Your Ad Here

Synchronize files in Windows XP

Many people still use the "low tech" way to synchronize files in Windows XP. They copy them onto a floppy for transfer. Others hook their laptop into the network and manually copy files over the network.

There's nothing wrong with that, except that there's a much simpler way to synchronize files in Windows XP.

f you want to keep files synchronized between your laptop and your office environment, you're much better off using something called "Offline Files" in Windows XP.

Offline Files automatically deals with situations where files are changed both on your laptop and on the network location. How would you manage synchronization when it's possible that neither copy is in it's original state ?

100% availability

The Offline Files functionality is extremely useful if you want to work with your files when they are not always available 24/7. Think of files on a network that periodically goes down for maintenance or files on a desktop pc that you want to access while traveling with your notebook.

Offline Files is designed to be an improvement over the Briefcase function from previous Windows versions.

The feature is only available in Windows XP Professional, not in Windows XP Home Edition. However, only the computer that needs to maintain and synchronize the Offline Files needs Windows XP Professional. The computer that stores the original files can be running any operating system.

You must first turn off "Fast user switching" to start using Offline Files to synchronize files in Windows XP. Don't know if "Fast user switching" is enabled ? If your computer is part of a network with a domain, you don't have to worry about it. Fast User Switching is not an option in domains.

Not part of a domain ? Do the following :

  • Click the Start button and select "Control Panel"
  • Open up "User Accounts"
  • Click "Change the Way Users Log On or Off"
  • Deselect the "Use Fast User Switching" checkbox and click ok

Now you're all set to synchronize files in Windows XP.

  • Right-click the Start button and select "Explore"
  • From the Explorer menu, select "Tools"->"Folder Options"
  • Click the Offline Files tab and check the "Enable Offline Files" check box
  • Change the additional synchronization settings if needed

You can return to this dialog any time to delete offline files with the "Delete Files" button. Use the advanced button to setup how your computer needs to react when the connection to another computer on the network is lost.

Make the selection

Next, you need to select which networked files and folders you want available on your local hard drive :

  • Right-click the network file or folder that you want to cache
  • Select "Make Available Offline"

If this is the first time that you do this, the Offline Files wizard will allow you to set some extra configuration options. If you selected a folder that contains subfolders, you will need to specify whether you want to include these as well.

When you work offline

If you synchronize files in Windows XP like this, the files will appear as if they were online even when they are not actually available. You can access them the same way you usually do. If they are available via the network, you get the "live" copy; if they are not available, you get the offline copy. An icon in the notification area will inform you if you are working offline.

Connected to the network

As soon as you connect your laptop to the network again, you need to synchronize your files. Windows does it automatically for you if you have set the configuration options to automatically synchronize at logon and / or logoff.

You can also manually synchronize files in Windows XP :

  • Click the Start button
  • Select "All Programs"->"Accessories"->"Synchronize"
  • The "Items to Synchronize" dialog allows you to select which items you want to synchronize
  • Click the Synchronize button

When both your local copy and the network copy of a file have changed, Windows will ask what you want to do. When only one of the copies has changed, it will overwrite the un-changed copy.

Alternatively, you might want to ...

Another way of accessing your files in your office environment is by using remote control software. Windows XP has its own built-in remote access feature, called remote desktop (RDP), but that is often limited when your office network uses a firewall.

This limitation can be overcome by using a third party remote access software like Citrix GoToMyPC. It works like a charm and passess through most firewalls, because it uses the standard http internet port to remotely access your pc.

Create Table without using mouse and menus in MS-Word

Create Table without using mouse and menus
Do you know its possible create Table without using mouse and menus in MS word and Outlook. Here its that… Type the content (+——+——-+——+) in Microsoft Word, Outlook and pressEnter. One row of a table will be created and for more rows you can press
TAB. Step 1:
+———–+————————+————-+
Step 2:
(After pressing Enter having the cursor at the last '+' Result will be like the below one)

Step 3:
(press TAB to create more Rows)
In this ' + ' represents the column borders and ' – ' represents the length of the each column.

Windows XP System Restore

Windows XP System Restore is a very powerful feature that can save you lots of time and frustration.

  • Create a restore point before you install new software
  • Flashback your computer directly to a restore point
  • Use your computer's last known good configuration
  • Remark : Windows XP System Restore is pretty powerful, but it is not a replacement for a backup program. It doesn't make backup copies of your files, you still need to do this yourself.

    It does save important information about Windows system files, registry settings, and settings for different users on your pc. That makes Windows XP System Restore a pretty clever tool, providing capabilities to get your digital life back on track when something goes terribly wrong.

    When Windows XP System Restore is activated on your pc (we'll see how to do that in a minute), it creates system restore points automatically :

  • When you install new software (provided that the software behaves properly and warns Windows about its presence)
  • When you install a Windows patch, security update or service pack
  • When you install a non-signed driver
  • Before you restore to a previous restore point
  • Once a day

You can also initiate a manual restore point creation.

Windows XP System Restore for you ?

Suppose you want to install a piece of free software that came with a box of breakfast cereals. Generally not the best idea to keep your computer in good shape, so you manually create a system restore point before the install.

You need to have System Restore turned on on your computer to be able to do this.

To Turn on System Restore

Click start -> All Programs -> Accessories -> System Tools -> System Restore.

If System Restore was turned of on your computer, you will see the following dialog :

Turn on System Restore

If Windows shows you the System Restore wizard screen instead of the above image ...

... STOP ! You already have it enabled on your computer. Else ...

... click yes to enable it. Windows shows this screen :

Turn on System Restore

Make sure to UN-check the check box that says "Turn of System Restore on all drives" and click ok.

That's all ! The next time you launch System Restore, you will see the "Welcome to System Restore" wizard.

Now that you have System Restore enabled, you want to manually create a System Restore Point :

Click start -> All Programs -> Accessories -> System Tools -> System Restore

The Windows XP System Restore wizard appears. Click the option "Create a Restore Point" and click next. The wizard wants a name for your restore point. Don't enter the date here, because Windows keeps track of Restore Point dates automatically. Rather enter something descriptive like "Pre-breakfast cereal software point".

When you have entered the Restore Point Description, click "create".

The wizard may take some time to complete the operation but soon you will see the "Restore Point Created" screen.

That's all there is to it, you just created a System Restore Point. Now you have a safety net available to install new software.

Windows keeps your restore point 90 days or until System Restore runs out of disk space, whichever comes first. The restore data needs to be stored on your hard disk and you can reserve up to 12% of the total capacity on your hard disk for System Restore information.

Use Windows XP System Restore to flash back your pc to a point in time when it was working fine

Suppose that you installed your piece of software and that it isn't what you expected after all. Maybe it even crashed or caused your computer to be instable. Wouldn't it be great if you could just restore your computer to a point back in time when it was still running fine ?

With Windows XP System Restore you can.

If you are restoring your computer because of trouble with a piece of software that you installed, always un-install the program before you run system restore. To do this, click Start -> Control Panel -> Add or Remove Programs and use the program uninstall button.

With that out of the way you are now ready to restore your computer. Note that mail messages, word documents, your internet explorer favorites and personal documents are preserved by system restore. You will still have them after you restored your computer to an earlier point in time.

Just click start -> All Programs -> Accessories -> System Tools -> System Restore

The System Restore wizard appears. Click the "Restore my computer to an earlier time" option and click next.

The System Restore wizard shows a calendar with earlier restore points. Choose a restore point where your computer didn't have problems and click next. The wizard shows the system restore confirmation screen, click next. When the operation is complete, Windows restarts and you will see a message that the system was restored. You can even undo the restoration if you want : if you start system restore a next time, you will see a new option "undo my last restoration".


