13 Features That Make Web Browser Unique


Given the pace of browser updates these days, don't be surprised to find the best of the bunch being copied by competitors soon. After all, yesterday's browser bells and whistles are today's must-have features. Grab quickly.


  • Chrome: SPDY

When the HTTP protocol was designed, Web pages consisted of text and a few images. Today's Web pages come packed with dozens of style sheets, JavaScript files, and an untold number of images. HTTP forces browsers to request each item individually, adding to the overhead.

Enter SPDY, an entirely new protocol Google has created to fight this sluggishness. Not many websites speak SPDY yet, but Google claims those that do can deliver their information about twice as quickly. Chrome is the only browser currently working with SPDY-enabled websites, many of which happen to sit in Google server farms.


  • Firefox: Deep extensions

All of the major browsers have plug-in architectures, but only Firefox offers a deep, sophisticated API. While other browsers allow you to write plug-ins in JavaScript, CSS, and HTML, essentially creating a Web page that wraps around the Web page, Firefox goes one level deeper, giving you access to an API that allows you to build full desktop applications out of browser parts. This is largely an accident of history because Firefox was one of the first with extensions, and the other browsers that came along afterward decided the world didn't need these extra features.


FireFTP, for instance, is one of the deeper extensions that's hard to spin up from the classic three languages: HTML, CSS, and JavaScript. It takes advantage of the access to the file system and the low-level access to the TCP/IP stack. Some people may feel the thinner APIs from the other browsers act like a better sandbox and thus offer more security -- and they're right. But many of the most sophisticated extensions for Firefox require the flexibility of dipping into native code and interfacing directly with the operating system.


  • Internet Explorer 9: Emphasis on energy efficiency

Everyone may be talking about JavaScript compilation engines and hardware integration, but the idea of measuring browser energy consumption is a new one. Here, Microsoft is leading the way, claiming that IE9 is the most energy-efficient browser.

Of course, there's no easy way to test this assertion, even with an electrical meter because the computer could be burning electricity on some background task. However, the idea is meaningful, in large part because handheld devices need to be very careful with power consumption. While no one really notices if their video card on the game machine requires a separate pipeline from the Middle East to keep it running, everyone squawks when the phone dies halfway through the afternoon.

IE9 does not yet run on phones, but it may affect laptop energy conservation. Furthermore, simply paying attention to browser energy consumption may put Microsoft ahead of what could soon become a very important game.


  • Chrome: A separate process for each tab

For the past few years, interest in multiprocess architectures has been growing among browser developers. Here, Google has taken the lead, splitting the work of Chrome tabs into different processes. This approach relies on the operating system to isolate crashes, thereby making the browser more stable. In other words, if one plug-in or Web page goes south, the OS isolates the danger, usually ensuring that the other tabs sail on unaware.

Of course, all browser makers are rolling out multiprocess technology in different ways and at different speeds. Open your PC's process display window and start cracking apart the tabs -- you'll see that the browsers spawn a few processes, but only Google Chrome keeps opening them up. Chrome is the browser most committed to separating the workload and letting the operating system act as a referee.

Some argue that this belts-and-suspenders approach is overkill and not worth the overhead, claiming that the browser makers should not fall back on the operating system for support. Others suggest the browser experience can end up being slower if related windows are split into different processes. To combat this, Chrome sometimes puts pages from the same domain in the same process, but you can expect arguments over the best way to handle multiprocessing to continue for the foreseeable future.


  • Internet Explorer 9: Jump lists and site pinning

Jump lists began as little menus attached to icons in Windows 7. Right-click an application's icon and you'll find shortcuts to app-specific tasks and recently accessed files as determined by the app's developer. Now these jump lists are part of IE9, and every Web designer can specify a quick list of important pages for users to access quickly with a right-click. IE9 takes the jump-list concept one step further by allowing you to "pin" websites to the bar at the top of each window where they can be easier to reach. The jump list adds a pull-down menu for these pinned websites. It's a good solution for common destinations, like email or shopping sites.



  • Opera 11: querySelectorAll caching

As JavaScript programmers know, manipulating information on a Web page can quickly become resource-intensive, with most of this activity including calls to the function querySelectorAll to change an item's color or to update the data in a section on a page.

Opera 11 includes a superfast version of this function that depends upon a cache for some of its speed, thereby increasing the velocity of all of the visual activity on your Web page.


  • Songbird: Purpose-built packaging

It's tempting to not classify Songbird as a browser because it's more focused on music than Web pages. However, it does suck down information from the Web, and for that reason, we'll include it.

