Firefox Ultimate Optimizer 2009 | 7.58MB
Firefox Optimizers for Mozilla Firefox v1.x / 2.x / 3.x was developed for an easy and fast optimization of your browsing experience with Firefox. It is based on a collection of popular and well working optimization settings used and tested by the experts. Usually you have to optimize Firefox manually, which can be time consuming and difficult for the novice user. FireTune helps you here - it includes all the performance optimizations. The only thing you must do is: make your selection. Firefox Optimizers does the work for you.Details on what exactly Optimizers does can be found in the help file.
In most of all cases you’ll notice an improved browsing speed after optimizing Firefox.
System Requirements
Mozilla Firefox v1.x / 2.x / 3.x
Windows 98, Me, 2000, Windows 2003, Windows XP SP1 (or higher), Windows Vista
the regular hardware requirements for your operating system
3 MB free space on your harddrive
* .NET Framework 2.0
Saturday, June 6, 2009
5 importent Steps to Protecting Your Computer on the Internet
Spyware, viruses and worms... oh my!
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security
- You have no firewall installed and should download one ASAP.
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security
- You have no firewall installed and should download one ASAP.
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
The New Innovation "Virtial Key Board"
The Future Has Arrived...
Remember when you were promised all those amazing future tech innovations? Just around the corner was supposed to be a shining technology utopia with flying cars, personal space travel to distant galaxies, and bio-implantable cell phones. It's almost disappointing enough to make you sit at home and watch old episodes of "Space 1999".
Don't lose hope! An amazing glimpse of this promised future has just arrived at ThinkGeek in the form of the Bluetooth Laser Virtual Keyboard. This tiny device laser-projects a keyboard on any flat surface... you can then type away accompanied by simulated key click sounds. It really is true future magic at its best. You'll be turning heads the moment you pull this baby from your pocket and use it to compose an e-mail on your bluetooth enabled PDA or Cell Phone. With 63 keys and and full size QWERTY layout the Laser Virtual Keyboard can approach typing speeds of a standard keyboard... in a size a little larger than a matchbook.
Product Features
Connects to PDAs Smartphones and Computers using Bluetooth
Projects a full size keyboard onto any flat surface
Allows the convenience of regular keyboard typing in a tiny form factor
Rechargeable battery lasts for 120 minutes of continuous typing
Tiny size only 3.5 inches high
Compatible with PalmOS 5, PocketPC 2003, Windows Smartphone, Symbian OS, and Windows 2000/XP. Limited Mac OSX Support.
New Opera 10 beta version with increased web browsing speed
The beta version of the famous web browser Opera 10 was started on Wednesday. To attention of the user was presented new performances, high speed and new user-friendly design. Let’s look through updates.
The Opera 10 now allows user to redesign browsers background how ever they want and to resize tab bar. Also user can add from 4 up to 25 favorite web sites for quick access. The most appreciable upgrade is the speed of web browsing. It is possible using new Operas browsing engine.
The beta version of Opera 10 also gives users ability to work with their e-mail services. Now user can simply integrate it to the web browser. Also a spell-check function was added. It works with Facebook, blog and e-mail services.
Opera 10 is now safer. If the browser found any problems it will automatically restart. After restarting it will recover all viewed tabs and will provide crash report.
The beta version can be installed on Mac os X 10.3 or higher. User can download it free from the official Opera website.
The Opera 10 now allows user to redesign browsers background how ever they want and to resize tab bar. Also user can add from 4 up to 25 favorite web sites for quick access. The most appreciable upgrade is the speed of web browsing. It is possible using new Operas browsing engine.
The beta version of Opera 10 also gives users ability to work with their e-mail services. Now user can simply integrate it to the web browser. Also a spell-check function was added. It works with Facebook, blog and e-mail services.
Opera 10 is now safer. If the browser found any problems it will automatically restart. After restarting it will recover all viewed tabs and will provide crash report.
The beta version can be installed on Mac os X 10.3 or higher. User can download it free from the official Opera website.
