Installation Instructions For 144 pin SODIMM

These instructions provide general installation and handling information for 144-pin SODIMM memory. These instructions are intended to be used in conjunction with your model-specific owner's manual.

INSTALLATION PROCEDURE

NOTE: Before touching any electronic components, make sure you are properly grounded. By wearing a wrist strap (or using some other type of static control device), you can prevent static electricity stored on your body or clothing from damaging your installation.

  1. Always turn off your computer and remove the rechargeable battery pack before installing your Kingston memory.

  2. Insert the module into the socket at a slight angle (approximately 30 degrees). Note that the socket and module are both keyed, which means the module can be installed one way only.



  3. To seat the module into the socket, apply firm, even pressure to each end of the module (see the arrows) until you feel it slip down into the socket. If you are having problems getting the module to seat properly, try rocking the module up and down slightly, while continuing to apply pressure.
    ? When properly seated, the contact fingers on the edge of the module will almost completely disappear inside the socket.
  4. With the module properly seated in the socket, rotate the module downward, as indicated in the illustration. Continue pressing downward until the clips at each end of the socket lock into position. With most sockets, you will hear a distinctive CLICK, indicating the module is correctly locked into position.
  5. Once the module or modules have been installed, the computer?s cover can be reinstalled.

  6. Reinstall the rechargeable battery pack and any cables disconnected during the installation process.

  7. Turn on the computer and follow the instructions in your computer owner?s manual that describe the steps necessary to allow your computer to recognize the newly installed memory.

Installation Instructions For 168 pin DIMM

These instructions provide general installation and handling information for 168-pin DIMMs. These instructions are intended to be used in conjunction with your model-specific owner's manual.

INSTALLATION PROCEDURE

  1. Place the computer?s power switch in the "off " position and disconnect the AC power cord.

  2. Remove the computer?s top cover following the instructions in the model-specific owner?s manual.

  3. Before touching any electronic components, make sure you first touch an unpainted, grounded metal object to discharge any static electricity stored on your clothing or body.

  4. Locate the memory expansion sockets on the computer?s motherboard. If all the sockets are full, remove smaller capacity modules to allow room for higher capacity modules.

  5. Handle your new module(s) carefully; do not flex or bend the module(s). Always grasp the module by its edges.

  6. For some installations, DIMM memory can be installed in any available expansion slot. Other installations may require the memory to be installed in a particular sequence based on the modules capacity. Check your owner?s manual to determine the correct installation sequence for your configuration.

    • Insert the module into an available expansion socket. Note how the module is keyed to the socket. This ensures the module can be plugged into the socket one way only. Firmly press the module into position, making certain the module is completely seated in the socket. Repeat this procedure for any additional modules you are installing.

    • Most 168-pin DIMM modules have ejector tabs. The ejector tabs are used only when you need to remove a module. By pressing down on the ejector tabs, the module will pop-up from the socket and it can be removed.



  7. Once the module(s) have been installed, the computer?s top cover can be reinstalled.

  8. Plug in the AC power cord and reinstall any cables disconnected during the installation process.

  9. Turn on the computer and follow the instructions in your computer owner?s manual that describe the steps necessary to allow your computer to recognize the newly installed memory.

Mail 2 IM - E-mail Notification through IM, Twitter or Mobile Phone

Mail2.im is an an online tool that can forward all incoming messages to your IM, email, Twitter or mobile phone. It is an e-mail notification service using which you don’t have to miss any of your important mails. It is a very handy application to keep a regular update of all the mails you get.

mail2im forward mails to IM,twitter,mobile phone etc

To use Mail2.im you should signup by giving in your e-mail address and activate your account by clicking on activation link. After that go to your account and add your IM, Email, Mobile Phone and Twitter details where you want to get the notifications.

Mail2.im will then provide you with forwarding address which you can give to others. Whenever someone sends a message to that address Mail2.im will first try to deliver it to your IM and if you’re not online, it’ll forward it to your email, mobile phone and twitter account.

It supports many IM services like Google Talk,Msn messenger, yahoo messenger, Aim and Skype. You can also use Mail2.im to forward messages to other mail2im members. For non members, You can email, IM, text, or twitter to Mail2.im with the person’s email ID as the first word of your message and Mail2.im will deliver it.