More of a Web-enabled tool for organizing MP3s, Songbird illustrates how we don't need to package everything as a Web page. The tool tracks local concerts and lets you know about upcoming gigs when you listen to a song. There's no need to go to a separate page to get this information.

The feature set seems to expand as more and more companies offer plug-ins that integrate their services with Songbird. The plug-in architecture offers a nice foundation for growth.


  • Opera 11: Email

There was a time when Mozilla combined the email program with the browser, but it stopped this integration long ago. That era is back again, this time on Opera.

Opera 11 offers its users the ability to monitor email while browsing. The client stores email on your hard disk, giving you offline access to your messages, and will suck down mail from multiple accounts and sort them in one list. The feature is part of Opera's push beyond the browser to become a "complete communication tool."


  • Firefox 4: Sync

Was it only a few years ago that a cellphone was primarily a phone? Now everyone is wondering when they'll replace desktops and laptops. Firefox is ready for that day by offering cross-browser sync. The Android version of Firefox on your phone can suck down all of the bookmarks, history, passwords, and even open tabs. Then when you're back at your desk, you can push back the changes you've made while you're typing on your phone. The other browsers offer syncing in only one direction.


  • Opera Turbo: Proxy caching

Before the Internet, there was a collection of nets, like Compuserve, Minitel, MSN, and AOL. Then the "Inter" prefix was added by linking these nets altogether, and everyone was given the freedom to request information from any computer out there.

Opera Turbo is sort of a return to the "net era" without any of the compromises. Your browser talks to Opera's collection of servers, which are tuned to deliver the data faster and in a form customized for Opera. This isn't a true return to past architectures because Opera's servers are merely proxies that fetch data from the Web. They don't host original content; they just rebundle what's available.


  • Safari 5: Easy user agent alterations

Every page request includes the name of the browser, which in this context is called the "user agent." If you want to pretend you're using a different browser, all you need to do is change this string. This can be particularly helpful when testing mobile software that must appear differently on the small screen of a smartphone.

The user agent string can always be changed by digging deep into the files on your desktop. Chrome lets you change it with a command-line parameter. Safari, however, simplified alteration of your user agent by providing a submenu that offers a wide range of user agent strings, including those for the various iPads and iPhones. In the process, Safari transforms into the ideal platform for testing iPhone- or iPad-tuned websites or for anyone who likes the simplicity of a mobile Web page in a desktop environment.



  • Flock: Social browsing

Flock is technically a separate browser with an emphasis on Facebook, Twitter, and other social functions on the Web. Or at least it was -- as I was writing this, the company stopped supporting the tool. You're free to continue using Flock, but the company decided it would rather work with Zynga on building games.

The idea of Flock was to encourage users to share what they consume on the Web and watch what others are doing. Some may dispute the claim that Flock qualifies as a separate browser because its core is Chrome, but its purpose-built nature offers unique functionality.

There are rumors that Firefox 5 will inherit some of these social features. RockMelt is distributing a similar social browser that works on both the desktop and the iOS platform. The space won't stay empty for long.


  • Chrome: "Hands-free transparency"

Being unique is not always a sign of leadership. Google's Chrome, for instance, is the last of the big browsers to resist the "do not track" framework that asks websites to avoid tracking users. Google says it is following the development and may choose to implement it in some form in the future. Cynics will note that Google, more than any other browser maker, has a stake in tracking users on the Web because its business model depends on crunching this information to serve up relevant advertisements.

Think of Google's foot dragging on this effort as a form of anti-shyness. It's like your friend telling you to quit moping around, go to the party, open up, and share a bit about yourself. From this perspective -- namely, Google's -- it's easy to see eschewing the "do not track" framework as a kind of feature offering on Chrome's part, not a limitation.




Read More

ConVert Your iPad into a PowerPoint Presenter



If you're in the business of making presentations, you know what a time-suck it can be to work with PowerPoint on a laptop. You have to connect a projector, wait an eternity for the PC to boot, run PowerPoint, load your slide deck, switch the laptop's video output to projector mode, and on and on. It's easy to blow 10-20 minutes just getting set up for your presentation--not a productive use of your time.

Enter SlideShark, an iPad app for viewing PowerPoint presentations. Actually, it's both an app and a service, and it's free--for a starter account, anyway.



After signing up and installing the iPad app, you simply upload your slide decks (SlideShark supports both PPT and PPTX files), then wait a few minutes while the service optimizes them for iPad viewing. Then you fire up the app and choose the presentations you want to download. I think it's smart that SlideShark stores the presentations on your iPad so you can run them offline (i.e. no Internet connection required).



