Here are many tips and hidden tricks for your knowledge base. mesothelioma paternity paternity testing crm software refinance loan online drug rehab center student loan consolidation electronic medical records telecom audits remote access credit counseling medical billing high risk merchant account corporate gift ideas leadership development fleet management identity theft big bear florida mortgage broker alcohol abuse data logger california mortgage rates rackmount chassis, id card printers

18 September, 2010

USE USB AS A KEY TO START WINDOWS

Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.
*** DISCLAIMER : the following method requires you to make some changes to your operating system.MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk.Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  • Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
  • usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.
Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.
The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.

16 September, 2010

Techniques behind phishing


Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL

instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like

Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.
“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.

So the Bottom line to defend from phishing attack is
1.Never assume that an email is valid based on the sender’s email address.
2.A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.An email from trusted organization will never contain attachments or software.
4.Clicking on a link in an email is the most insecure way to get to your account.

WHY PC CRASHED (ALL REASONS)

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1. Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can
make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.)
4. Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5. Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.
6. Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec (www.symantec.com).
7. Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.
8. Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.
9. Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
10. Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
*******************************END

how to prevent orkut account from hackers

We already discussed on my blog how Orkut accounts are hacked from smart Orkut hackers by manipulating the victim (The account which is being hacked) in giving out his own password and account information using false technique such as Fake login page.So here are some of the tips for Orkut users to prevent from getting their own Orkut profile hacked!

Orkutting in Public Computer

Make sure you do not check the button “Remember Me” when you log in to your Orkut account from a publicly accessible Internet (Cyber Cafe).Someone might peep when you are typing the password,in such case strong password with numbers and capitalization are recommended.

Anti Keylogger

If you are visiting a local browsing center then try to check the programs installed in the computer.If you find keylogger (which stores password) then remove it immediately (Complain about this to the person who manages the browsing center).You can also install a Anti Keylogger to protect and safely log in to your Orkut account.Another solution for this is to make use of On Screen keyboard which is installed on every Windows Operation System.

Never use Javascript code

If a friend scraps you to copy the javascript code and paste it in your browser address bar then re check the Javascript to understand the code.If you are familiar with the code then make a search or better ignore such javascript scraps,no matter what they do! They are a time waster..

Re-Check Links via Scraps

Some people will blindly click on the website links sent by anonymous orkut user to the scrapbook.Re check the links once again and make sure you do not enter your password to any fake login page or give out any of the Orkut details if you are visiting a website or any link via orkut scrapbook.

Strong Google Gmail password

If you are having a password which is easy to remember then change is as soon as possible.Because hackers can make use of programs such as “Brute Force” to easily detect your password (If the password is short and is a dictionary word).Make use of Password generators and take a note of your password.Also make sure you have a good security question & answer which none of your friend can easily guess.

Check the address bar

Everytime you visit someone’s profile via links or any orkut community then check the address bar to ensure that you are on Orkut.com website.If you detect any different url then do not panic, immediately change your orkut password!

Stay away from Orkut Strangers

If someone requests for friendship then checkout his/her profile, check scraps, orkut communities and mutual friends joined by the person.So that you get a clear idea if the person is genuine or a orkut hacker who want to abuse your profile.

Maintain Orkut Privacy Profile

Keep your profile private if you are too much concerned about your privacy.Generally this will help you a great deal if you are orkutting to connect with Well-Known friends as it eliminates anonymous scraping and friendship with strangers!

Remember to Logout

Make sure you do NOT forgot to Log out from the Orkut website if you are accessing Internet from a public area.Once again double check Orkut,Gmail and Google services.
GA_googleFillSlot("Single_rectuangular_ad");
<br>

how to get back your orkut/gmail ids

Everyone should read this no matter how safe you think you are! As Google Account is a single account used across all Googles services like Gmail,orkut, Blogger, Adsense, Checkout. etc, it can turn out to be our worst nightmare if it gets hacked! Like many other online services Google tries to protect your account with secret question as well as optional secondary email address. But there is one more official option which only Google Provides! Now lets go step-by-step?

#1.Trying "Forget Password" Option:
I know this will not work in most cases, as options like forget password rely on secondary email address and security question, both of which can be easily changed once a account gets hacked. Still you should try atleast once as most password gets hacked by script kiddies and not by real hackers. So go to Forget Password form first!


#2. What if "Forget Password" Option Fails
You can submit a form to Google in which you can provide details about your Google Account usage. Details include information which most likely only real owner can provide. Here are few things for example?

* Last successful login date
* Account creation date
* Google products you used with this account and the date you started using each one
* Details about orkut account (if you use orkut)
* Details about Blogger account (if you use Blogger)

Now most important part is what they quoted on the form,

"Please answer each question as thoroughly and accurately as possible. If you?re not certain about some of the information, provide your closest estimate. Whether or not we can return your account depends on the strength and accuracy of your responses."

So I will suggest following things?

* Your goal should be to give Google maximum & accurate data! So take your time and submit form with maximum amount of information possible. You can consult your trusted friends if you are not sure. As an example it could be Vicky or Pankaj who invited you on orkut. If you are not sure call them up and ask it!

* Submit only one form! Yes this should be common sense. Do not submit multiple forms. A person who uses around 10-15 Google products asked me if he can submit multiple forms mentioning different Google products.

* Submit form from the place which you use most often to access your account like PC at home! Although they haven?t mentioned this explicitly, line above submit button says, "Please note that we need your IP address in order to resolve this issue. Your IP address will be captured automatically when you submit this form."