Magic with MS-word

Magic with MS-word

This is something pretty cool and neat...


and unbelievable...


Open Microsoft Word and type=rand ( )


And then press ENTER


then see the magic...............................

REMOTE PC ACCESS

Access your PC Remotely
http://remote-software.50webs.com/

Remote PC access from anywhere in the world
Transfer files, run programs, access network resources
Access Remotely your PC is a computer program that lets you access your PC from another PC via the Internet, LAN, or phone connection and work on your computer remotely as if you were sitting in front of it
Enjoy The Free Software Collection and access the PCs all over the World

Menu bar missing in IE7?

Is your menu bar missing in IE7?
Microsoft's latest version of their internet browser, Internet Explorer 7 has quite some advantages over Internet Explorer 6, the previous version.

But it takes some getting used to.

__________________ Menu bar missing in IE7

The first thing you've probably noticed when you've opened up Internet Explorer 7 is that there's no menu bar along the top. Now, while it's perfectly possible to put the menu bar permanently at the top, that's most probably not going to be a reality for most Internet Explorer 7 users.

The designers wanted to give you more area for viewing the web pages you are visiting. Should you require the menu bar temporarily, just hit the ALT key once and it will pop up. Hit the ALT key again and it will go away.

Should you still prefer to have the menu bar permanently at the top, then you can always click on "tools" and select "menu bar" in the drop down menu.

Menu bar missing in IE7

De-selecting the "menu bar" option from the "tools" drop down menu returns to the default setting where you have your menu bar missing in ie7.

The "menu bar missing in ie7" syndrome is one of the most common problems people have when upgrading to Internet Explorer 7. But did you know that Internet Explorer 7 is jam-packed with new features that can make your web life way better?

  • Are you worried about the online safety of your children?
  • Want to impress your relatives with new internet skills?
  • Trying to catch up with your kids?

WINDOWS

FOR WINDOWS
Speed Up Your Modem
Even if your modem is apparently working well, the baud rate of your COM Port might not allow you to reach top-speed. To improve your port's speed:
1. Click Start > Settings > Control Panel > System.
2. Click the Device Manager tab, and click on the "+" sign next to Ports (COM & LPT).
3. Select the port your modem uses, click Properties, then click the Port Settings tab and set the Bits per second to 115200 bps. That way you won't have a sort of filter on the Port.

Trace The Route
A great utility included with Windows 98 is a program called Trace Route. Open a DOS window and type tracert . The location name can be any IP address or Internet domain like tracert www.chip-india.com.The program will then trace the route from your Internet service provider to that location, and show you every server along the way. This could be useful for when you can't connect to a site - it will show you if some server is down along the way

Redialing
Dial-Up Networking provides for automatic redial.
1. Open Dial-Up Networking.
2. Select your connection.
3. From the menu select Connections > Settings.4. Enable Redial, select the number of times to redial and Click OK

Speed up your Modem
To Speed-up the time it takes for Dial Up Networking to establish a connection with your ISP:
1. Open Dial-Up Networking.
2. Right-click your connection and choose Properties.
3. On the Server Types Tab, under Advanced Options, make sure that the check-box for Log on to network is unchecked.
4. Under Allowed network protocols select only TCP/IP and uncheck NetBEUI & IPX/SPX

Stay Connected
If you get disconnected frequently, try this extra modem setting:
1. Open Control Panel > Modems.
2. From Modems select Properties, select the Connection Tab and click the Advanced button.
3. In the Extra settings dialogue box, enter ATS10=250.

Icon Spacing And Resizing
Changing icon size & spacing is handy if you have a desktop clustered with dozens of icons.
1. Right-click on the Desktop Choose Properties from the context menu. On the Appearance tab look in the Item list box.
2. Once you find Icon you can choose the size from the Size box.
3. Similarly, locate Icon Spacing (Horizontal) and Icon Spacing (Vertical) and you can choose different values for each.
4. Once you are satisfied, click OK to exit the dialog box.
5. Press F5 to refresh the Desktop.

Select Your Monitor
Windows 98 might not always detect your Monitor accurately. This affects display and refresh rates. To select your monitor manually:
1. Right-click on the Desktop.
2. Choose Properties from the context menu. On the Settings tab press the Advanced button. Select the Monitor tab. If your monitor is not listed (correctly) here, click on Change.
3. Select your Monitor from the list, or if you have a driver disk for your monitor, select have Disk.
4. Click Apply, and follow any other instructions on screen.

Change The Refresh Rate Of Your Graphics Adapter
Refresh rate of your monitor determines how fast the screen is updated. Generally, the higher refresh rate the monitor can support, the better. Optimum refresh rates can be set manually for flicker-free display, if Windows hasn’t already configured it.Right-click on the Desktop, click on Properties and open Settings > Advanced > Adapter. Depending on your graphics card and monitor, you will get different choices for the refresh rate. Click on Apply after setting the appropriate refresh rate. Click through the warning messages to change the refresh rate. If, for some reason the display becomes garbled, don’t do anything ? Windows will restore the original refresh rate.

Adding Items To Send To Send
To is an option available when you right click any file in Windows. It can greatly simplify file management, especially routine tasks.
1. Browse to the \Windows\SendTo Folder using Windows Explorer.
2. Right-click an empty space on the window and click on New > Shortcut.
3. In the Create Shortcut window, enter the source of the program or the directory (e.g. C:\My Documents\) in the Command line box.
4. Click Next and Finish to create the shortcut.You can use the Send To feature not only for copying or moving files, but also for quickly opening files with programs they are not associated with. For example, you could create a shortcut to Notepad and send any ASCII text file (like .HTM files) to Notepad. Similarly, you could use a shortcut to an image viewing program to quickly view images.

Opening Files With Multiple Programs
To be able to open a file with more than one program, do the following:
1. Select Start > Settings > Folder Options > File Types.
2. Locate the file type you want to work with and double click it.
3. In the Edit File Type dialog that opens, you will see a box marked Actions. This is where Windows 98 stores the various actions that can be implemented on a particular file type.
4. To add an entry, click New. In the New Action dialog box, type the name of the action in the Action box. Use the Browse button to find the Application that you want to open the file with.
5. The action that is set as default would be carried out when you double click the file. Other actions will be available on right-clicking the file.

Associations In A Jiffy
To associate files of a certain type with a different program, hold down the Shift key while right-clicking on a file of that type and click on Open With... from the context menu. Select the program you want to open files of this type with and enable Always use this program to open this type of file. Henceforth, the file will always open with this program when double-clicked.

Adding A File Type To The 'New' Menu
When you right-click on the desktop or in Windows Explorer, the New menu lists many options of registered file types. Clicking on any of these creates a blank file of that type. You can add more items to the New menu.
1. In the program that creates the file type you wish to add, create a blank document with any preferences you wish to use and save it.
2. Copy this file to \Windows\ShellNew ? this is a hidden folder.
3. Start the Registry Editor.
4. Open HKEY_CLASSES_ROOT and locate the extension for the file type you wish to add to the New menu.
5. Right-click and click on New > Key from the context menu. Name it ShellNew.
6. Within this key, create a String Value and name it FileName.
7. Double-click the string and modify it to be the filename of the blank template you created, including the extension.
8. Exit the registry editor and restart Windows.