Next up: present! You can, of course, view slideshows right on the iPad, tapping or swiping to move from one slide to the next, but you also have the option of connecting the iPad to a TV or projector. (For that you'll need Apple's VGA Adapter, a $29 accessory.)


There are a few limitations. For starters, SlideShark doesn't support hyperlinks, embedded videos, slide transitions, and other fancy effects. In other words, you're stuck with fairly static slides (which is not necessarily a bad thing). The app does promise to preserve all fonts, images, and colors, plus some animations.


How it Works:

  • UPLOAD

From your computer, upload a PowerPoint (.ppt or .pptx) file to your free, secure online account.

  • CONVERT

We’ll automatically convert the slides into our iPad-optimized viewing format.

  • VIEW

Use the SlideShark App to download and view the presentation on your iPad.

IMPORTANT: Remember to sign up for your free SlideShark account at www.SlideShark.com or from the login page of the app after you’ve installed it.


In my tests, SlideShark did a great job converting most of my presentations. However, with one that had a custom, wider-than-usual page layout, the converter failed to maintain the aspect ratio, leading to a squished-looking set of slides with jumbled, overlapping text. Your mileage may vary, but be sure to spot-check any important presentations before actually, you know, presenting them.

There are, of course, countless other apps that let you show slide decks on your iPad. But SlideShark has the benefits of being free and easy to use. Definitely worth a try if you'd rather travel with a slim tablet than a bulky old laptop.

Read More

Nokia Codes Which you can use any time







To check the IMEI (International Mobile Equipment Identity) 
Type-*#06#
Information you get from the IMEI-
XXXXXX  XX  XXXXXX  X
    TAC      FAC     SNR      SP

TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP    = Spare
To check the phones Software revision type-
*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
1ST Line  = Software revision
2ND Line = The date of the software release
3RD Line = Phone type
To enter the service menu type-
*#92702689# (*#WAR0ANTY#)
Serial number (IMEI)
Production date (MM/YY)
Purchase date (MM/YY) You can only enter the date once.
Date of last repair (0000=No repair)
Transfer user data to another Nokia phone via Infra-Red
Clock Stopping

To check weather your SIM Card supports clock stopping type-
*#746025625# (*#SIM0CLOCK#)

Revealing the Headphone and Car-Kit menus
Please note that if you do these next tricks, the new menus can't be erased without retoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.


  • To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
  • To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.


THE REBOOT TRICK
This should work on all software versions of the 6110.
1. Go to the Calendar (Menu-8)
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.

Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.

EFR CALL QUALITY
To activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#

THE JAMES BOND TRICK
If you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.

NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64).
Read out the data with an EEPROM programmer and save it to a file (Backup).
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
If you have v5.24 then change the address "0378" from "00" to "FF".
Write the new data to the EEPROM and solder it back to the phone,
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.

Carrier number
MS RX Level in DBM
Received signal quality
MS TX power level
C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99.
RTL (Radio link timeout).
Timeslot
Indication of the transmitter status
Information on the Network parameters.
TMSI (Temporary Mobile Subscriber Identity).
Cell identification (Cell ID, Number of cells being used).
MCC (Mobile country code)
MCN (Mobile network code)
LAC (Location area code)
Ciphering (On/Off)
Hopping (On/Off)
DTX (On/Off)
Discard cell barred information

CHECK SIM-LOCK
Note - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (we havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Aslo don't try entering the wrong number, because after 3 times it will block the phone for good.

There are 4 different locks on your Nokia phone.
COUNTRY-LOCK
NETWORK-LOCK
PROVIDER-LOCK
SIMCARD-LOCK
The code to read out the sim-lock status of your phone is

#PW+(MASTERCODE)+(Y)#
# = DOUBLE-CROSS
W = PRESS "*" THREE TIMES
P = PRESS "*" FOUR TIMES
+ = PRESS "*" TWO TIMES
MASTERCODE = 1234567890
Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.