Optical Fiber Cables
In practical fibers, the cladding is usually coated with a tough resin buffer layer, which may be further surrounded by a jacket layer, usually plastic. These layers add strength to the fiber but do not contribute to its optical wave guide properties. Rigid fiber assemblies sometimes put light-absorbing ("dark") glass between the fibers, to prevent light that leaks out of one fiber from entering another. This reduces cross-talk between the fibers, or reduces flare in fiber bundle imaging applications.
Modern cables come in a wide variety of sheathings and armor, designed for applications such as direct burial in trenches, dual use as power lines [3], installation in conduit, lashing to aerial telephone poles, submarine installation, or insertion in paved streets. In recent years the cost of small fiber-count pole-mounted cables has greatly decreased due to the high Japanese and South Korean demand for fiber to the home (FTTH) installations.
Fiber cable can be very flexible, but traditional fiber's loss increases greatly if the fiber is bent with a radius smaller than around 30 mm. This creates a problem when the cable is bent around corners or wound around a spool, making FTTX installations more complicated. "Bendable fibers", targeted towards easier installation in home environments, have been standardized as ITU-T G.657. This type of fiber can be bent with a radius as low as 7.5 mm without adverse impact. Even more bendable fibers have been developed.Bendable fiber may also be resistant to fiber hacking, in which the signal in a fiber is surreptitiously monitored by bending the fiber and detecting the leakage.
Modern cables come in a wide variety of sheathings and armor, designed for applications such as direct burial in trenches, dual use as power lines [3], installation in conduit, lashing to aerial telephone poles, submarine installation, or insertion in paved streets. In recent years the cost of small fiber-count pole-mounted cables has greatly decreased due to the high Japanese and South Korean demand for fiber to the home (FTTH) installations.
Fiber cable can be very flexible, but traditional fiber's loss increases greatly if the fiber is bent with a radius smaller than around 30 mm. This creates a problem when the cable is bent around corners or wound around a spool, making FTTX installations more complicated. "Bendable fibers", targeted towards easier installation in home environments, have been standardized as ITU-T G.657. This type of fiber can be bent with a radius as low as 7.5 mm without adverse impact. Even more bendable fibers have been developed.Bendable fiber may also be resistant to fiber hacking, in which the signal in a fiber is surreptitiously monitored by bending the fiber and detecting the leakage.
Japan's Traffic Signals
With rapid technological development in recent years, personal computers are finding a wider scope of application in road traffic control systems. However, personal computers have not yet been used in traffic signal control that must be used in real time.
By reconsidering a network configuration involving a host computer and terminals to alleviate greater restrictions accompanying real-time control, Sumitomo Electric has successfully constructed a highly cost-efficient, personal computer-based road traffic control system for the first time in Japan.
The new system is called the UC model which is a UTMS(Universal Traffic Management Systems) Compact traffic control system model: a new traffic management system advanced by the National Police Agency to implement the ITS.
At the same time, we have fully incorporated MODERATO(Management by Origin-Destination Related Adaptation for Traffic Optimization) as a new traffic control technique.
HOW TO KNOW A USER PASSWORD OR HACK SOMEONE'S COMPUTER PASSWORD
WELL dudes its a very very important trick with the help of which you can steal any password of the user of the same computer .
this trick can also be use for positive way in this sense that if you had forgotten the password of you user then with the help of this trick you can take your account back
Trick for two or more users on the same computer
if your friend or any other family member has set a password to his user then how can you break his password.
step1. open your account
step2. go to start click on run
step3. now type CMD and press enter.
(you will see a command prompt will appear)
don't panic just cooollllllll
step4. now type exactly the same thing as in the quoted text
" net user " and press enter
you will see all the users of that particular computer
step 5. now type net user (the user name )* and hit enter
(*) comes from shift+8
automatically a new line will appear which asks you type the password.
type any password (the password will not appear but it is written) press enter it will ask you to confirm it
type again the password and enjoy . now that particular user will not be able to enter to his computer.
for example
let if you have three users john , maria , kane.
so you are john and you want to get the password of maria
then go to command prompt and after typing net user, type this net user maria* and press enter .
write password and then confirm it close the command prompt and then log off and open your opponent account and enjoy.
