10 Nov 2013

TAKE SCREEN SHOT WITHOUT ANY SOFTWARE



How to take screen shot without any software by following simple steps
Today many people take screen shot of their active window using some tools like Snipping Tool on Windows 7. Because they are not aware of this trick which can use any Windows operating system without any software even Windows XP.

The steps are described below:-


Step 1: Press Ctrl + Print Screen(Prnt Screen)



Step 2: Open ‘Paint’

Step 3: Press Ctrl + V

Now you are done.

NOTE: instead of ‘Paint’, you can use any photo editors like Photoshop, CorelDraw, etc.

9 Nov 2013

About Corel Draw Software

            Corel Draw

      Minimum System Requirements

Windows 2000 with SP4, or Windows XP with SP1
(Home, Professional, or Tablet PC Edition)
Pentium II, 200 MHz or greater

128 MB RAM (256 MB RAM recommended)
Mouse or tablet
1024 x 768 screen resolution (768 x 1024 on a Tablet PC)
CD-ROM drive
250 MB hard disk space (CorelDRAW only;
More space will be required for other suite applications)
Microsoft Internet Explorer 5.5 or higher

                         Installation

Before installing CorelDRAW Graphics Suite 12

Make sure that you system Date/Time are set correctly
Close all applications, including all virus detection programs and applications that are open in the system tray or on the Windows taskbar. Not doing so may increase the installation time and interfere with installation.
On Windows 2000 or XP, you should be logged in as an administrator or as a user with administrative rights.
Make sure that you have enough free disk space available on the drive where you want to install the application.
To avoid file and memory conflicts, close all running programs and delete the contents of your system's TEMP folders. [C:\Documents and Settings\<Administrator>\Local Settings\Temp] and [C:\<WINNT>\Temp]
Corel recommends that you install CorelDRAW Graphics Suite 12 in its own directory to avoid conflicts with previous versions.

Network/Workstation
For network administrators, a Network Administrator Guide (N.A.G.) is available to organizations that have purchased multiple licenses of CorelDRAW Graphics Suite 12. For more information, contact Corel's Licensing Department or Customer Service.
Installing CorelDRAW Graphics Suite 12
Before you begin, read "Before installing CorelDRAW Graphics Suite 12," above.

Insert Disc 1 in the CD drive.
If the Intro screen does not start automatically, click Start on the Windows taskbar, and click Run. Type D:\Intro.exe or D:\Setup.exe, where D is the letter that corresponds to the CD drive.
Follow the instructions for installing the application.
Uninstalling CorelDRAW Graphics Suite 12
For Windows 2000

On the Windows taskbar, click Start > Settings > Control panel > Add/remove programs.
If you want to keep your user files such as preferences, presets, user-created fills, and customized files, click Remove. If you want to remove user files, click Change, and then click Remove. You will be prompted to remove user files.
For Windows XP
On the Windows taskbar, click Start > Control panel > Add or remove programs.
If you want to keep your user files such as preferences, presets, user-created fills, and customized files, click Remove. If you want to remove user files, click Change, and then click Remove. You will be prompted to remove user files.

                                                 *            *             *

Graphic professionals and business users alike will find that this

Powerful graphics suite helps them work faster, complete more projects,

And impress more clients. Building on the success of one of the world's

Most popular software titles, the latest version of CorelDRAW Graphics

Suite saves designers time by giving them tools that reduce the number of

Clicks or steps required to get their jobs done.

Offering unrivaled value, CorelDRAW Graphics Suite 12 gives customers the

Incredible power of three integrated graphics applications, plus a

Collection of other useful tools and utilities all in one box. The new

Suite includes CorelDRAWR 12 for illustration, page-layout and vector

Drawing; Corel PHOTO-PAINTR 12 for professional digital imaging;
And Corel R.A.V.E.T 3 for motion-graphics creation.

8 Nov 2013

Cyber Crime.

 



Computer crime is one of the fastest-growing types of illegal activity, both in the U.S. and internationally. While the Internet links people together like never before, it also provides endless opportunity to criminals seeking to exploit the vulnerabilities of others.
Cyber crime statistics are staggering. Nearly 73% of Americans have encountered some form of computer crime or attempted crime on the Web. These types of crime are notoriously hard to solve and sometimes occur without the victim ever knowing anything illegal has taken place. Despite the risks, there are things you can do to help protect yourself from becoming one of the many cyber crime statistics.

What is cyber crime?

