One of the best and lightest image viewers that I have come across is Irfanview – available free at irfanview.com
IrfanView is very fast, small, compact and innovative and hence, very popular too. It is very simple for beginners and powerful for professionals. It creates new and/or interesting features in its own way. You need no knowledge of any graphic programs when you use Irfanview. Just download it, install it and run it – as simple as that. The variety of graphic files it can handle, is to be seen to be believed. And coupled with the Plugins / Addons available, it can manage multimedia audio and video files too.
Although primarily it is a viewer, it gives some basic but powerful image editing options too – you can adjust the brightness, contrast and color of your image at the touch of a button with a visual preview online. Rotation and giving special effects to your images like a professional, is a breeze. Format conversion, is as simple as clicking on Save As, and re-sizing your large camera images before uploading online, is child’s play. The batch-processing mode helps you run several repetitive tasks, like re-sizing of hundreds of photos, in a single click.
An added bonus is that you can play slide-shows of your favorite pictures and also play movies in a large range of formats – which used to be a daunting task for the lay user.
Capturing snapshots of your screen, running the multi-image viewer, flipping images – one can go on and on. All this, and much more, is available in a very light, easy to use, intuitively designed interface.
Now, go ahead, be a PRO at image viewing and editing with Irfanview.
Is paying for an Office Suite like Ms-Office burning a hole in your wallet ? Sweat no more!! There’s an alternate solution, that does the job just as well as Ms-Office, and it’s totally free of cost. No Strings attached. It’s called OpenOffice.org. Read on ….
OpenOffice.org is a free and open source office suite, including word processor, spreadsheet, presentation, vector drawing and database components. It is available for many different platforms, including Microsoft Windows. It is intended to be compatible with, and to be a free alternative to Microsoft Office. It supports the OpenDocument standard for data interchange and can be used at no cost.
OpenOffice.org aims to compete with Microsoft Office and emulate its look and feel where suitable. It can also read and write most of the file formats found in Microsoft Office, and many other applications. The ability to read and write Microsoft Office documents is an essential feature of the suite for many users. OpenOffice.org has been found to be able to open files of older versions of Microsoft Office and damaged files that newer versions of Microsoft Office itself cannot open.
OpenOffice.org is a collection of different applications that work together closely to provide the features expected from a modern office suite. Many of the components are designed to mirror those available in Microsoft Office. The components available include:
* Writer — a word processor similar in look and feel to Microsoft Word and offering a widely
overlapping range of functions and tools. It also includes the ability to export Portable Document
Format (PDF) files with no additional software, and can also function as a WYSIWYG HTML editor for creating and editing web pages. One important difference between OpenOffice Writer and Microsoft Word is that in Writer, automatic save is turned OFF by default. Autosave should be turned on if the user lives in a power outage prone area or forgets to save frequently.
* Calc — a spreadsheet similar to Microsoft Excel with a roughly equivalent range of features. Calc provides a number of features not present in Excel,including a system which automatically defines series for graphing, based on the layout of the user’s data. Calc is also capable of writing spreadsheets directly as a PDF file.
* Impress — a presentation program similar to Microsoft PowerPoint. It can expor presentations to
Macromedia Flash (SWF) files allowing them to be played on any computer with the Flash player installed. It also includes the ability to create PDF files. Impress suffers from a lack of ready-made presentation designs. However, templates are readily available on the Internet.
* Base — a database program similar to Microsoft Access. Base allows the creation and manipulation of databases, and the building of forms and reports to provide easy access to data for end-users. As with Access, Base is able to work as a front-end to a number of different database systems, including Access databases (JET), ODBC data sources and MySQL/PostgreSQL. Base only became part of the suite starting with version 2.0.
* Draw — a vector graphics editor comparable in features to CorelDRAW. It features versatile
“connectors” between shapes, which are available in a range of line styles and facilitate building drawings such as flowcharts.
* Math — a tool for creating and editing mathematical formulae, similar to Microsoft Equation
Editor. Formulae can be embedded inside other OpenOffice.org documents, such as those created by Writer. It supports multiple fonts and can export to PDF.
