California Institute of Technology and a visiting researcher at the Santa Fe Institute. So, how does it work?

    Know How...!!!
    Whenever an unregistered, anonymous user edits a Wikipedia entry, the site logs the user's IP address, the unique string of numbers that identifies each computer connected to the Internet. The WikiScanner uses these records to trace the IP addresses of anonymous Wikipedia editors. By comparing the IP addresses against a database of companies that own them, the Scanner can name the editor, or at least the organization responsible for the user's access.

    The results have been astounding -- tens of millions of anonymous edits, performed by more than 180,000 organizations, some of them in clear violation of Wikipedia policy. Among the many organizations cited: the FBI, CIA, Britain's Labour Party, the Vatican, Wal-Mart, the Republican Party, the Church of Scientology, Dell Computers, Microsoft, Apple and the United Nations.



    How "the Scanner" helped Wikipedia?
    Open platforms like Wikipedia allows users to edit anonymously, but that tools like WikiScanner could be useful in counteracting malicious editing. It could be used to help maintain the integrity of controversial pages and to track when a page is vandalized. Or, the tool may result in people being more careful about anonymous edits, performing them from home or public computer systems.

    The vandalism needs to stop to protect the world's most expansive and massive free encyclopedia to persist. Thanks to Wiki Scanner ...

    Monday, 24 June 2013

    How can a website run without internet?

    Have you ever known that there is a website that runs without internet and if you connect to the internet, it says "I'm sorry" and asks you to disconnect???I'm not joking...lol...It exists in real..!!! If you don't believe, check out this website: http://www.allaboutrajni.com/ .When my senior at college told me about the website that runs without internet, I was amazed. Thanks to Indian Super Star  "Rajni Kanth" , about whom the website was built. Have you ever thought how the website can work without internet? 


    Know How...!!!
    Well, it does not! No website can run without the Internet connection. The developers have used a simple logic that makes it seem to work without it. When you open the website, a flash file gets loaded in the background. The developers have created a very lightweight flash file using vector images, so it loads within few seconds. A script runs in loop to check the internet connection status, and as soon as you turn off the internet, the script allows you to see the flash file that was already loaded in the background. Here is link to the flash file : http://www.desimartini.com/allaboutrajniV1/Design.swf



    Vector graphics is the secret behind it. It is quick to load because most of the graphical (if not all) content is vector graphics. The difference between vector graphics (this site) and bitmap graphics (such as your family pictures in jpegs, tiffs, or bmps) is that vector graphics use mathematical functions to draw lines and fill colors (and gradients) instead of pixel-for pixel information about color. That results in a very small site, and also: you can try zooming in and you will see that the quality does not degrade (unlike jpegs, bmps, tifs..). The background music probably "weighs" more in terms of disk space then the rest of the graphical content which is pure vector.
    Between, flash can mix content (vector+bitmap), but this site was made without any bitmaps so it can be small.

    This site is made to run from cache, and also checks for internet connectivity. If this cached website can detect internet connectivity, it is scripted so it does not run.
    More about Flash websites: http://en.wikipedia.org/wiki/Adobe_Flash

    How to commit Internet suicide and delete yourself from the web forever?

    Seeking to escape the internet? While online notoriety thrills some people, for others, it can become a great burden. Well, you may not feel like the flotsam and jetsam that make up the facts of your life are important, but increasingly companies are using that dry data to make your every online step as indelible as if written in blood. Internet makes you quite easy to find. But, you can take back your digital dignity now...


    Know How...!!!
    Think this through very carefully before proceeding, as once done, most of the things said below cannot be undone.

    1. How is it that easy for search engines to display your results? Most of the time, blame Social Networking and Online Shopping Sites  for those results. So, first delete your accounts from those sites. You may not even remember all those you've joined, but make sure you delete your accounts from facebook, twitter, google +, linkedin, Flickr, StumbleUpon, paypal, ebay & other auction sites, craigslist and other local advertising groups, game sites and other 3rd party applications, that are linked to your social networking accounts.