SIM-LOCK CHECKS
#PW+1234567890+1# = GIVES PROVIDER-LOCK STATUS
#PW+1234567890+2# = GIVES NETWORK-LOCK STATUS
#PW+1234567890+3# = GIVES COUNTRY-LOCK STATUS
#PW+1234567890+4# = GIVES SIM-CARD-LOCK STATUS.
Read More

Make Spam Free Google Search Result Using Chrome Extension


Google and other search engines are working hard to make their search results page spam free. Now a days there are so many content farm sites which hosts duplicate or copied contents. Actually these contents are not helpful for normal users. The final goal of a search engine to list useful sites to user for a searched keyword. In that effort, Google has launched a Chrome extension named “Personal Blocklist” to block or remove spam or content farm like domains and sites from search result page.
Once you will install this Chrome extension on your Google Chrome browser, a new link will start appearing just below the each search result appearing on Google SERP. 
If you find that particular website is appearing for your normal keywords and is not having useful information but is a spam site, you can click on the link saying “Block site name / domain “. Then onwards, that particular link will not appear on search results performed by you on Chrome installed on that computer.


You can check the list of domains blocked by you using this extension by just clicking on the “Personal Blocklist” extension icon appearing near to the address bar. You can unblock any specific domain from that list as well.


This extension is released in an effort to make Google more useful and spam free. If a particular website or domain will be reported by multiple users for content farming or for spamming, Google team will manually verify that and may take action on that domain by not showing that in regular search results as well. That means, they will remove that domain from index.
As search engines are becoming smarter everyday to make our life much easier and this is a welcome initiative from search engine market leader. What do you think about this new extension by Google?
Do you face the content farm or spam site issue in your daily search on Google or other search engines?
 Share your thoughts through comments section.
Read More

How to clean your computer

I have a dirty secret. I've never cleaned my computer. Sure, I've dusted my monitor, but I haven't taken off the cover or tried to reach the crumbs lurking inside my keyboard. And I honestly don't know the difference between pressurized air dusters and compressed air cleaners. 

"Your computer could fry if you don't keep it clean," says Jonathon Millman, chief technology officer for Hooplah Interactive.
Whether it's a desktop or laptop/notebook computer, dust and lint can clog the cooling vents. This can cause your computer's brain—the central processing unit (CPU)—to heat up. And heat is the biggest cause of component failure in computers. Regular cleaning could save you costly maintenance fees down the road.
Follow the five simple steps in the cleanup and maintenance routine below to keep your computer and accessories looking shiny and new. It's an easy, do-it-yourself solution to help them run smoothly and last longer.
Not what you were looking for?
Are you trying to clean up your computer in the antivirus software sense? This guide on the Microsoft Security website provides instructions, a free safety scan, and a malicious software removal tool you can download. Or, if you're trying to find tips on cleaning out system clutter and unwanted files to make your programs run faster, you may find these articles helpful: Speed up your PC: Automate your computer maintenance schedule, Optimize your computer for peak performance, and How to delete programs you no longer need.
________________________________________
Preparation
You'll need:

•    Standard (flat-tip) and/or Phillips screwdriver
•    Can of compressed air (available from computer dealers or office-supply stores)
•    Cotton swabs (do not use a cotton ball)
•    Rubbing alcohol
•    Soft, lint-free cloths, paper towels, or anti-static cloths
•    Water
•    Safety glasses (optional)
Important: Always turn your computer off and disconnect it from the power source before you begin any of these steps.
________________________________________
Step 1: Inside the case
If you see dust or other debris accumulating around the vents of your desktop or laptop, you can bet there's more inside—and it's only going to cause trouble. To remove it, you'll need to open the case. That may sound more intimidating than it really is. Before you begin, of course, make sure the computer is turned off and disconnected from the power source.
One more consideration: Manufacturers' policies vary, but, in some cases, opening your computer case may void your warranty. You may even encounter a warning sticker on the case. Review your warranty terms before continuing.
•    For desktop computers. Desktop computer manufacturers employ a variety of fastening mechanisms to secure the case. Face the back panel: Modern cases typically use two or more small knobs that you can turn by hand, or buttons that you press in, to release a side panel or the entire shell of the case. Others may require you to remove two or more slotted or Phillips screws. If in doubt, consult your owner's manual for specific instructions.
•    For laptop and notebook computers. Set the computer upside down on a table or other stable surface. (You may want to place a towel or paper under the computer to prevent scratches and scuffs.) Remove the battery. On most laptops, the vents on the underside will be grouped on a removable panel, secured to the case with several screws. Typically, these are very small Phillips-type screws, which may be of different lengths. Remove them, and be sure to keep track of which goes where.
After you're inside either your desktop or laptop, touch as little as possible inside the computer—keep your fingers away from cards and cords. Look for any dust bunnies or other bits of fluff in the nooks and crannies. Pick these out carefully with tweezers or a cotton swab. Blow compressed air around all of the components and along the bottom of the case, keeping the nozzle at least four inches away from the machine. Blow air into the power supply box and into the fan.
Try to aim the stream of pressurized air in such a way that it blows debris out of and away from crevices and recesses, rather than driving it deeper in. Safety glasses are a good idea, too, to keep the flying dust out of your eyes.
Take particular care when blowing the delicate fans. Overspinning them with excessive pressure can crack a blade or damage the bearings. Position the compressed air can well away, and use short bursts of air rather than a steady blast. As a precaution, you might also carefully immobilize the fan blades with your fingertip or a cotton swab while using the air can.
Lastly, blow air into the floppy disk, CD or DVD drives, and I/O ports—but again, not too aggressively. Wipe the inside of the cover with a lightly moistened cloth, and dry it before replacing it.
Millman recommends doing this every three months if your case sits on the floor, if you have pets that shed, or if you smoke. Otherwise, every six to eight months is fine.
________________________________________
Step 2: Outside the case