Cascading Menus On Clicking Start
Cascading menus of folders like Control Panel or My Computer could be very handy to have at start up. Here’s how to get them there.Right click the Start button and click on Explore. Create a new folder and type the following string, all on one line, replacing the words New Folder with this new line. You must type the period, the curly braces, all four hyphens, and the hexadecimal numbers exactly as shown.
Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Briefcase.{85BBD920-42A0-1069-A2E4-08002B30309D}
Dial Up Networking.{992CFFA0-F557-101A-88EC-00DD010CCC48}
Fonts.{BD84B380-8CA2-1069-AB1D-08000948F534}I
nbox.{00020D75-0000-0000-C000-000000000046}
Internet Cache.{7BD29E00-76C1-11CF-9DD0-00A0C9034933}
Network Neighborhood.{208D2C60-3AEA-1069-A2D7-08002B30309D}
My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Printers.{2227A280-3AEA-1069-A2DE-08002B30309D}
Recycle Bin.{645FF040-5081-101B-9F08-00AA002F954E}
Subscriptions.{F5175861-2688-11d0-9C5E-00AA00A45957}
URL History.{FF393560-C2A7-11CF-BFF4-444553540000}

Back To Old Ways
In Windows 98, when a menu is too tall to fit on your screen, you will see a scroll arrow at the bottom, allowing you to scroll further down. In Windows 95, a second menu would appear next to the first, where the entries which would otherwise not fit on your screen would be displayed. For Windows 95 like behaviour in Windows 98:
1. Start the Registry Editor.
2. Navigate to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced.
3. Right-click an open area in the right pane and select New > String Value.
4. Name it StartMenuScrollPrograms.
5. Double-click this entry and add the value false.
6. Exit the registry editor.To restore Windows 98 behavior, simply change the value of StartMenuScrollPrograms to true.

Window And Menu Animations
One of the desktop enhancements built into Windows 98 is the animation displayed when you minimise and maximise windows or when displaying menus. Disabling this makes navigating Windows a lot faster.Open the Desktop Properties dialog by right-clicking any blank area of the desktop and clicking on Properties. Disable Animate windows, menus and lists from the Effects tab.

F8 Free Start-Ups
Instead of hastily clicking on F8 at StartUp to display the start up menu, you can configure it to open automatically.
1. Use Explorer and locate Msdos.sys in the root directory ? it is a hidden file.
2. Maintain a copy of the Msdos.sys file in case of an error.
3. Open a command prompt window and strip the file’s attributes by typingattrib –h –s c:\msdos.sys
4. Edit the file in Notepad. Under the [Options] section, type: BootMenu=1BootMenuDefault=1BootMenuDelay=xwhere x is the delay in seconds. Default value for x is 30.
5. Save the file.
6. Again, open a command prompt window and reset the file’s attributes by typingattrib +h +s c:\msdos.sys

Arrow-Free Shortcuts
Shortcut icons have a small curved arrow in the lower-left corner. To remove the arrow, follow these instructions:
1. Start the Registry Editor.
2. Locate the keys HKEY_CLASSES_ROOT\lnkfile and HKEY_CLASSES_ROOT\piffile.
3. Delete the value IsShortcut under both these keys.
4. Close the Registry Editor and restart Windows.You can also do this using TweakUI.
Tips & Tricks Windows

Windows Virtual Keyboard

WINDOWS VIRTUAL KEYBOARD



CLICK ON START > RUN >type "osk" (without ")

TEST.... UNBELIEVABLE

YOU CAN LISTEN TO ANY PDF INSTEAD OF READING WITH ADOBE READER 7.0 OR 6.0, AND THE SHORT CUT

Ctrl+shift+B - To Hear The Entire Document
Ctrl+shift+c -To Resume
Ctrl+shift+v -To Hear The Page
Ctrl+shift+e- To Stop

Windows NT (Windows 2000, XP Professional)


Desktop Gone Forever

If you can do without the regular NT 4.0 desktop permanently, it's possible to start with just the Task Manager even without Command Prompt. Launch the Registry Editor and locate HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/ CurrentVersion/WinLogon. Double-click on value named Shell (set by default to Explorer.exe). Enter Taskmgr.exe for the NT Task Manager. For a command prompt, enter Cmd.exe. Close the Registry Editor and log off.

Using the Windows Task Manager
Windows Task Manager can aid you in finding the amount of RAM you can regain by disabling unnecessary system services. Right-click on the taskbar and select Task Manager from the context menu. You can view the CPU usage and memory usage under the Performance tab, To regain resources, you can kill unnecessary processes from the Processes tab.

Fast Menus
You can change the Start menu delay in displaying sub-menus. Run Regedit adn navigate to HKEY_CURRENT_USER \Control Panel\Desktop. Change the value for MenuShowDelay to any number between 0 (fastest) and 4000 (slowest). If the above does not exist, add a string value with this name.

Launch Faster
You can change the default boot delay of 30 seconds. Open Control Panel > System > Startup/Shutdown. Under the Show List For, change the settings to the desired boot delay value. To bypass the boot menu altogether, set the delay to 0. Note: If you dual boot between the Operating Systems using the NT boot loader, do not set the boot delay value to 0.

Messing with Partitions
Before using Disk Administrator to make changes to the partitions, you may want to make sure you save your current configuration. To do this, click Start > Programs > Administrator tools > Disk Administrator > Partition > Configuration > Save. Insert a formatted floppy disk into your drive and click OK. You can restore the partition structure later by clicking on Partition > Configuration > Restore.

Performance Monitor
The Performance Monitor will not monitor disk performance unless you turn on the disk counters first. to do this, open the Command Prompt window and type diskperf -Y. r\Restart the computer. you can monitor disk activity with the Performance, you should turn them off by typing diskperd -N at the Command Prompt when you have finished testing.

Sharing Resources Secretly
To secretly share a resource, simple append a dollar sign ($) to share name. When you do so, the resource doesn't appear in Network Neighborhood, but is readily available by either mapping the drive or typing the UNC in the Run dialog box. This provides an additional degree of privacy and security to a shared resource. Further more, and access restrictions or passwords assigned to that shared resource remain in effect.

NT Protocol Analyser
NT server 4.0 includes a software-based protocol analyzer called the Network Monitor Agent. To install it open Control Panel > Network > Services and click on Add. Select Network Monitor Agent from the list. You can now start Network Monitor from the Administrative Tools. To capture network data, click on Capture > Start. Click Capture > Stop to stop monitoring.

Alerter and Messenger
If messages don't reach their destination's) when using "net send" command, turn on the Alerter and Messenger serviced in the Services applet of the Control Panel. also, make sure that the intended recipient is not logged in to multiple machines.

Adding a Command Prompt to any Folder
Open Explorer and click View > Options > File Types. Locate Folder and click Edit. Click New to open the New Action dialog box. Type Command Prompt in the Action box, and type cmd.exe in the Application Used to Perform Action box. Now you can right-click a folder and click Command Prompt to open a Command Prompt window at the folder's path.

AutoComplete
You can automatically fill in file and folder names at the command prompt, much like a UNIX terminal. Launch the Registry editor and move down to the HKEY_CURRENT_USER \Software\Microsoft\Command Processor. Select CompletionChar and set its value of to 9. Restart the system for the changes to take effect. Now, at the Command Prompt window, type in the first few characters of the file or folders and press Tab to complete it automatically.

Saving Recent Desktop Settings
To save the Desktop settings on normal exits only. You could lose your recent Desktop modifications if NT crashes or hangs. you can save your current Desktop settings by selecting and object on the Desktop and pressing F5 key.

Key to the CD Key
The CD Key is required to reinstall the operating system. If you have lost it, you can retrieve it form the Windows registry. Open Regedit and navigate to HKEY_LOCALMACHINE\SOFTWARE\Microsoft\WindowsNT \CurrentVersion. Look at ProductId. The CD Key is digits 6 thought 15.