There are several different types of computer crime, many of which overlap. Below are a few of the most commonly reported.
  • Phishing – Phishing is the practice of sending fraudulent emails in an attempt to trick the recipient, usually for the purpose of obtaining money. The elderly are particularly vulnerable to these types of cyber crime.
  • Hacking – Hacking is similar to digital trespassing. Hackers infiltrate online networks to illegally download confidential information, manipulate functions and in some cases steal identities that can be used to fraudulently purchase goods online.
  • Stalking and/or Harassment – Not all types of cyber crime involve money. Some cyber criminals use the Internet as a cover for other illegal behaviors like stalking, harassment and in lesser cases, bullying.

How you can protect yourself from computer crime

Though cyber crime statistics are on the rise, even the most serious Internet criminals rarely make the FBI Fugitives List. These types of perpetrators are extremely difficult to track down. In fact, the FBI says at least 25% of all cyber crimes aren’t able to be prosecuted.
However, it’s not that difficult to stop many cyber criminals if you know what to look for. The Internet isn’t totally anonymous, and anonymity is what most criminals count on to keep their illegal activities under wraps.

Keep your family safe

For many Crime Stoppers home is the first line of defense, particularly when children are involved. Be sure your Internet connection is password-protected and your server is encrypted. If kids are using the Web, know what sites they’re visiting and exactly who they’re talking to.
Children are particularly vulnerable for cyber crime because they’re naturally less skeptical than adults. Be sure you teach your kids the dangers of the Web and give them concrete rules to follow when using the computer.

What are your risk factors?

It’s crucial to go a step beyond finding out “what is cyber crime?” and learn more about the specific risks surrounding your online activities.
If you like to purchase clothing online, for example, check to be sure all the sites you purchase from have a nationally affiliated security certification. If you like to visit chat rooms, never give out any personal information to anyone you don’t know.
Also, check crime reports in your area to be sure there isn’t a cyber criminal out there preying on people like you.

Know the online warning signs

The Web can be a perfectly safe place to learn, connect and shop, but you have to know what to avoid. If you see any of the following while online, assume a cyber criminal is at work:
  • Suspicious “official” websites that look amateurish or poorly maintained
  • Emails asking for personal information or passwords
  • Sites requesting credit card information for entry
  • Unsolicited communication from someone you don’t know
  • Threatening or troubling language

The threat of computer crime is real, so act accordingly

Computer crime isn’t victimless. Millions of people lose money to ruthless cyber criminals every year, and some are actually physically harmed by people they meet online. When you’re using the Web, remember to stay alert, stay aware and protect your information.

Children as victims.

 



In order to help protect children from online sexual predators, it is important that parents and guardians understand how children’s vulnerabilities may make them susceptible to manipulation by these predators.

Curiosity

Children are naturally curious about sex. By acting as guides, predators can exploit this curiosity and gradually lure children into sexual activity. Adolescents questioning their sexuality are even more at risk, as they may go online with the intent of finding support and companionship.Instead, they may find adults looking to take advantage of this vulnerability.

Need for Attention

Even if children receive ample attention from their families, they still crave it from others, especially those they perceive as older and more mature. Predators may offer children affection and flattery in order to coerce them into sexual acts.

Rebellion

Children may become rebellious when they reach adolescence, and predators can use this to their advantage. A child who is victimized while disobeying parental rules may be reluctant to admit it for fear of being punished.

Respect for Adults

Because children are taught to obey and respect adults, they may be less likely to disobey directions given by an adult, even those which make them uncomfortable. An adult looking to harm children can exploit this to influence a child’s behavior.

Cyberbullying.

 






Cyberbullying is just what it sounds like - bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones. It can start easily—with a rumor, a photo, or a forwarded message—and just as easily spiral out of control. An embarrassing video posted to a social networking site by someone in Kansas tonight may be watched by someone in Japan tomorrow. Cyberbullying victims may be targeted anywhere, at any time.

 Common Forms of Cyberbullying.
  • Flaming and Trolling – sending or posting hostile messages intended to “inflame” the emotions of others
  • Happy-Slapping – recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing
  • Identity Theft/Impersonation – stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information
  • Photoshopping – doctoring digital images so that the main subject is placed in a compromising or embarrassing situation
  • Physical Threats – sending messages that involve threats to a person’s physical safety
  • Rumor Spreading – spreading gossip through e-mail, text messaging, or social networking sites
Signs Your Child May Be a Victim of Cyberbullying
  • Avoids the computer, cell phone, and other technological devices or appears stressed when receiving an e-mail, instant message, or text
  • Withdraws from family and friends or acts reluctant to attend school and social events
  • Avoids conversations about computer use
  • Exhibits signs of low self-esteem including depression and/or fear
  • Has declining grades
  • Has poor eating or sleeping habits

Cell phone safety.