Run a cotton swab dipped in rubbing alcohol around all of the openings on the outside of your case. Give them one swipe with the damp end of the swab and one swipe with the dry end. Do this as often as you clean the inside of your computer.
________________________________________
Step 3: Keyboard
Turn the keyboard upside down and gently shake it. Most of the crumbs and dust will fall out. Take a can of compressed air and blow into and around the keys. Next, take a cotton swab and dip it in rubbing alcohol. It should be damp, but not dripping wet. Run the cotton swab around the outside of each key. Rub the tops of the keys. Don't be stingy with the swabs. Discard them when they start to get dirty, and switch to a fresh one. If you have a laptop, follow the same procedure but take extra care with your machine—treat it as gently as you would a carton of fresh eggs. If your laptop has a touchpad, use the damp swap to wipe it clean, as well. Do this keyboard cleanup monthly.
It's tempting to use a vacuum cleaner to suck the debris out of the keyboard and other parts of the computer, but technicians warn that it can create a static electrical charge that can actually damage the computer's sensitive electronics.
Worried about spills?
If a spill happens, immediately turn off your computer, disconnect the keyboard, and flip it over. While the keyboard is upside down, blot the keys with a paper towel, blow compressed air between the keys, and leave it to air dry overnight. Check to ensure that all traces of moisture have evaporated before using the keyboard again. Laptop spills need more attention because liquid can easily penetrate the keyboard and damage internal parts. For laptop spills, immediately turn off the computer and remove any external power source and other items plugged into it. Turn the laptop over, remove the battery, and then bring it to your nearest repair center to check for internal damage. Simply blowing compressed air into the keyboard and letting your computer air dry upside down overnight aren't enough, because liquids can sit inside a laptop for days.
For all spills, be aware that anything other than plain water may cause severe damage, and never attempt to dry a keyboard or laptop in a microwave or conventional oven.
________________________________________
Step 4: Mouse
Disconnect the mouse from your computer. Rub the top and bottom of your mouse with a paper towel dipped in rubbing alcohol. Scrape hard-to-remove grime with your fingernail. If you have an optical mouse, ensure that no lint or other debris obscures the light-emitting lens on the underside of the mouse.
If you use a mechanical mouse, open the underside of the mouse and remove the ball. (In most cases, you simply need to rotate the plastic ring encircling the ball one-quarter turn counterclockwise.) Wash the ball with water, and let it air dry. To clean inside a mechanical mouse, dip a cotton swab in rubbing alcohol and rub all of the interior components, paying particular attention to the little rollers, where gunk tends to collect. Finally, blow compressed air into the opening and ensure that the interior is dry. Replace the ball and the cover.
Clean your mouse monthly.
________________________________________
Step 5: Monitor
For liquid-crystal display (LCD) laptop and flat-panel monitor screens, slightly moisten a soft, lint-free cloth with plain water. Microfiber cloths are excellent for this purpose. Avoid using paper towels, which can scratch monitor surfaces. Don't spray liquid directly onto the screen—spray the cloth instead. Wipe the screen gently to remove dust and fingerprints. You can also buy monitor cleaning products at computer-supply stores.
For glass CRT (television-style) monitors, use an ordinary household glass cleaning solution. Unless your manufacturer recommends differently, don't use alcohol or ammonia-based cleaners on your monitor, as these can damage anti-glare coatings. And never try to open the housing of a CRT monitor. Capacitors within can hold a dangerous electrical charge—even after the monitor has been unplugged.
Clean the monitor weekly. Finally, make sure that everything is dry before you plug your computer back in.