The Bin is Full
To change the icons used for the Recycle bin, run the Registry Editor and navigate to HKEY_LOCAL_MACHINE\Software\Classes\CLSID\ {645F040-5081-101B-9F08-00AA002F954E}\DefaultIcon. Edit the value labeled Full and type the path to the icon file. Similarly, edit the value labeled Empty Empty to specify the icon for the empty recycle bin.

Compressing data
Windows NT lets you compress and decompress directories and files on NTFS partition. Compression reduces storage requirements for seldom-accessed files without degrading overall drive performance. You can compress and expand files and directories form My Computer or Explore - just right-click on item, select Properties and enable Compress form the list of attributes.

Drop and Run
You can open the Run dialog box (Start > Run), then drag and drop a file or application onto it form My Computer or Explorer. The compete pathname appears in the Run dialog box. Now you could add command-line options or simple click OK to launch the file.

Re-create NT installations disks
You can re-create NT installation disks if you lose or damage your original set. Format three floppy disks and load your 4.0 CD-ROM in the drive. Form the Run dialog box, browse to the i386 folder on the CD-ROM and select winnet32.exe and click Open. Alter the Run command like to d:\i386\winnt32/ox (where the first d is the CD-ROM drive letter). Click OK and follow the prompts.

List of settings and address
For a complete list of the settings and address currently assigned to your system, open the Command Prompt form the Start button's Program menu, and type ipconfig/all. this will display all TCP/IP relates settings on the system. This is similar to winipcfg in Windows 9x.

Easy addition of users
Creating a user template makes if easy to add multiple new users with the same group and access privileges. Open User Manager for Domains. Add a new user by selecting New User form the User menu. Label this user as a template for the user level, such as Template--Worker or Template--Secretary and set the correct privileges and options for Groups, Profile, and Dial-in. the next time you need to add a user, simple select the template account, and select User > Cope from the menu. All you need to do is changed the name and password.

Maintaining a Repair disk
The Emergency Repair Disk (ERD) holds a record of the settings and boot parameters for your primary partition Boot Sector. Every time you make a change to these areas, you should also re-crease the ERD; otherwise, the repair disk will not restore your system to the most recent functioning state. To crease an updated ERD, type rdisk /s in the Run dialog box.

Documentation Books on your hard drive
Wish to avoid inserting the NT CD-ROM every time you access Books Online? Simple cope the \Support\Books form the CD-ROM to your hard drive. Next, remove the disc form the drive and attempt to launch the Books Online Shortcut. When you're prompted to insert the CD-ROM or specify an alternate route, click the Browse button, and select the directory where you copied the files.

Restoring a damaged boot sector
An up-to-date Emergency Repair Disk (ERD) can aid you in recovering from a damaged boot sector. To restore a damaged boot sector, reboot the computer using the Setup disk 1, followed by disk 2 when prompted. Select R for Repair. Form the next menu, select only Inspect boot sector (to check the boot sector for damaged). Insert disk 3 and then the ERD when prompted and follow the instructions on screen.

Corel Presentation

Sound Idea
Make your presentations come alive with music and sounds. To add sound file, click on Format > Slide > Properties > Sounds. Locate the sound files you want to insert in your slide. If you intend to plat the presentation on another computer that might not have the sound file, enable Save Within Slide Show Document. To add this sound to all other slides, click the Apply to All Slides in Slide Show checkbox.

Smart Contours
Corel Presentations can contour text around graphics objects in your slides. this can help place text in more aesthetically pleasing way. However, this can be done only on a graphics and shapes and not on clipart, images or charts. Insert a graphics or shape on the slide and select both, the textbox and the inserted object. click on Tools > contour Text. Select the appropriate contour options and click OK.

Color Chameleon
Change colors of graphics with a fade effect. To apply a color change effect, select the graphics object and click on the Foreground fill Color tool and select the color you want from the color palette. copy and paste the object into the same slide. Select the new object and fill it with another color. click on Edit > Select > All (to select both objects), right0click the selecting and click on Object Animation. Select Animate Object in Place. In the Effects list box, select Fade.

Audience Notes
Creating audience handouts in Corel Presentations is a simple matter of adding Audience Notes to your slides and printing them. Audience Note will include thumbnail images of your slides along with a new lines of space besides each for audience to take their own noted. To crease audience notes, click on File > Print and select Audience note. Choose the number of slides to printed per page and click Print.

Animating Bullets
Catch your viewer's attention to certain points in your slide show using animated bullets. Deselect the bulleted list if it is selected. Right-click the list and click on Object Animating. Click on the Animate Object Across Screen button and from the Effects box, select the animate that you want. Once you've setup all the options for your bullets to be animated, click on OK to finished.

Quick 3D
You can extrude objects quickly to give them a 3D look. You create this effect on your text and objects, select the object click on Tools > Quick 3D. Select the correct appearance form the Rotation and Perspective tabs. Enter the depth of the extrusion in the Depth box and change the color of the object using the Color Adjustment slider.

Blender
You can 'blend' two objects for a smooth transition between the two. Select the two objects and click on Tools Blend. type the number of intermediates stats you want in the Number of Objects Between Images box and click OK.




Corel Quattro Pro

Hidden Data
Want to conceal unwanted data in your notebook? Hide the rows and columns you don't need to see to crease a more organized look without losing the data. Select the rows and columns that you want to hide and right click the selection. Click Hide on eh context menu.

Quattro Pro and Arrows
Create arrows in your spreadsheet to direct information flow. Arrows can also be used to highlight relations between data cells and other objects. To crease an arrow, click on the Classic Objects icon on the Application toolbar and in the flyout, select the Arrow button . you can now draw the arrow on the spreadsheet.

NetLink
Links to information on the Internet can be included within your notebook. To add a Web link, click on File > Open and type the URL of the site that you want to add the link to and click Open. An Internet file will open in your notebook. Locate the cell address where the information that you want appears. Select the cell where you want the link to be and type the formal as +[Net URL]Sheet:Cell where Sheet:Cell is the address where the information that you want is displayed and the URL is typed between square brackets. Finally, enter the cell address where you want the information to be shows in the Link to box and click OK.

Bordered
Highlight specific cells in your spreadsheet by enclosing them in a border. in Quattro Pro, you can add borders with variables styles, line thickness and colors. To create a border, select the cells that you want to add a border around and click on Format > Selection. Under the Border tab select the type and color of the border.

Mistaken En Dash
When you want to enter data having an en dash symbol (-) in your spreadsheet, so that it is not interpreted as a minus sign (-), click on Insert > Symbol. change the set to Typographic Symbols and scroll down to locate the en dash. Click Insert and Close.

Fast Mail
Do you want to send your Quattro Pro notebook via email in a jiffy? Save yourself a few keystrokes by sending it directly from Quattro Pro. open the notebook and click on File > Send To > Mail. This will automatically open up the email composition window alone wit the notebook name as the subject.

Color Coded
Add color to your spreadsheet tags to help identify groups of sheers in a notebook. to color the tab, right click the tab and click on Sheer Properties. Disable Use System Color under the Tad color tab. Choose the color you want from the palette and click Ok to apply.

Print your Grids
You can print your spreadsheet along with its gridlines in Quattro Pro. to print the gridlines, click on File > Page Setup > Options. Enable the Gridlines checkbox under the Print Options selection.


'Webbed ' Tables
A 'Web look' can be imparted to your documents by using a Web formatting style. Select the Table and fro the Table menu, select Table AutoFormat. in the list of styles in the Formats box, three new Web styles have been added. Click on any of them for a 'Webby' look.