    2. Weasel your way out of undeletable accounts. Some sites don’t allow full deletion, forcing you to merely “deactivate” (while your information stays in the system) or abandon your account. If there is a real reason for removal (such as witness protection), contact the site's owner or engineers; at the very least, you should be able to get a name change to cover your real identity. However, if you can’t get anyone to intervene on your behalf, there’s another way of dissociating:
    • Remove every last scrap of information about yourself from the account. If there is no option of leaving any field blank, fill it with absolutely fake names (or) with those names which are quite famous as Ratan Tata (or) Kajal Agarwal.
    • Create a new email account with a free email provider. The more unlikely the username, the better.
    • Associate the undeletable account with this new email address. Confirm the new email address when prompted. Once it goes through, make sure your real email address no longer appears anywhere in this account.
    • Cancel your new email address. Your undeletable account is now associated with an address that no longer exists. 
    3. Close your personal sites. If you do have any kinds of sites or similar ones on the internet, delete them. Remember deleting blogs, blogs within sites, groups like Yahoo groups and other open forums, articles you have added on sites and like Scribd and forums and the list goes on...

    4. Check with your phone company to make sure you're not listed online. If you are, ask them to remove your details completely. Ditto for any other customer databases that might cause your name and details to be online.

    5. Cancel all mailing lists. This should be fairly straightforward as usually the method for unsubscribing is in the body of each email, often with a direct link. Follow the individual instructions given. If you can't find such instructions, contact the site administrators directly.

    6. Delete search engine results that feature you. Search not only Google or Bing, but also others like Spokeo, ZabaSearch, Pipl, Intelius and many that you know. There might be images, articles, or even employer websites, where your name shows up. The first thing to do is figure out where you're showing up online in search results. You essentially have one course of action to remove this content: contact the source directly. Email the web site hosting the content and politely ask them to remove it. After that, you can appeal to the search engines directly to remove the edited pages right away. You can do so through GoogleGoogle Images, or Bing by filling out a simple form and requesting the URL to be indexed again.

    7. Monitor your friends. Unfortunately, it's not just about you anymore. Urge your friends, family and other acquaintances not to post your photos or information in the web without your explicit permission. 

    8. Get rid of Criminal and Public Record Results. Go for services like DeleteMe, of course you need to pay, but this service does background checks and personal databases checks to wipe your information from web.
    9. Clean up your computer.
    • Remove all internet history, cookies, etc.
    • Remove the internet program if you're really adamant.
    • Remove your computer if you're going "cold technology".
    10. Shrug off what you can't remove. There may be some things that you can't do anything about. In that case, it is probably best to just accept that reality as you move on. If instances of your online come back to haunt you, you could always try denying that it's you -- especially if you have a common name!

    You've done as much as you can...Move on now!!! 

    P.S: Beware! Keep your online persona clean, for you don't know what can hurt you (you know what I mean!) 

    Sunday, 23 June 2013

    How secure is your password?

    Passwords are quite important may it be for the system or for mail. Creating stronger passwords is not going to help if your system is already compromised with Malware. Trojans can keylog, screen scrape and form grab to get hold of the password credentials. So the very first thing to do before changing your passwords is to make sure your computer system is clean and protected. But, if that's not the case, you need to have a stronger password, which is difficult to crack for hackers. Do you want to check how strong your password is?

    Know How...!!!
    -->Check out strength of your password and how long it takes for hackers to crack your password @: https://howsecureismypassword.net/
    -->You can also find your password's strength using password strength guage @: http://www.caeus.com/utilities/password-strength-checker.php
    -->One more site to test the strength of your password: http://www.ismypasswordsecure.net/

    So, be cautious while making your new password, difficult enough for anyone to crack. My password is secure by the way LOL :)

    P.S: These sites' tools use javascript, which runs on your browser itself and so evaluation is done on our computer itself, which means they are safe enough for us to check... :) 

    How awesome Google Easter eggs are...?

    Google is awesome... I love it..This is what most netizens say. Google's "Don't be evil" motto has gifted it with lots of hidden easter eggs in it.. Thanks to its dedicated employees. You can have fun with them too...

    Know How..!!!
    1. Askew: Ever had the chance of searching Google for Askew or Tilt? If you have, then you already know what comes up. If you haven't, do it now and you will see the search results page literally tilt to give you a better idea of what these words mean. This will work only if you use latest browsers which support HTML5 and CSS3.

    2.The Loneliest number: 
    The loneliest number search results above... :) You get "1"

    3. Zerg Rush: Search Google for Zerg Rush and you will see the O's of Google attacking the search results page. They will attacking every result one by one. There is a health bar which indicates how injured a search result is. You can also kill these O's by clicking on them. They also have health bars which indicates their health. You get points on the basis of how many O's you kill. The aim of this game is to beat as many O's as possible.

    Google Tricks & Easter Eggs
    4. Do a barrel roll: 'Do a barrel roll' in its true sense means to do a 360 degree spin. Google takes practical demonstrations way too seriously for this one and literally spins the search results page to give you a clearer idea of the meaning of this phrase. Don't believe me? Go search Google for Do a barrel roll now and see your world turn around.