Read More

Slow PC? Optimize your computer for peak performance

The following tips can help improve your computer's performance and help make your computer run faster. The examples in this article are for Windows 7, Windows Vista, and Windows XP. However, these procedures work for all versions of the Windows operating system, with some slight variations from version to version.
 
These tasks use utilities provided within Windows, so you can run them—free of charge and as often as you’d like—to help you achieve the best system performance and to help improve computer speed.
Note: This article does not address or recommend tinkering with the registry files. Such activities can be detrimental to your computer and should only be attempted by properly trained professionals.
 
Clean up disk errors
 

Run once a week

Whenever a program crashes or you experience a power outage, your computer may create errors on its hard disk (sometimes referred to as a hard drive). Over time, the errors can result in a slow PC. Fortunately, the Windows operating system includes several PC tools, including a Check Disk program, to identify and clean any errors on your computer and to help keep it running smoothly.
Note: You must be logged on as an administrator to perform these steps. If you aren't logged on as an administrator, you can only change settings that apply to your user account.
Run Check Disk:

Windows 7 and Windows Vista users

Windows XP users


________________________________________ 
Remove temporary files
 

Run once a week

Your computer can pick up and store temporary files when you're looking at webpages and even when you're working on files in programs, such as Microsoft Word. Over time, these files slow your computer's performance. You can use the Windows Disk Cleanup tool to rid your computer of these unneeded files and to help your PC run faster.
Run Disk Cleanup:

Windows 7 users

Windows Vista users

Windows XP users


________________________________________
Optimize your data
 

Run once a week

As you add programs and files to your computer, it often breaks files side by side to increase the speed of access and retrieval. However, as files are updated, your computer saves these updates on the largest space available on the hard drive, often found far away from the other adjacent sectors of the file.
The result is a fragmented file. Fragmented files cause slower performance because your computer must now search for all of the file's parts. In other words, your computer knows where all the pieces are, but putting them back together in the correct order—when you need them—can slow your computer down.
Windows includes a Disk Defragmenter program to piece all your files back together again and to make them available to open more quickly.
Note: Windows 7 and Windows Vista are preconfigured to run Disk Defragmenter on a weekly basis. If you would like to run the tool manually or to adjust the schedule, click the section for your specific operating system.
Run Disk Defragmenter:

Windows 7 users

Windows Vista users

Windows XP users


________________________________________
Make Internet Explorer run faster

The Internet is everywhere—from the home to office to the classroom. We use it to communicate, to work, to play—and even occasionally to waste time.
Yet there's nothing more frustrating than having this technical marvel at our fingertips 24 hours a day, 7 days a week, only to wait while our computers access it at a crawling pace. Thankfully, Windows Internet Explorer provides some useful options for quicker web surfing.
 
Reduce the size of your webpage history

Internet Explorer stores visited webpages to your computer, organizing them within a page history by day. Although it's useful to keep a couple days of web history within your computer, there's no need to store more than a week's worth. Any more than that and the collected webpages can slow down your computer's performance.
Note: Depending on which version of Internet Explorer you're using, the steps outlined and images shown may vary slightly.

Reduce your webpage history

Don't save encrypted webpages

Encrypted webpages ask for user names and passwords. These pages scramble information to prevent the reading of sensitive information. You can configure Internet Explorer to not save these types of pages. You'll free up space by saving fewer files to your computer, in addition to keeping secure information off of your computer.

Change setting to not save encrypted webpages

If Internet Explorer is not as quick as you'd like it to be, check out the article Is Internet Explorer slow? 5 things to try for a few more tips specific to your browser.
________________________________________
Automate Windows Update
 

Configure once

Microsoft works constantly to release updates to Windows and other Microsoft products, including Microsoft Office. With Windows Update, you can find and install all these updates—not just the critical ones. Often, the updates can improve your computer's performance.
You can make life easier by automating Windows Update so that your computer downloads and installs all the updates without you having to worry about them.
Automate Windows Update:

Windows 7 users

Windows Vista users

Windows XP users


________________________________________
Remove spyware, and help protect your computer from viruses
 
Download once, and get automatic updates

While you're busy surfing the web, spyware and other types of malicious software (also known as malware) are collecting personal information about you, often without your knowledge. The result is that your personal information could possibly be compromised. At the same time, spyware and malware can slow down your computer. Download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malware. Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system running efficiently and to help protect it from emerging threats.

Read More

Make Your Own Google Chrome extension


First a few words about extensions.
How Extensions Work
Extensions in Google Chrome are basically webpages. You have javascript files, stylesheets and images. You can even use JavaScript libraries like  jQuery.