Watermark Your Documents
Creating your own watermark for professional looking documents is pretty simple in Work. First go to view > Header and Footer and click on the Show/Hide Text toolbar button located on the Header and Footer toolbar (insert icon image). This should temporarily hide the text. Now you can insert a graphics object using Clip Art, Word Art or even AutoShape. Place the graphics where you want it to be seen, and adjust the color of the watermark by right clicking on the object and choosing properties.

Convert Tables to Plain Old Text
Sometimes copying to and fro with a browser result in unwanted tables being created. this can be easily removed by converting into individual paragraphs and click on Table to Text option under Convert in the Table menu. the separation character can also be specified instead of normal column lines using the "Separate text with" option

Center Text Vertically
Text in Word can be centered horizontally as well as vertically. For the vertical centering, open File > Page Setup and click on the Layout tab. Select the Center option in the Alignment pill-down menu. Format you r document as usual and view its positioning using the print preview button.

Get Rid of Curly Quotes
Typing quotes in Word results in straight quotes being converted to small quoted automatically. This is done by Autocorrect function. Pressing Ctrl+Z (Shortcut for Undo) after typing single or double quoted will give you straight quotes. To permanently turn the feature off, click on Tools > Autocorrect > AutoFormat as you type and disable Straight quotes with smart quotes.

Collate Documents
Collating documents copies can be done automatically in Word. To collate documents while you print, click on the Print option from the File menu and click the "Collate" check box in the Copies heading. then fill the number of copies you want tin the box labeled "Number of copies". Simple click Print to get the collated multiple copes you want.

Bring Straying Lines Back Into Fold
A cool feature for your squeezers; get those extra lines on the last page of your document. Click on File > Print Preview. in the Print Preview window, click the Shrink to Fit button to fit the few overflowing lines onto the last page.

Create Email Signatures
Word allows you to create multiple signatures for your emails created in Word. To create to add a new signature, go to Tools > Options and click on the General tab, click the Email Option button. Type the signature it the text box below, type its name and click Add to add it to the set of signatures you can use. You can also set the default signatures for New and Forwarded/Replied Messages.

Take the Synonym Shortcut
Checking out synonyms of a word generally involves looking it up in the thesaurus in the Tools > Language menu. A faster way is to just select the word and right click it. In the menu, select synonyms and you will be presented with a list of synonyms to choose from. You can also click on Thesaurus to lookup more synonyms. often, Word will also present a few antonyms when you know what you don't mean to say.

Create your own Keyboard Shortcuts keys in MS Word

Today tip will help you to create your own keyboard shortcuts keys in MS Word. Before reading this tip, may be you are using only the default shortcuts keys which are available in MS Word application. You can select any specific key combination that you want to use to perform a particular task.

If you are not an expert user then you can take many clicks and lot of menus navigations to perform a basic task. With shortcut keys, you can speed up your working pace without lifting your hands on the keys; otherwise require a conventional mouse to select menus and buttons options. You can create your own keyboard shortcuts for every word command. For example, if you are using Word Count feature constantly then you can assign any key combination like Alt+Z to run Word Count command.

Follow the given steps to create your own shortcuts keys for your favorite command:

First click on Start button, go to Program then click on Microsoft Word to run the word page.

Now go to Tools menu and click on Customize option.

Here a small dialog box will appear with title Customize, now click on "Keyboard..." button.

Now again a small dialog box with title Customize Keyboard, the list of all the categories of commands with appear on the left side of the dialog box. You should click on the category that contains the command which you want to assign a shortcut keyboard.

Choose the command you want to assign a keyboard combination on the right side of the customize keyboard dialog box and then click the key you want to create shortcut.

Now click on Assign button to final the shortcuts key combination then close it.

In future whenever you type the keyboard combination, word will work according to that command you have assigned this shortcut.

Internet Error Codes and Meaning

Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.

Error Codes Meaning

400 This is bad request error, First check you may be typing wrong URL name and server could not understand your request.

401 You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.

402 Payment Required Error

403 You are trying to open any forbidden page and you are blocked by that domain.

404 Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.

408 This is time out error. you should send the request with in time that the server set for you.

save your favorite Web Pages on Your PC

Today tip will help you to save any webpage on your disk in proper way. Many times you find a webpage, which want to view or read when you are not connected to the internet. It's happened to you dozens of times in a month. Here I have solution to this problem, almost all web browsers allow you to save any webpage to your computer and when you can enjoy those pages whenever you want. There are many options in web browser to save your favorite web pages.

First open your favorite web page then go to File menu in web browser to save that page. In File menu choose Save as option here. You should browse to any folder where you want to save that webpage and choose the proper format to save it in.

Webpage Complete (*.htm, *. html)

This option saves the webpage in its regular HTML format. With this format, Internet Explorer saves all the graphics of that webpage only in one folder.

Web Archive, Single file (*.mht)

Using this option, the explorer saves the webpage in a single file in a zipped format which is known as Multipurpose Internet Mail Extension HTML. There are no folders creating with this technique and it save all the graphics of webpage in only one file. If you don't want to use the code of HTML, this format is better to save any file because this option saves all the files in a single file.

Webpage, HTML only (*.htm, *. html)

With this option you can save only the HTML portion of the webpage, with this option you can save webpage without any graphics. For the next time when you will try to open the page which you have saved though it might be difficult to read because graphics are normally use to hold the pieces of webpage together. If you want to reuse the HTML in a webpage you want to create then choose this option.

Text File (*.txt)

You can save a webpage as text format (text only) with using this option. If you want to save only text from a page and you do not want about the pictures then this is good option for you.

When you want to read that saved page, open your browser and go to File menu and then browse to that folder where you have saved that pages.


Make Blog

              HOW TO MAKE A BLOG WITH BLOOGER, BLOGLINE, USE ADSENSE, ADWORDS, WORDPRESS, TYPEPAD, ADBRITE AND YAHOO 360.

http://howtomakeablogg.blogspot.com/

Google Code

In communications, a code is a rule for converting a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver.

One reason for coding is to enable communication in places where ordinary spoken or written language is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaller or the arms of a semaphore tower encodes parts of the message, typically individual letters and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.

In the history of cryptography, codes were once common for ensuring the confidentiality of communications, although ciphers are now used instead. See code (cryptography).

Contents

  • 1 Codes in communication used for brevity
  • 2 An example: the ASCII code
  • 3 Codes to detect or correct errors
  • 4 Codes and acronyms
  • 5 Coupon Codes
  • 6 Gödel code
  • 7 References
  • 8 See also

Codes in communication used for brevity

A cable code replaces words (e.g., ship or invoice) into shorter words, allowing the same information to be sent with fewer characters, more quickly, and most important, less expensively.

Code can be used for brevity. When telegraph messages were the state of the art in rapid long distance communication, elaborate commercial codes which encoded complete phrases into single words (commonly five-letter groups) were developed, so that telegraphers became conversant with such "words" as BYOXO ("Are you trying to weasel out of our deal?"), LIOUY ("Why do you not answer my question?"), BMULD ("You're a skunk!"), or AYYLU ("Not clearly coded, repeat more clearly."). Code words were chosen for various reasons: length, pronounceability, etc. Meanings were chosen to fit perceived needs: commercial negotiations, military terms for military codes, diplomatic terms for diplomatic codes, any and all of the preceding for espionage codes. Codebooks and codebook publishers proliferated, including one run as a front for the American Black Chamber run by Herbert Yardley between WWI and WWII. The purpose of most of these codes was to save on cable costs. The use of data coding for data compression predates the computer era; an early example is the telegraph Morse code where more frequently-used characters have shorter representations. Techniques such as Huffman coding are now used by computer-based algorithms to compress large data files into a more compact form for storage or transmission.