 



 
When you think about your children’s online activities, do you consider their cell phones? They have evolved from simple communication devices to mobile, miniature computers. For example, smartphones have operating systems similar to that of computers which allow users to download programs or “apps.” These apps help users do things like access e-mail and play games. Also, most cell phones allow users to download and upload content from the Internet just as they would on a computer. However, cell phones can be more difficult to monitor than a computer, and children often use them without adult supervision. Make sure to review your family’s Internet safety rules with your children and become aware of the following risks before allowing them to own cell phones

 Making Cyberbullying More Painful


Cell phones make it easy for children to communicate with their friends, but they also make them vulnerable to cyberbullying. Cell phones can be used at anytime and anywhere, giving cyberbullies unlimited access to their victims. Children may send and receive mean-spirited phone calls, texts, and pictures at any hour.
 Playing a Role in Grooming
Predators also know and take advantage of the fact that cell phones let them talk with their victims at any time. They are also aware that parents and guardians often forget to monitor children’s cell phones. Predators may send children cell phones and ask them to keep the phones a secret. They can then talk to and exchange text messages and pictures with children without close monitoring by parents and guardians. Others may ask children for their cell phone numbers after meeting them online or try to connect with willing children by sending texts to random numbers.

 Sexting Made Easy

“Sexting” is a term used to describe the sending of sexually explicit text messages or pictures of minors by minors. What most young people do not realize is that the production, possession, and distribution of explicit photos of minors, even if they are self-produced, may be illegal. Furthermore, if these explicit photos end up on the Internet, children may be taunted by their peers and jeopardize scholastic, athletic, and employment opportunities.

 Unintentional Sharing of Geolocation Data

Most smartphones have GPS technology which allows the user’s precise location to be pinpointed by apps and on websites. Social networking sites such as FourSquare, GoWalla, and Facebook take advantage of this technology by encouraging their users to “check-in” or share their locations. A “check-in” can be shared with a list of friends, so make sure you know who is on your child’s friends list before allowing them to use this type of technology. Children also may share their locations unintentionally through pictures taken with their smartphones; these photos often have geolocation data embedded in them. Consider disabling the location services on smartphones before allowing children to post photos online. 

31 Oct 2013

Now Amazon Is Just Giving Money Away

Now Amazon Is Just Giving Money Away

Amazon is really rubbing it in. Notorious for its willingness to lose money to drive ever-increasing sales, the company said Wednesday that it is now giving customers the option to donate 0.5 percent of the price of many purchases to charity through a new project called Amazon Smile.
The process is pretty easy: Customers go to smile.amazon.com and choose a charity.Amazon (AMZN) suggests a few, such as the American Red Cross and the Nature Conservancy. From that point on, the donations are sent automatically. There isn't a cap on how much money Amazon will send to charities, but the program does exclude digital items such as Kindle books and recurring Subscribe-and-Save purchases or subscription renewals. “Nearly all physical products are eligible,” says a company spokesperson via e-mail.
This cuts into Amazon’s profit margins, of course, or it would if it had them. The company lost 9¢ per share in its most recent quarter, while increasing 24 percent in sales over the previous year. Once Amazon explained this to investors, its stock price shot up. Call it the Amazon Paradox (as my colleague Brad Stone did at the time).
Amazon does get some direct benefit from Smile, because the company—not its customers—gets the tax advantages of the charitable donations. But the basic strategy is the same as the company has always employed. Do things to draw more customers, even if it means the margins from each transaction get slimmer.
This has led to questions whether Amazon can ever become consistently profitable. Is its sales growth completely reliant on its money-losing ways? Or is it playing a very long game by pumping its profit into long-term investments? Eugene Wei, a former Amazon employee who wrote an interesting analysis of the company’s business model on his personal blog last week, thinks it’s the latter. In many cases, Amazon sales categories are very profitable, but it has chosen to sink everything back into investment, largely into new fulfillment centers. Those investments lead to new sales. Lather, rinse, repeat.
In the same way that customers buy more when they’re offered free shipping, people may spend more when they know a chunk of it is going to charity. That means smaller profits immediately, but Amazon thinks it will translate into bigger ones in the future. Eventually we’ll see if it’s right.

TAKE SCREEN SHOT WITHOUT ANY SOFTWARE

How to take screen shot without any software by following simple steps Today many people take screen shot of their active window u...