How to make your own USB phone charger

What would you do if your cell phone is running out of power. You need it on, but there’s not a power outlet in sight. The answer is simple, If you’ve got a charger and USB cable to spare, you can make your own cell phone charger in 15 minutes! The method works with most phones that have a 3.6 Volt Li-ion battery (this is usually mentioned on the battery itself), but still may not work with some, so make sure it’s a spare charger you’re using.

Most phones will work for this trick but there are supposedly cell phones out there that wouldn’t work— requiring greater current than the USB port can deliver—but these should be very few, and you’d be really unlucky to have ended up with one.

know the USB

usb cable

The two extremes (pins 4 and 1from left to right) are the ones I am after—they’re the negative and positive terminals for USB power respectively. Pins 2 and 3 are for data.



Hack ‘Em Up

usb and charger

Use a wire cutter or just a blade to cut and open up both the charger and USB cable. The red and black wires in the USB cable are what we’re concerned with—the white and green are for data, so don’t bother with those. Your charger should have red and black wires too—I know of none that wouldn’t have the colour-coding, but you never know.


Making Ends Meet

usb charger
You’ve probably guessed this now—join the two red wires and the two black wires. If you have access to one, use a soldering iron and secure the connections using solder. This will keep it intact even if you use it a bit roughly. Insulate them from each other using electrical tape (extremely important), and you’re done!


Testing..

phone usb charger

Voila! It works! The next time you have a battery emergency, just leech power off your laptop and make that all important call!

How to Control the Line Break in the HTML code Sensibly

The line breaks for flowing texts on the homepage depend on the browser and the selected window size and font size. Occasionally, minus signs or value units get deleted or long terms get separated incorrectly. Here’s a way to ensure that the text remains orthographically correct and legible in all cases.

Since each unique user has different settings for screen resolution, window size and font size; the line breaks in the browser are dynamic. Instead of a fixed allocation, you want to make sure that related items such as values and units of measurement are not separated. Hence, you should insert ‘Pre-determined breaks’ for the browser. Since browsers do not always adhere to the HTML standards, and use the line break in various ways, it is you who must decide whether an HTML that adheres to rules or a representation which is correct in most situations is more important or not.

An unwanted line break can be avoided with the ‘ ’ code for a protected empty space. This works well in all browsers except Internet Explorer. It encounters problems that cannot be solved with this trick alone. Except after the hyphen (minus sign), Internet Explorer inserts breaks even after percent and degree signs and brackets and inverted commas. Even the ‘ ’ code does no help here.

Use the special tag ‘ so that the browser does not separate the temperature value such as ‘-5 °C’ after the minus or the degree sign. Then, simply type the temperature value as -5 °C -

It is even more difficult to allow the desired line break at the right place. As per the HTML standard, a browser should treat the hyphen as normal sign and not separate it. A flexible separator ‘&shy’ is provided for the identification of a possible separation. However, in reality, Internet Explorer does not separate after a normal hyphen, whereas Mozilla Firefox adheres to the standard. On the other hand, the Opensource browser simply ignores ‘&shy’.

A frequently used solution is to insert another empty space after the hyphen to enable the separation in all browsers. In a running text however when there is no separation this is incorrect from the orthographic point of view. A tag not included in the HTML standard ‘’ helps even in this case. The best place to insert it is after the hyphen. Even this tag is accepted and converted by all browsers as a separating option.

Now you can’t see any @replies in Twitter - #twitterfail

Twitter made a small update in settings of notices section. This prevents an user from getting updates or tweets from your friends that start with @Username, if you were not following him/her. To be more clear you cannot see any more @replies in your twitter stream unless until you follow both the sender and recipient of the tweet.

According to Twitter blog..

We’ve updated the Notices section of Settings to better reflect how folks are using Twitter regarding replies. Based on usage patterns and feedback, we’ve learned most people want to see when someone they follow replies to another person they follow—it’s a good way to stay in the loop. However, receiving one-sided fragments via replies sent to folks you don’t follow in your timeline is undesirable. Today’s update removes this undesirable and confusing option.

I generally like @reply as it enables us to check out what our friends are discussing about and you can join their conversation if you like. But with this update, you won’t get all the @reply messages from any users you were following. This reduces chances of meeting new people as you don’t get any tweets about people whom you are not following.

If you don’t like this change, tweet about it using the hash tag #fixreplies, which is currently the top trending term on Twitter.