An example: the ASCII code

Probably the most widely known data communications code (aka character representation) in use today is ASCII. In one or another (somewhat compatible) version, it is used by nearly all personal computers, terminals, printers, and other communication equipment. It represents 128 characters with seven-bit binary numbers—that is, as a string of seven 1s and 0s. In ASCII a lowercase "a" is always 1100001, an uppercase "A" always 1000001, and so on. Successors to ASCII have included 8-bit characters (for letters of European languages and such things as card suit symbols), and in fullest flowering have included characters from essentially all of the world's writing systems (see Unicode and UTF-8).

Codes to detect or correct errors


Codes may also be used to represent data in a way more resistant to errors in transmission or storage. Such a "code" is called an error-correcting code, and works by including carefully crafted redundancy with the stored (or transmitted) data. Examples include Hamming codes, Reed–Solomon, Reed–Muller, Bose–Chaudhuri–Hochquenghem, Turbo, Golay, Goppa, low-density parity-check codes, and space–time codes. Error detecting codes can be optimised to detect burst errors, or random errors.

Codes and acronyms

Acronyms and abbreviations can be considered codes, and in a sense all languages and writing systems are codes for human thought. Occasionally a code word achieves an independent existence (and meaning) while the original equivalent phrase is forgotten or at least no longer has the precise meaning attributed to the code word. For example, '30' was widely used in journalism to mean "end of story", and it is sometimes used in other contexts to signify "the end".

Coupon Codes

In marketing, coupon codes can be used for a financial discount or rebate when purchasing a product from an internet retailer. Coupon codes are also referred to as "promotional codes," "promotion codes," "discount codes," "key codes," "promo codes," "shopping codes," "voucher codes" or "source codes."[1]

Gödel code

In mathematics, a Gödel code was the basis for the proof of Gödel's incompleteness theorem. Here, the idea was to map mathematical notation to a natural number (a Gödel number).

http://code.google.com


Blogger

A blog (a contraction of the term "Web log") is a Web site, usually maintained by an individual [1], with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. "Blog" can also be used as a verb, meaning to maintain or add content to a blog.

Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability for readers to leave comments in an interactive format is an important part of many blogs. Most blogs are primarily textual, although some focus on art (artlog), photographs (photoblog), sketches (sketchblog), videos (vlog), music (MP3 blog), audio (podcasting), which are part of a wider network of social media. Micro-blogging is another type of blogging, one which consists of blogs with very short posts. As of December 2007, blog search engine Technorati was tracking more than 112 million blogs.[2] With the advent of video blogging, the word blog has taken on an even looser meaning — that of any bit of media wherein the subject expresses his opinion or simply talks about something.


Contents


  • 1 Types
  • 2 House Blog
  • 3 Community and Cataloging
  • 4 Popularity
  • 5 Blurring with the Mass Media
  • 6 Blogging Consequences
    • 6.1 Defamation or Liability
    • 6.2 Employment
    • 6.3 Political Dangers
    • 6.4 Personal Safety
    • 6.5 Therapeutic Benefits
  • 7 History
    • 7.1 Origins
    • 7.2 Rise in Popularity
    • 7.3 Blogging Becomes a Political Force
    • 7.4 Blogging Becomes Mainstream

Types

There are many different types of blogs, differing not only in the type of content, but also in the way that content is delivered or written.

Personal Blogs
The personal blog, an ongoing diary or commentary by an individual, is the traditional, most common blog. Personal bloggers usually take pride in their blog posts, even if their blog is never read by anyone but them. Blogs often become more than a way to just communicate; they become a way to reflect on life or works of art. Blogging can have a sentimental quality. Few personal blogs rise to fame and the mainstream, but some personal blogs quickly garner an extensive following. A type of personal blog is referred to as "microblogging," which is extremely detailed blogging as it seeks to capture a moment in time. Sites, such as Twitter, allow bloggers to share thoughts and feelings instantaneously with friends and family and is much faster than e-mailing or writing. This form of social media lends to an online generation already too busy to keep in touch.[3]
Corporate Blogs
A blog can be private, as in most cases, or it can be for business purposes. Blogs, either used internally to enhance the communication and culture in a corporation or externally for marketing, branding or public relations purposes are called corporate blogs.
Question Blogging
is a type of blog that answers questions. Questions can be submitted in the form of a submittal form, or through email or other means such as telephone or VOIP. Qlogs can be used to display shownotes from podcasts[4] or the means of conveying information through the internet. Many question logs use syndication such as RSS as a means of conveying answers to questions.
By Media Type
A blog comprising videos is called a vlog, one comprising links is called a linklog, a site containing a portfolio of sketches is called a sketchblog or one comprising photos is called a photoblog.[5] Blogs with shorter posts and mixed media types are called tumblelogs.
A rare type of blog hosted on the Gopher Protocol is known as a Phlog.[citation needed]
By Device
Blogs can also be defined by which type of device is used to compose it. A blog written by a mobile device like a mobile phone or PDA could be called a moblog.[6] One early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site. This practice of semi-automated blogging with live video together with text was referred to as sousveillance. Such journals have been used as evidence in legal matters.[citation needed]
By Genre
Some blogs focus on a particular subject, such as political blogs, travel blogs, house blogs, fashion blogs, project blogs, education blogs, niche blogs, classical music blogs, quizzing blogs and legal blogs (often referred to as a blawgs) or dreamlogs. While not a legitimate type of blog, one used for the sole purpose of spamming is known as a Splog.

House Blog

A house blog is a Blog created with the sole intent of using it to share and chronicle a home improvement or renovation process. Only in recent years has the concept of a house blog[7] come into being and become more popularized through communities[8]. The majority of house blogs are operated by homeowners who wish to share with the online community their remodeling projects from cost and materials to how it's impacted their family. Most house blogs are not created with the intention of earning revenue although some house blogs do sell advertising or are part of ad networks. The most significant reason for the popularity of house blogs is the cost. Using services such as Blogger and Wordpress, house bloggers can quickly and easily create a blog for free. In this way, the marketer can determine the viability of the selected niche before making a large investment of time and money.

Community and Cataloging

The Blogosphere
The collective community of all blogs is known as the blogosphere. Since all blogs are on the internet by definition, they may be seen as interconnected and socially networked. Discussions "in the blogosphere" have been used by the media as a gauge of public opinion on various issues. A collection of local blogs is sometimes referred to as a bloghood.
Blog Search Engines
Several blog search engines are used to search blog contents, such as Bloglines, BlogScope, and Technorati. Technorati, which is among the most popular blog search engines, provides current information on both popular searches and tags used to categorize blog postings. Research community is working on going beyond simple keyword search, by inventing new ways to navigate through huge amounts of information present in the blogosphere, as demonstrated by projects like BlogScope.
Blogging Communities and Directories
Several online communities exist that connect people to blogs and bloggers to other bloggers, including BlogCatalog and MyBlogLog.
Blogging and Advertising
It is common for blogs to feature advertisements either to financially benefit the blogger or to promote the blogger's favorite causes. The popularity of blogs has also given rise to "fake blogs" in which a company will create a fictional blog as a marketing tool to promote a product.

Popularity

Researchers have analyzed the dynamics of how blogs become popular. There are essentially two measures of this: popularity through citations, as well as popularity through affiliation (i.e. blogroll). The basic conclusion from studies of the structure of blogs is that while it takes time for a blog to become popular through blogrolls, permalinks can boost popularity more quickly, and are perhaps more indicative of popularity and authority than blogrolls, since they denote that people are actually reading the blog's content and deem it valuable or noteworthy in specific cases.[9]

The blogdex project was launched by researchers in the MIT Media Lab to crawl the Web and gather data from thousands of blogs in order to investigate their social properties. It gathered this information for over 4 years, and autonomously tracked the most contagious information spreading in the blog community, ranking it by recency and popularity. It can therefore be considered the first instantiation of a memetracker. The project is no longer active, but a similar function is now served by tailrank.com.