    5. Recursion: The "Did you mean?" feature of Google often helps many users to get to the right results when they type something different from what they intended to search. If you search Google for recursion, the same feature takes you to an endless loop of clicks all linking to the same results page thereby completing recursion, which occurs when something calls itself. Seriously geeky.

    Google Tricks Easter Eggs
    6. Once in a Blue Moon: Ever wondered how much is 'once in a blue moon'? You must have heard this phrase often but Google calculator will give you the exact value of this phrase and surprisingly, it denotes frequency rather than time. Go search Google for this to get "1.16699016 × 10-8 hertz" as the answer.


    Google Easter eggs
    7. Answer to the Ultimate Question of Life, the universe and everything: Google is omniscient. Even the "answer to the ultimate question of life, the universe and everything" is known to Google. Just search Google for the above phrase and Google calculator will give you an answer. What are you waiting for? Just go to Google and find the true meaning of life.

    8. Chuck Norris: A classic, third-party search gag is revealed by asking Google to "find chuck norris" and hitting the "I'm Feeling Lucky" button. The result, in bold red, reads "Google won't search for Chuck Norris because it knows you don't find Chuck Norris, he finds you." Suggestions for the next course of action include, "Run, before he finds you."

    9. QingMing: If you search for “qingming” (a traditional Chinese festival), Google will decorate your search results page accordingly, painting the white space with watercolour plants, occasional rippling water and some children perched atop blinking cows. If you look closely, you may spot a fish or two leaping from the ‘water’.

    10. Epic Google: When Google get’s too big for its own good? OMG..!!! Growing toooo big :)

    Hope you enjoyed funny Google tricks 


    How to create Undeletable files & folders?

    It happens to many of us frequently.. You have hundreds of files and documents which are very important for you in that folder, and one day you find that some one has deleted that folder either by mistake or to make you fall in trouble. If you want to overcome this problem, you need to create a folder which is undeletable and files too. Do we have such options? Yes, we do have. This trick for 92% of Netizens, you know what I mean... It's for Windows OS users :) 


    Know How...!!!
    -->Here are the steps how to create undeletable and unrenamable folder...
    1. Open Command Prompt, by typing "cmd" on run command line.
    2. Now, if you want E:/ as the destination, just type E: and press enter.
    3. Now type the command md\aux\\ and press enter.

     And that's it...You get a folder named aux in E:/...
    Try to delete and you get the error below:
    Now Windows will create an undeletable, unrenamable folder in the drive you entered in step 2. Quite easy to create .Isn't it?

    How did this happen? What's secret behind this?
    Let me reveal: The basic concept behind this trick is the use of Keywords. Keywords are reserved words in any programming language that cannot be used as names of variables. Windows also uses certain keywords in its programming. Some of them are con, aux, lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8 and lpt9.

    -->How to delete the undeletable folder?
    Now, here is the process.
    1. Open command prompt and go to the drive where the folder is available.
    2. Now, type rd\aux\\ and then press enter. That's it.
    Your undeletable folder is deleted... :)

    Note: Folder cannot be deleted or renamed, but files in it can be deleted, leaving it empty by using the above trick.

    -->How to, if you need to create undeletable and undetectable files too?
    Check out this simple method to make it happen:

    1. Go to command prompt.

    2. Go to the drive or folder where you have folders or files which you want to make undetectable , undeletable , etc.
    3. Now in command prompt type:
    attrib
    and add the following code to it. You can use these codes together or just with single.
    +s : This variable makes the “Attribute” of a file into a system file
    +h : This variable makes the “Attribute” of a file hidden
    +a : This variable makes the “Attribute” of a file archived

    For example, you want to make a file CSE.txt undeletable, then type attrib +s CSE.txt and press enter. This makes CSE.txt undeletable. If you want it hidden, add +h along with above attrib command and press enter.

    That's it...!!! Your file becomes undeletable, hidden or archived as you like...

    -->Again, what if you want to delete?
    If you want to make it deletable and detectable again, just type the codes with "-" in them for all the "+" u have given.i.e attrib -s -h CSE.txt 
    You can open the file without deleting their attributes by typing their location in the address bar. Like mine undeletable file location is E:\aux\CSE.txt. Just type it in address bar and CSE.txt will open up even if it is undetectable.

    You are unbeatable now, with your files and folders secured...Keep smiling. 
    Have a nice day :)