Original story:Pcsbox

Stop Security Checks to Speed Up Downloads in Firefox

One of the most important features that Mozilla Firefox has focused on is the security aspect of the browser. After every download that you trigger using Firefox, there is a security check that runs an anti-virus utility to ensure the security of the data on your computer . This, in some cases, causes the speed of file downloads to reduce considerably since every download has an independent virus check done on it. If you need to download many files then this may act as a hindrance since you will have to approve every individual download.

  • Click on the address bar and type in ‘about:config’.
  • There are chances that you might be redirected to a page that will ask you to confirm your actions. On the warning that appears,
  • Click on ‘I’ll be careful, I promise!’.and you will see a list of preferences.
  • Narrow down your search by typing ‘browser.download.manager.scanWhenDone’ in the filter bar.
  • A single value is displayed in the ‘Preference Name’ column.
  • Double click on ‘browser.download.manager.scanWhenDone’ preference to make the ‘Value’ change to ‘False’.
  • The changed value is reflected in bold text.

Henceforth, these security checks will stop bothering you every time you download a file. However this is not recommended these days as there is a possibility that the file downloaded may contain malicious code and this can force you to compromise on the security of the data saved on your computer.

T9 Nav - Make Your Mobile Navigation Faster and Easier using Keypad

It is not easy to use a cell phone in this age of technology where the average one holds a camera, radio, MP3 player, Web applications, games and various custom applications, at least if you’re not a technophile. If you struggle with myriad menus and buttons to get to a particular action, then it’s time you tried Nuance’s T9 Nav, it makes working with your cell phone a piece of cake.

Features

T9 Nav is a cell phone utility that provides a faster way for users to access all features, applications and content on their cell phone with just a couple of keystrokes. Designed to complement a device’s existing look and feel, T9 Nav doesn’t change the original interface or menu areas on the phone or affect its performance, but works alongside by placing all menu areas just a couple of clicks away from the idle screen.

T9 nav mobile application

For instance, typing ‘m-a’ (‘3-2’) from the home screen of the phone will bring up a list of actions, such as a mapping application, a Madonna ringtone, a contact named ‘Maya’ or any other content, contacts or functions beginning with those letters. T9 Nav also adapts to user behavior over a period of time to provide customized search results based on frequently accessed functions and content.

Download Instruction

Navigate to the website www.t9nav.com and click the ‘Download’ button, this will automatically launch a Nokia installer window. The user requires a Symbian S60 Third Edition handset to ‘Install’ the application, after providing their personal details and agreeing to the terms of use.

Performance

With a small file size, the application installs easily on any cell phone. It comes with a tutorial which the user can view before trying it out, but it’s superfluous, because it’s intuitive to use. If you have friends or family that have trouble finding their way through their phone, then go ahead and download this cool application to their phone.

I tested it out on a Nokia N73 and it worked pretty well. I took images and videos, named them, and could successfully access them by just pressing the first three letters of their file names.

The application also monitors the files or utilities that the user accesses regularly and accordingly bumps it up on the list. For instance, if the application monitored which songs were frequently played or the functions regularly used, these are given priority so that they appear on the list displayed when the corresponding numbers are pressed. Let me illustrate this with an example. If a user accesses the calendar the first time by pressing ‘c-a-l’ (2-2-5), and the list displays ‘Calculator’ and then ‘Calendar’, then the next time the user keys in the same combination, the ‘Calendar’ entry will be first on the list.

How to Open .daa Files for Free

There are many formats or file extensions which require only a particular software to use them. One such extension is .daa( Direct Access Archives ). It is a default format for PowerISO. This software is mainly used to compress large ISO files. The speciality of .DAA file format are compression, password protection, and splitting to multiple volumes.

Many files on the Internet are available in DAA format. We can’t use Power ISO for every one of them. So here is a way to open or extract them for free.Extracting DAA files require two steps

  • Converting the DAA file to an ISO file, and then
  • Burning the ISO file to a disc or extracting the ISO to get the required files.

In order to extract DAA files you will need two softwares :


DAA 2 ISO and IZarc

Once you’ve downloaded and installed them, follow these easy steps:

  • Open DAA2ISO, and in the first box, point to the DAA file. In the second box, select the place where you want to extract the ISO, and also the filename for it.
  • Open IZArc, and point to the ISO file and fill in the details like where you want it to be extracted to.