The extensions are, however, treated a bit differently than your regular webpage, which is displayed in the browser. You can have access to all the opened tabs, to the user’s browsing history, you can manipulate all the pages that are opened, send AJAX requests to any website and much more.
You also have the benefit (or the limitation) that your extension runs only on one browser. You can forget all compatibility issues and embrace Google Chrome’s hot new HTML5 features.
Developing extensions
Extension are packed in a .crx file (arenamed zip file) but during development, you can map your working folder as an extension. This way you can quickly change and deploy code without the need of repackaging.
This is done by opening the extension page (type chrome://extensions/ in the address bar, or click Wrench icon > Extensions), and clicking Developer mode > Load unpacked extension.. on the page. After you make a change to the extension, just hit the Reload link below it.
After you’re done developing, click Pack extension.. and a crx file will be created for you. You can serve this file from your site and enable your site’s visitors to install it.
Google Chrome is by far the easiest browser to make extensions for, as you will see from the steps below.
A note about debugging: To debug your extension, right-click on your extension’s icon, next to the address bar, and choose Inspect popup. You can also check out this tutorial.
Step 1 – Manifest.json
The first step in creating an extension, is mapping a folder on your hard drive as an extension (as explained the above). You are going to put all your files in this folder.
The only thing required from your extension by Chrome, is the manifest.json file. This is a text file, which holds configuration settings in the form of a json object.
Here is the one we are going to use:
manifest.json