* Quickstarter — a small program for Windows that runs when the computer starts for the first time. It loads the core files and libraries for OpenOffice.org during computer startup and allows the suite applications to start more quickly when selected later. The amount of time it takes to open OpenOffice.org applications was a common complaint in version 1.0 of the suite, and Quickstarter was a solution of sorts. Substantial improvements were made in this area for version 2.0.
* The macro recorder — is used to record user actions and replay them later to help with automating tasks, similar to Microsoft Visual Basic for Applications (VBA). It is available in the Writer and Calc applications and is based on StarOffice Basic. In addition to StarOffice Basic macros, the upcoming Novell edition of OpenOffice 2.0 supports running Microsoft VBA macros, a feature expected to be incorporated into the mainstream version soon. To download OpenOffice.org or get more information onit, visit the official web-site on
Courtesy : HS
When you’re done working on your computer for the day, you probably close each open application one by one. If so, chances are that you’ve wished that you could close all you open applications at the same time.
To do so, hold down the [Ctrl] key and click on each application button on your taskbar. When you do, you’ll notice that each button remains selected.
Once you’ve selected all the application buttons on the taskbar, right-click on any one of them and select the Close Group command from the shortcut menu. When you do, all your applications will close.
If you have any application in which an open file hasn’t yet been saved, that application will prompt you to save the file.
courtesy : H S
Google has just launched a spreadsheet (Excel) software on the net. This allows you not only to edit and save your spreadsheets on the internet (which means they are stored on secure servers and you’ll never lose your data due to a hard disk crash), but also allows you to get multiple people working on the spreadsheet.
Whats more.. its completely free and dosent take a lot of hard disk space like Microsoft softare!! And its never going to crash.
Have a look at spreadsheets.google.com
Courtesy : Nauzad Tantra
Sometimes it can be helpful to add line numbers in the left margin of a Word document. Reviewers can then refer to the exact location of some text instead of giving a general description eg “near the top of the 4th page.”
When the Line Numbering feature is turned on you can print or email the file so that the reviewers can open the file with the line numbers displayed.
To turn on line numbering
- Click File, Page Setup
- Click the Layout tab, then select the Line Numbers button
- Within the Line Numbers box, click before “Add Line Numbering”
- Make your selections
If you want the entire document to have line numbering then you would choose “Continuous”.
Select “Restart each page” if you want to re-number each page beginning with the same number, such as 1.
Use the “Count by” box to skip lines. For example, type in the number 10 if you only want a number placed next to every 10th line.
- Click OK and line numbers are applied to the file.
courtesy : Kersi Mody
“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”
“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
Have you received email with a similar message? It’s a scam called “phishing” — and it involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, PAN number, passwords, or other sensitive information) from unsuspecting victims.
Phishers send an email or pop-up message that claims to be from a business or organization that you may deal with — for example, an Internet service provider (ISP), bank, online payment service, or even a government agency. The message may ask you to “update,” “validate,” or “confirm” your account information. Some phishing emails threaten a dire consequence if you don’t respond. The messages direct you to a website that looks just like a legitimate organization’s site. But it isn’t. It’s a bogus site whose sole purpose is to trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name.
Tips to help you avoid getting hooked by a phishing scam:
- If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Legitimate companies don’t ask for this information via email. If you are concerned about your account, contact the organization mentioned in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company’s correct Web address yourself. In any case, don’t cut and paste the link from the message into your Internet browser — phishers can make links look like they go to one place, but that actually send you to a different site.
- Use anti-virus software and a firewall, and keep them up to date. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.
Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. Anti-virus software scans incoming communications for troublesome files. Look for anti-virus software that recognizes current viruses as well as older ones; that can effectively reverse the damage; and that updates automatically.
A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software “patches” to close holes in the system that hackers or phishers could exploit.
- Don’t email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure, like a lock icon on the browser’s status bar or a URL for a website that begins “https:” (the “s” stands for “secure”). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
- Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
- Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer’s security.
- Forward spam that is phishing for information to the original organization that is sought to be represented, so that they can initiate action, and block the same.