In this way you get the original encrypted files. This will be in .ISO format. You can burn them on a disk by using any burning software like NERO or ImgBurn (freeware). Open the software and burn the ISO file to a disc to get a disc with all the contents of the original DAA file. Using Power ISO or ISO buster you can view the files directly with out burning them on a disk. You can even use softwares like Virtual Drive or Alcohol to mount the ISO files on a virtual disk drive to explore the files.

How to Compile Software From Source Code in Linux

In Windows, installing software is a matter of clicks. In Linux, Depending on the distribution you have, software can be downloaded in the form of either RPM or Deb packages. Again, you can compile software directly from source code—download the source code which comes in a tarball, unzip it and then compile it.

In fact, this is the way source packages were distributed in the old days, and you might still have to go by this route in some cases. However, to most people out there, compiling from source still feels like voodoo. Here is a quick guide to all that you need to know about compiling from source and what goes behind the scenes, without leaving anything to chance.

Unpacking
Command to use: [tar xvzf mypackage.tar.gz] or [tar xvjf mypackage.tar.bz2]

This is the first thing to be done when you download the software. All the source files, associated libraries and documentation are distributed as compressed archives called tarballs. They are compressed using either gzip or bzip2, and hence the different extensions and the slightly differing switches used in the command.

After unpacking, a directory will be created with the name of the package in the destination folder. Change the directory using cd mypackage and then use ls to explore the directory tree. Make sure to read the readme, install and other documentation. Some packages might need some additional libraries or might suffer from dependency issues, so it makes sense to know what’s needed.

Configuring
Command to use: ./configure

After you have unpacked the tarball and have also solved any dependency issues by installing required libraries it’s time to go to the next step: configuration. You have to run the command while inside the installed package directory. This command does not change anything substantially. It basically does a house-keeping job, checking whether all the required resources in the form of system libraries are present and then assigning values for system dependent variables. Various switches can be used along with the ./configure command to change the behaviour of the program.

For example, appending -quiet would stop printing the checking… messages during the configure process. If you know what you are doing you can use -no-create to inspect the output files before they are created. Using -prefix=mydirectory you can change the path where the Makefile will be created. The sample output of a configure command will look something like this:

creating cache ./config.cache
checking for extra
includes… no

checking for extra libs… no
checking for a BSD compatible
install…/usr/bin/install -c
checking whether build envi-
ronment is sane… yes
checking whether make sets
${MAKE}… yes
checking for working
aclocal… found
checking for working auto-
conf… found
checking for working
automake… found
checking for working auto-
header… found
checking for working make-
info… found
checking for a C-Compiler…
checking for gcc… gcc

creating Makefile
creating kdevelop/Makefile
creating po/Makefile
creating kdlgloader/Makefile

creating config.h


After the ./configure command has run—during which you will see a bunch of messages scrolling up the screen in rapid fire sequence—a Makefile will be created. This Makefile is then used to build the binary which then needs to be installed.

Building
Command to use: make

The make command uses the Makefile to create installable binaries. Binaries are the Unix equivalent of executables, or .exe files. The make command is time consuming and results in a whole bunch of messages scrolling across your screen. This part is going to take a lot of time, depending on the package being compiled as well as the system configuration. There will be another bunch of messages scrolling across the screen, sometimes with warnings about some resource being absent. If all is okay, it will display the command prompt. If however, there is some problem it prompts you with appropriate status messages.

Most of the errors in the compilation process are due to missing or incompatible libraries. Say you have a software that depends on GTK+, with the latest version not present. You might then have to download it from the Web. For the most part, if your OS is new you won’t have any problems. However, you can always search software repositories provided by your OS vendor. Look for development versions which end with –devel.

Installation
Command to use: make install

The make install command is the equivalent of point and click routine on Windows. The installation time will again depend on how big the software is. Before doing this, you need to log in as root. Since you have followed the best practices and have up till now done everything from a user account type su (sudo for Ubuntu) and enter the root password. After getting administrator privileges use this command to install the software.

You will have no glitches and every thing will work out fine. Don’t forget to log out by using exit when you are done. The program will be usually installed in /usr/local/bin. However, if you have specified a path during the configuration process, you will have to navigate to that directory to access the program. In most modern Linux distributions, you will see a graphical shortcut and will have to click there to launch the program.

It’s that simple, really. Oh, and if you need to uninstall the program just delete the binaries. In some cases, you could use the make uninstall command to uninstall the program. Get cracking..!