Blogs are given rankings by Technorati based on the number of incoming links and Alexa Internet based on the Web hits of Alexa Toolbar users. In August 2006, Technorati found that the most linked-to blog on the internet was that of Chinese actress Xu Jinglei.[10] Chinese media Xinhua reported that this blog received more than 50 million page views, claiming it to be the most popular blog in the world.[11] Technorati rated Boing Boing to be the most-read group-written blog.[10]

Gartner forecasts that blogging will peak in 2007, leveling off when the number of writers who maintain a personal Web site reaches 100 million. Gartner analysts expect that the novelty value of the medium will wear off as most people who are interested in the phenomenon have checked it out, and new bloggers will offset the number of writers who abandon their creation out of boredom. The firm estimates that there are more than 200 million former bloggers who have ceased posting to their online diaries, creating an exponential rise in the amount of "dotsam" and "netsam" — that is to say, unwanted objects on the Web (analogous to flotsam and jetsam).

Blurring with the Mass Media

Many bloggers, particularly those engaged in participatory journalism, differentiate themselves from the mainstream media, while others are members of that media working through a different channel. Some institutions see blogging as a means of "getting around the filter" and pushing messages directly to the public. Some critics worry that bloggers respect neither copyright nor the role of the mass media in presenting society with credible news. Bloggers and other contributors to user-generated content are behind Time magazine naming their 2006 person of the year as "you".

Many mainstream journalists, meanwhile, write their own blogs — well over 300, according to CyberJournalist.net's J-blog list. The first known use of a blog on a news site was in August 1998, when Jonathan Dube of The Charlotte Observer published one chronicling Hurricane Bonnie.[12]

Some bloggers have moved over to other media. The following bloggers (and others) have appeared on radio and television: Duncan Black (known widely by his pseudonym, Atrios), Glenn Reynolds (Instapundit), Markos Moulitsas ZĂșniga (Daily Kos), Alex Steffen (Worldchanging) and Ana Marie Cox (Wonkette). In counterpoint, Hugh Hewitt exemplifies a mass-media personality who has moved in the other direction, adding to his reach in "old media" by being an influential blogger. Equally many established authors, for example Mitzi Szereto have started using Blogs to not only update fans on their current works but also to expand into new areas of writing.

Blogs have also had an influence on minority languages, bringing together scattered speakers and learners; this is particularly so with blogs in Gaelic languages. Minority language publishing (which may lack economic feasibility) can find its audience through inexpensive blogging.

There are many examples of bloggers who have published books based on their blogs, e.g., Salam Pax, Ellen Simonetti, Jessica Cutler, ScrappleFace. Blog-based books have been given the name blook. A prize for the best blog-based book was initiated in 2005,[13] the Lulu Blooker Prize.[14] However, success has been elusive offline, with many of these books not selling as well as their blogs. Only blogger Tucker Max cracked the New York Times Bestseller List.[15]

Blogging Consequences

The emergence of blogging has brought a range of legal liabilities and other often unforeseen consequences.

Defamation or Liability

Several cases have been brought before the national courts against bloggers concerning issues of defamation or liability. The courts have returned with mixed verdicts. Internet Service Providers (ISPs), in general, are immune from liability for information that originates with third parties (U.S. Communications Decency Act and the EU Directive 2000/31/EC).

In John Doe v. Patrick Cahill, the Delaware Supreme Court held that stringent standards had to be met to unmask anonymous bloggers, and also took the unusual step of dismissing the libel case itself (as unfounded under American libel law) rather than referring it back to the trial court for reconsideration. In a bizarre twist, the Cahills were able to obtain the identity of John Doe, who turned out to be the person they suspected: the town's mayor, Councilman Cahill's political rival. The Cahills amended their original complaint, and the mayor settled the case rather than going to trial.[16]

In January 2007, two prominent Malaysian political bloggers, Jeff Ooi and Ahiruddin Attan were sued by pro-government newspaper, The New Straits Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin bin Aun and Brenden John a/l John Pereira over an alleged defamation. The plaintiff was supported by the Malaysian government.[17] Following the suit, the Malaysian government proposed to "register" all bloggers in Malaysia in order to better control parties against their interest. [18] This is the first such legal case against bloggers in the country.

In the United Kingdom, a college lecturer contributed to a blog in which she referred to a politician (who had also expressed his views in the same blog) using various uncomplimentary names, including referring to him as a "Nazi". The politician found out the real name of the lecturer (she wrote under a pseudonym) via the ISP and successfully sued her for £10,000 in damages and £7,200 costs.[19]

In the United States, blogger Aaron Wall was sued by Traffic Power for defamation and publication of trade secrets in 2005.[20] According to Wired Magazine, Traffic Power had been "banned from Google for allegedly rigging search engine results."[21] Wall and other "white hat" search engine optimization consultants had exposed Traffic Power in what they claim was an effort to protect the public. The case was watched by many bloggers because it addressed the murky legal question of who's liable for comments posted on blogs.[22] The case was dismissed for lack of personal jurisdiction, and Traffic Power failed to appeal within the allowed time.[23][24][25][26]

Employment

In general, attempts at hiding the blogger's name and/or the place of employment in anonymity have proved ineffective at protecting the blogger.[27] Employees who blog about elements of their place of employment raise the issue of employee branding, since their activities can begin to affect the brand recognition of their employer.

In fall 2004, Ellen Simonetti was fired for what was deemed by her employer to be inappropriate material on her blog.  She subsequently wrote a book based on her blog.
In fall 2004, Ellen Simonetti was fired for what was deemed by her employer to be inappropriate material on her blog. She subsequently wrote a book based on her blog.

Ellen Simonetti, a Delta Air Lines flight attendant, was fired by the airline for photos of herself in uniform on an airplane and comments posted on her blog "Queen of Sky: Diary of a Flight Attendant" which her employer deemed inappropriate.[28][29] This case highlighted the issue of personal blogging and freedom of expression vs. employer rights and responsibilities, and so it received wide media attention. Simonetti took legal action against the airline for "wrongful termination, defamation of character and lost future wages".[30] The suit is postponed while Delta is in bankruptcy proceedings (court docket).

In the spring of 2006, Erik Ringmar, a tenured senior lecturer at the London School of Economics, was ordered by the convenor of his department to "take down and destroy" his blog in which he discussed the quality of education at the school.[31]

Mark Cuban, owner of the Dallas Mavericks, was fined during the 2006 NBA playoffs for criticizing NBA officials on the court and in his blog.[32]

Mark Jen was terminated in 2005 after a mere 10 days of employment at Google for discussing corporate secrets on his personal blog.[33]

In India, blogger Gaurav Sabnis resigned from IBM after his posts exposing the false claims of a management school, IIPM, led to management of IIPM threatening to burn their IBM laptops as a sign of protest against him.[34]

Jessica Cutler, aka "The Washingtonienne", blogged about her sex life while employed as a congressional assistant. After the blog was discovered and she was fired,[35] she wrote a novel based on her experiences and blog: The Washingtonienne: A Novel. Cutler is presently being sued by one of her former lovers in a case that could establish the extent to which bloggers are obligated to protect the privacy of their real life associates.[36]

Catherine Sanderson, a.k.a. Petite Anglaise, lost her job in Paris at a British accountancy firm because of blogging.[37] Although given in the blog in a fairly anonymous manner, some of the descriptions of the firm and some of its people were less than flattering. Sanderson later won a compensation claim case against the British firm, however.[38]

On the other hand, Penelope Trunk, writing in the Globe in 2006, was one of the first to point out that a large portion of bloggers are professionals and that a well-written blog can actually help attract employers.