{
    "name": "Tutorialzine Extension",
    "version": "1.0",
    "description": "Making your first Google Chrome extension.",
    "browser_action":   {
        "default_icon": "icon.png",
        "popup": "tutorialzine.html"
    },
    "icons":{
        "128":"icon_128.png"
    }
}
In this file we are specifying the name of the extension and a number of other options, such as browser actions and permissions.
In browser_actions, we put settings that are in relation with the browser window. The popup property tells Chrome, that we are going to show tutorialzine.html as a popup. There are a number of settings you can put in browser_actions. You can read more on Google Chrome’s Extension documentation.
For this extension we do not need access to currently opened pages, nor manipulating tabs and windows. If we needed those, however, we would need to include a permissions property, with the addresses of the pages.
For more information about the manifest file, refer to Google Chrome’s documentation.
Step 2 – HTML 5
As mentioned above, we told Chrome that tutorialzine.html is going to be opened as a popup. This is a regular html file, complete with stylesheets and js files.
And as Google Chrome has a really good support for HTML5, we can code tutorialzine.html in it. You could, however, use any HTML version you normally code your sites with.
tutorialzine.html
<!DOCTYPE html> <!-- The new doctype -->
<html>
<head> <!-- No title and meta tags are necessary for the extension -->
<link rel="stylesheet" type="text/css" href="style.css" />
<script src="jquery.min.js"></script> <!-- Including jQuery -->
<script src="script.js"></script> <!-- Our script file -->
</head>
<body>
<h1>Latest Tutorials on Tutorialzine By S2P Tech</h1>
<div id="content">
<!-- The latest tutorials are going to be inserted here -->
</div>
</body>
</html>
As you can see, we are addressing the css and js files directly. Chrome will include them for us. Just as if we are working on a regular webpage.
Step 3 – CSS3
As the extension is rendered Google Chrome, we do not need to limit ourselves with the least common denominator when it comes to CSS3 support. This is why we can afford to use fancy rules like -webkit-box-reflection and -webkit-gradient.
styles.css – Part 1
*{
    margin:0;
    padding:0;
}
body{
    /* Setting default text color, background and a font stack */
    font-size:12px;
    color:#666;
    /* A webkit gradient: */
    background:-webkit-gradient(linear, 0% 0%, 0% 100%, from(#EEE), to(#DDD));
    text-shadow:1px 1px 0 white;
    font-family:Arial, Helvetica, sans-serif;
    overflow-x:hidden;
}
.tutorial{
    width:500px;
    padding:10px 20px;
    margin-bottom:10px;
}
img{
    width:100px;
    height:100px;
    float:left;
    /* Webkit CSS3 Reflection */
    -webkit-box-reflect: below 0 -webkit-gradient(linear, left top, left bottom, from(transparent), color-stop(0.75, transparent), to(rgba(255, 255, 255, 0.3))) 0 0 0 0 stretch stretch;
}
-webkit-box-reflect creates a pure CSS reflection under the thumbnail images. It takes a number of parameters to generate the reflection – position of the reflection, offset from the bottom of the image, and a mask (which is defined with a gradient).
styles.css – Part 2
p,a{
    padding:10px 0 0 120px;
    display:block;
}
a,a:visited{
    color:#09F;
    text-decoration:none;
}
a:hover{
    text-decoration:underline;
}
h1{
    /* Webkit gradient: */
    background: -webkit-gradient(linear, 0% 0%, 0% 100%, from(#EEE), to(#DDD));
    border-bottom: 1px solid #F0F0F0;
    font-size: 24px;
    font-weight: normal;
    margin-bottom: 30px;
    padding: 30px 0px;
    text-align: center;
    text-shadow: white 0px 1px 1px;
}
h2{
    font-size:24px;
    font-weight:normal;
    right:40px;
    padding-left:120px;
}
h1,h2{
    font-family:"Myriad Pro",Arial,Helvetica,sans-serif;
}
In the second part of the code we are also using a gradient, but this time as a background for the h1 element.
Step 4 – jQuery
The JavaScript is executed as if it was part of a regular web page. This means that we can include the jQuery library and define a $(document).ready() function as we would normally do in a web project.
Clicking the extension icon has the same effect for the scripts on the page, as opening the page in a browser.
Inside $(document).ready(), we fetch the latest results from Tutorialzine’s RSS feed, with the help of Yahoo’s YQL API. We’ve used this API a couple of times before, here on Tz. It allows us to use an SQL-like syntax to fetch data in a JSON format.
After fetching the data, we generate the HTML markup and include it in tutorialzine.html. We also save it to localStorage as a simple caching solution. localStorage is a simple way to save persistent data (it survives between page loads). This makes the experience of using the extension a lot faster.
script.js
$(document).ready(function(){
    var query = "SELECT * FROM feed WHERE url='http://feeds.feedburner.com/Tutorialzine' LIMIT 2";
    // Storing the seconds since the epoch in now:
    var now = (new Date()).getTime()/1000;
     // If there is no cache set in localStorage, or the cache is older than 1 hour:
    if(!localStorage.cache || now - parseInt(localStorage.time) > 1*60*60)
    {
        $.get("http://query.yahooapis.com/v1/public/yql?q="+encodeURIComponent(query)+"&format=json&callback=?",function(msg){
            // msg.query.results.item is an array:
            var items = msg.query.results.item;
            var htmlString = "";
            for(var i=0;i<items.length;i++)
            {
                var tut = items[i];
                // Extracting the post ID from the permalink:
                var id = tut.guid.content.match(/(\d+)$/)[0];
                // Looping and generating the markup of the tutorials:
                htmlString += '<div class="tutorial">\
                                <img src="http://cdn.tutorialzine.com/img/posts/'+id+'.jpg" />\
                                <h2>'+tut.title+'</h2>\
                                <p>'+tut.description+'</p>\
                                <a href="'+tut.link+'" target="_blank">Read more</a>\
                                </div>';
            }
            // Setting the cache
            localStorage.cache  = htmlString;
            localStorage.time   = now;
            // Updating the content div:
            $('#content').html(htmlString);
        },'json');
    }
    else{
        // The cache is fresh, use it:
        $('#content').html(localStorage.cache);
    }
});
In localStorage we also store a timestamp. We use it to determine how old the cache in localStorage is. If it is older than an hour, we ignore it and fetch the data again.
Here is a sample of the data that is returned from YQL.
{
    "query": {
        "count": "1",
        "created": "2010-06-09T12:02:33Z",
        "lang": "en-US",
        "results": {
            "item": {
                "title": "Neon Text Effect With jQuery & CSS",
                "link": "http://feedproxy.google.com/..",
                "comments": [
                    "http://tutorialzine.com/2010/06/neon-text-effect..",
                    "11"
                ],
                "pubDate": "Tue, 01 Jun 2010 20:11:54 +0000",
                "creator": "Sawan Das",
                "category": [
                    "CSS",
                    "jQuery"
                ],
                "guid": {
                    "isPermaLink": "false",
                    "content": "http://tutorialzine.com/?p=925"
                },
                "description": "In this combined design and coding tutorial..",
                "commentRss": "http://tutorialzine.com/2010/06/neon-text-e..",
                "origLink": "http://tutorialzine.com/2010/06/neon-text-eff.."
 }
        }
    }
}
This structure is made available to us in the msg variable on line 11 of script.js.
With this your first Google Chrome extension is complete!
Conclusion
You can read more about extensions (including advanced features not covered in this tutorial) on Google Chrome’s Extension documentation page. I hope that this tutorial has given you a great start in extending the browser’s functionality.
Read More