How to Create Your Own Personalized Photo Gift Cards Easily

Creating personalized post cards or photo gift cards has become the flavor of the season. Most of the popular e-cards site provide you with an option to customize your own holiday postcards. But all you can do on the websites is add your images. With the help of this mini work shop, you can learn to personalize your photo card for every occasion, along with the perfect text. In order to make or create your own photo gift cards..


photo card maker - make personalized photo gift cards

  • Download Photo-Card-Maker from this link. by Clicking on “Save File”. After downloading, Double-click on “PhotoCardMaker.exe” to install.
  • Start the application. Click on “Select Template”. Select a template through the “Category” drop-down menu. Click on a template in the main window. Click “OK
  • To change text on the card, click on “Text”. You can add new text, change the font face, size and color on your card. You can clear out the text by clicking on “Delete”
  • You can place personalized images on every template. Click on “Photo”. Browse and open the image. Scale it according to your requirement. Click outside the image.
  • To make changes in the future, click on “Template” and click on “Save Template”. Your text elements will be preserved, but your image will be discarded.
  • To save the card as a *.jpg image, click on the “Save” button. Browse for the location, and type an appropriate file name. Your card is ready to be mailed.

How to Disable User Access Control in Vista

User Access Control is that annoying thing that keeps on popping up tirelessly to ask you if it is OK to install a particular program when you try to install one. It is one of the biggest irritants in Vista, but I must warn you that disabling it will render your system less secure.

  • Open the Control Panel, type in user account in the search box, and press [Enter].
  • You’ll see the link for Turn User Access Control (UAC) on or off. Click it.
  • Uncheck the box, reboot your computer, and you will no longer be bothered by UAC.

There is an even faster way to disable UAC from the command line: use

C:\Windows\System32\cmd.exe /k%windir%\System32\reg.exe ADD
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v
EnableLUA /t REG_DWORD /d 0 /f

For the security-conscious, I’d suggest an alternative method. In this one, only the UAC of the Administrator account is disabled; other users will go through the same security mechanism as before. Open the Registry Editor and go to

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Create a 32-bit DWORD ConsentPromptBehaviorAdmin and set its value to 0. Restart. What actually happens here is, you elevate the privilege level for the administrator.

Block Users from Downloading Files using Vista Web Filter

The internet is loaded with several junk files, which seem safe but later turn out to be virus or spyware. If several users access your computer, you can block certain users from downloading unwanted files from the Internet. You can use security features to prevent single or several downloads from the internet. Here’s what you need to do. Click on the following:


User accounts and Family Safety - Parental Control in Vista

  • Start > Control Panel’.
  • ‘User accounts and family safety’.
  • ‘Parental Control’ and select an appropriate account.
  • ‘On, enforce current settings’.
  • ‘Windows Vista Web Filter’.
  • Select ‘Block File Downloads’ check box and click ‘OK’.

Now the restricted user cannot download anything from the internet which makes your computer safe and secure..

How to Reduce Memory Consumption and Free Up CPU Resources of Google Chrome.

Google Chrome is used by many one including me. I like the speed of the browser. But One thing I don’t like in Chrome is it takes more memory or CPU resources. Chrome creates a separate process for each tab asking for separate resources from the computer.

The priority is given to the active tab. This makes the browser stable and makes it load web applications faster. You can change this and make all the tabs as a single process with a simple trick. This will reduce the memory consumption and will free up some CPU resources.

Note: This will be useful if you don’t surf many sites at a time. Don’t perform this hack if you are using Google chrome to open many number of sites at a time.

You can change the settings in 3 different ways based on the way of usage. They as as follows..

–process-per-tab
The default mode; each tab gets an independent process of its own. This increases the rendering of web pages and makes the browser stable as each tab is a separate process from the rest. But it also consumes memory.

–process-per-site
One process for each unique website; for instance a user with two tabs open for Gmail and another for pcsplace will have the two Google tabs running under the same process.

–single-process
The simplest mode; all tabs run in a single process, much like the other browsers we have now. This setting frees up memory for other applications. This is what we are looking for.

reduce google chrome memory consumption

To enable any of these settings,

  • Create a shortcut for Chrome.
  • Open the Properties tab.
  • Edit the Target field by appending single-process or –process-per-tab or –process-per-site to the file path.

Create different shortcuts for different settings and use them accordingly.

 
 
 
 
Copyright © PcBerg