Political Dangers

Blogging can sometimes have unforeseen consequences in politically-sensitive areas. Blogs are much harder to control than broadcast or even print media. As a result, totalitarian and authoritarian regimes often seek to suppress blogs and/or to punish those who maintain them.

In Singapore, two ethnic Chinese were imprisoned under the country’s anti-sedition law for posting anti-Muslim remarks in their blogs.[39]

Egyptian blogger Kareem Amer was charged with insulting the Egyptian president Hosni Mubarak and an Islamic institution through his online blog. It is the first time in the history of Egypt that a blogger was prosecuted. After a brief trial session that took place in Alexandria, the blogger was found guilty and sentenced to prison terms of three years for insulting Islam and inciting sedition, and one year for insulting Mubarak.[40]

Egyptian blogger Abdel Monem Mahmoud was arrested in April 2007 for anti-government writings in his blog. Monem is a member of the banned Muslim Brotherhood.

After expressing opinions in his personal blog about the state of the Sudanese armed forces, Jan Pronk, United Nations Special Representative for the Sudan, was given three days notice to leave Sudan. The Sudanese army had demanded his deportation.[41][42][43]

Personal Safety

One unfortunate consequence of blogging is the possibility of attacks or threats against the blogger, sometimes without apparent reason. Kathy Sierra, author of the innocuous blog Creating Passionate Users, was the target of such vicious threats and misogynistic insults that she canceled her keynote speech at a technology conference in San Diego, fearing for her safety.[44] While a blogger's anonymity is often tenuous, Internet trolls who would attack a blogger with threats or insults can be emboldened by anonymity. Sierra and supporters initiated an online discussion aimed at countering abusive online behavior[45] and developed a blogger's code of conduct.

Therapeutic Benefits

Scientists have long known the therapeutic benefits of writing about personal experiences. Blogs provide another convenient avenue for writing about personal experiences. Research shows that it improves memory and sleep, boosts immune cell activity and reduces viral load in AIDS patients and even speeds healing after surgery.[46]

History

The term "weblog" was coined by Jorn Barger[47] on 17 December 1997. The short form, "blog," was coined by Peter Merholz, who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in April or May of 1999.[48][49][50] Shortly thereafter, Evan Williams at Pyra Labs used "blog" as both a noun and verb ("to blog," meaning "to edit one's weblog or to post to one's weblog") and devised the term "blogger" in connection with Pyra Labs' Blogger product, leading to the popularization of the terms.[51]

Origins

Before blogging became popular, digital communities took many forms, including Usenet, commercial online services such as GEnie, BiX and the early CompuServe, e-mail lists[52] and Bulletin Board Systems (BBS). In the 1990s, Internet forum software, such as WebEx, created running conversations with "threads." Threads are topical connections between messages on a metaphorical "corkboard."

The modern blog evolved from the online diary, where people would keep a running account of their personal lives. Most such writers called themselves diarists, journalists, or journalers. Justin Hall, who began personal blogging in 1994 while a student at Swarthmore College, is generally recognized as one of the earliest bloggers,[53] as is Jerry Pournelle.[citation needed] Dave Winer's Scripting News is also credited with being one of the oldest and longest running weblogs.[54][55]

Early blogs were simply manually-updated components of common Web sites. However, the evolution of tools to facilitate the production and maintenance of Web articles posted in reverse chronological order made the publishing process feasible to a much larger, less technical, population. Ultimately, this resulted in the distinct class of online publishing that produces blogs we recognize today. For instance, the use of some sort of browser-based software is now a typical aspect of "blogging". Blogs can be hosted by dedicated blog hosting services, or they can be run using blog software, such as WordPress, Movable Type, Blogger or LiveJournal, or on regular web hosting services.

Rise in Popularity

After a slow start, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near-simultaneous arrival of the first hosted blog tools:

  • Open Diary launched in October 1998, soon growing to thousands of online diaries. Open Diary innovated the reader comment, becoming the first blog community where readers could add comments to other writers' blog entries.
  • Brad Fitzpatrick, a well-known blogger started LiveJournal in March 1999.
  • Andrew Smales created Pitas.com in July 1999 as an easier alternative to maintaining a "news page" on a Web site, followed by Diaryland in September 1999, focusing more on a personal diary community.[56]
  • Evan Williams and Meg Hourihan (Pyra Labs) launched blogger.com in August 1999 (purchased by Google in February 2003)

Blogging Becomes a Political Force

See also: Political blog

Since 2002, blogs have gained increasing notice and coverage for their role in breaking, shaping, and spinning news stories. The Iraq war saw bloggers taking measured and passionate points of view that go beyond the traditional left-right divide of the political spectrum.

On 6 December 2002, Josh Marshall's talkingpointsmemo.com blog called attention to U.S. Senator Lott's comments regarding Senator Thurmond.  Senator Lott was eventually to resign over the matter.
On 6 December 2002, Josh Marshall's talkingpointsmemo.com blog called attention to U.S. Senator Lott's comments regarding Senator Thurmond. Senator Lott was eventually to resign over the matter.

As an example of the rise of importance of blogs, in 2002, many blogs focused on comments by U.S. Senate Majority Leader Trent Lott. Senator Lott, at a party honoring U.S. Senator Strom Thurmond, praised Senator Thurmond by suggesting that the United States would have been better off had Thurmond been elected president. Lott's critics saw these comments as a tacit approval of racial segregation, a policy advocated by Thurmond's 1948 presidential campaign. This view was reinforced by documents and recorded interviews dug up by bloggers. (See Josh Marshall's Talking Points Memo.) Though Lott's comments were made at a public event attended by the media, no major media organizations reported on his controversial comments until after blogs broke the story. Blogging helped to create a political crisis that forced Lott to step down as majority leader.

Similarly, blogs were among the driving forces behind the "Rathergate" scandal. To wit: (television journalist) Dan Rather presented documents (on the CBS show 60 Minutes) that conflicted with accepted accounts of President Bush's military service record. Bloggers declared the documents to be forgeries and presented evidence and arguments in support of that view. Consequently, CBS apologized for what it said were inadequate reporting techniques (see Little Green Footballs). Many bloggers view this scandal as the advent of blogs' acceptance by the mass media, both as a news source and opinion and as means of applying political pressure.

The impact of these stories gave greater credibility to blogs as a medium of news dissemination. Though often seen as partisan gossips, bloggers sometimes lead the way in bringing key information to public light, with mainstream media having to follow their lead. More often, however, news blogs tend to react to material already published by the mainstream media. Meanwhile, an increasing number of experts blogged, making blogs a source of in-depth analysis. (See Daniel Drezner and J. Bradford DeLong.)

Blogging Becomes Mainstream

By 2004, the role of blogs became increasingly mainstream, as political consultants, news services, and candidates began using them as tools for outreach and opinion forming. Blogging was established by politicians and political candidates to express opinions on war and other issues and cemented blogs' role as a news source. (See Howard Dean and Wesley Clark.) Even politicians not actively campaigning, such as the UK's Labour Party's MP Tom Watson, began to blog to bond with constituents.

In January 2005, Fortune magazine listed eight bloggers that business people "could not ignore": Peter Rojas, Xeni Jardin, Ben Trott, Mena Trott, Jonathan Schwartz, Jason Goldman, Robert Scoble, and Jason Calacanis.

Your Ad Here