Finally Contact Form is here!

http://www.google.com/support/accounts/bin/request.py?contact_type=ara&ctx=accounts&hl=en


I advise everyone to have a look at this form and information it asks. You can prepare a document about secret info, may be in cell phone or pen down it on a paper. This will come handy if something goes wrong in future!

I guess I have offered my best possible help on the issue. It may or may not work but Thats all I can do.

13 September, 2010

change password of linux and windows 7

kon boot

hack password of window 7 and linux by this software..


1. Download Kon-Boot ISO and burn to CD. (Its only a few KB in size)
(Link:http://www.piotrbania.com/all/kon-boot/)
(If you don't know how to burn ISO images to a CD, write it in the comments and
I will write a tutorial very soon)2. Insert the Kon-Boot CD that you just burned and boot the computer with the CD.
You will need to configure the BIOS to start up the computer with CD.
(Most modern PC's don't require anything and its pretty easy too,
if needed, write it in comments if you need help)3. A kryptos login splash screen appears.
Youll need to hit enter to continue or else the screen will stay there.
Kon-Boot login windows without password4. Kon-Boot will tell you that it is ready to hax0R in. (Kewl huh?)
It will check SMAP BIOS entries, detect dummy BIOS, and fix SMAP entries.
KonBoot login to password protected windows5. Windows will now load as normal.6. When the Log On to Windows box appear, simply type anything in the password box and youre in!
You can even leave the password field blank.Do take note that Kon-Boot does NOT modify any of your files.
If you boot up the computer the next time without Kon-Boot CD
and try to login using any password, youll get the error
The system could not log you on. Make sure your User name and domain are correct,
then type your password again. Letters in passwords must be typed using the correct case.Ive scanned Kon-Boot ISO image file in VirusTotal and so far only Kaspersky,
F-Secure and Microsoft detected it as a threat. For testing purposes,
Ive installed and updated Kaspersky Anti-Virus 2009 on my desktop computer,
then used Kon-Boot to login to a password protected account.
I am still able to login and Kaspersky did not find any suspicious activity.Kon-Boot is free, small and very useful! In my opinion,
it is so far the BEST tool to login to Windows without password today.
Think carefully of what youre going to do because you will lose friends, job, trust
and etc if youre caught breaking in to Windows without permission and remember
I don't take any responsibility.Here is a Sample Console output of what it will look like -Ubuntu 8.04 torpeda tty1
torpeda login:kon-usr
# id
uid=0(root) gid=0(root)
# whoami
root
download
CD ISO ImageCD-konboot-v1.1-2in1.zip

How to Trace Any IP Address

ipmap

In my earlier post I had discussed about how to capture the IP addressof a remote computer. Once you obtain this IPaddress it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to http://www.ip2location.com/demo.aspxand enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of abutton you can find the following information for any given IP address.

1. Country in which the IP is located 2. Region 3. City 4. Latitude/Longitude 5. Zip Code 6. Time Zone 7. Name of the ISP 8. Internet Speed 9. Weather Station 10. Area Code and 11. Domain name associated with the IP address. A sample snapshot of the results from ip2location.com is given below

ip2location_results
You can also visually traceroute any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

anonymous orkut scraps trick send anonymous scrap on orkut

anonymous orkut scraps trickWARNING : do this trick with new orkut account because you are going to delete your account in this trick

Sending anonymous scraps on Orkut is a pretty fun trick. You can send scraps to your friends, write whatever you want in that scrap, but your friend will not be able to catch you. Your friend even won’t be able to drop a reply to that scrap sender also. This trick is known as anonymous scrap trick. Play this Orkut prank with your friends and surprise them
.


To post anonymous scraps and hide your identity on orkut, follow the below steps.
  1. Go to www.orkut.com and open a new account. (Use any email ID to get registered)
  2. Sign in to your orkut profile with your new email and password.
  3. Write scraps and post in your friend’s scrapbook. You can post scraps in as many scrapbooks as you like.
  4. When you are done with scrap writing, it’s time to make them anonymous.
  5. Navigate to your Orkut profile’s Settings >> General >> My Account >> Delete my Orkut Account >> Delete Account to delete your Orkut profile. (Remember that you are deleting your newly created account, your original account is safe, don’t worry!)
  6. Now after the deletion of your Orkut profile, the scraps you sent and the scrap sender both will be marked as anonymous.
  7. You are done.

http://216.74.55.182/images/slides/createscantoword_1.png CONVERT SCANNED TEXT IMAGES TO TEXT DOC

http://216.74.55.182/images/slides/createscantoword_1.png


OCR (optical character recognition) is the recognition of printed or written TEXT CHARACTERS s by a computer. This involves photoscanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.

In OCR processing, the scanned-in image or BITMAP is analyzed for light and dark areas in order to identify each alphabetic letter or numeric digit. When a character is recognized, it is converted into an ASCII code. Special circuit boards and computer chips designed expressly for OCR are used to speed up the recognition process.


OCR is being used by libraries to digitize and preserve their holdings. OCR is also used to process checks and credit card slips and sort the mail. Billions of magazines and letters are sorted every day by OCR machines, considerably speeding up mail delivery.

CONVERT YOUR SCANNED TEXT DOC TO TEXT FILES

http://img.openablog.net/sv7/images/edit170856.jpg
FREE OCR SOFTWARE

DOWNLOAD FROM HERE....

free calls from yahoo

free calls from yahoo
100 % working trick

first you need latest yahoo messanger


first dial this no

+18003733411

hear the instruction of lady

when she says free calls


choose free call

and then dial the number

country code 1st and enjoy.......


its all the VOICE basic Command use ur voice to activate FREE calls...


you can call 5 min for free every day