CHANGE YOUR PASSWORD IF YOU ARE A SINGLE USER ON YOUR PC
repeat the same process as described above but the problem is how you repeat this all process as you are a single user so here is the answer of your question
just start your computer and from start of your computer keep pressing F8 so your computer will start on safe mode.
now an other user will automatically displayed on the welcome screen which is named as administrator .
log in to the administrator account and go to start click on run and then type CMD and hit enter.
now repeat the above process. type net user and press enter. a user list will come now type net user (your user name)*
(*) comes from shift+8
and enter and type your password . it will not displayed but it is written and now again press enter and reconfirm it and press enter and thus press enter and close this command prompt
restart your system and log in to your user from the password which you have just written.
this trick can also be use for positive way in this sense that if you had forgotten the password of you user then with the help of this trick you can take your account back
Trick for two or more users on the same computer
if your friend or any other family member has set a password to his user then how can you break his password.
step1. open your account
step2. go to start click on run
step3. now type CMD and press enter.
(you will see a command prompt will appear)
don't panic just cooollllllll
step4. now type exactly the same thing as in the quoted text
" net user " and press enter
you will see all the users of that particular computer
step 5. now type net user (the user name )* and hit enter
(*) comes from shift+8
automatically a new line will appear which asks you type the password.
type any password (the password will not appear but it is written) press enter it will ask you to confirm it
type again the password and enjoy . now that particular user will not be able to enter to his computer.
for example
let if you have three users john , maria , kane.
so you are john and you want to get the password of maria
then go to command prompt and after typing net user, type this net user maria* and press enter .
write password and then confirm it close the command prompt and then log off and open your opponent account and enjoy.
CHANGE YOUR PASSWORD IF YOU ARE A SINGLE USER ON YOUR PC
repeat the same process as described above but the problem is how you repeat this all process as you are a single user so here is the answer of your question
just start your computer and from start of your computer keep pressing F8 so your computer will start on safe mode.
now an other user will automatically displayed on the welcome screen which is named as administrator .
log in to the administrator account and go to start click on run and then type CMD and hit enter.
now repeat the above process. type net user and press enter. a user list will come now type net user (your user name)*
(*) comes from shift+8
and enter and type your password . it will not displayed but it is written and now again press enter and reconfirm it and press enter and thus press enter and close this command prompt
restart your system and log in to your user from the password which you have just written.
SPEED UP YOUR NETWORK AND INTERNET ACCESS
I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. only do it if you feel comfortable with changing registry.
Increasing network browsing speed
Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.
In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:
1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.
2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.
3. Next, expand Software and then Microsoft.
4. Locate Windows and expand that as well.
5. You will want to be editing the main system files, so expand CurrentVersion.
6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.
7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.
8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.
Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.
Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.
i hope you enjoyed.
Increasing network browsing speed
Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.
In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:
1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.
2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.
3. Next, expand Software and then Microsoft.
4. Locate Windows and expand that as well.
5. You will want to be editing the main system files, so expand CurrentVersion.
6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.
7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.
8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.
Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.
Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.
i hope you enjoyed.
Make your folders lock and not responding
For this just go to my computer and then click on tools and then click on folder options and then click on
view and then a list of options of folders will be given below.
just find here "use simple file sharing (recommended)" you will find it on the last options just click on it or mark on it and then click on apply and then
click on ok. then go to your respective folder which you want to lock. Just right click on it and then click on properties.click on the security tab and then in the security tab mark all the options in the permission for administrators such as tick mark on full control,modify,read and execute, read and write........ click on apply and ok. so when you open the folder it will not open .
to open it go again to security and then unmark all the mark items. click on apply and then click on ok.
view and then a list of options of folders will be given below.
just find here "use simple file sharing (recommended)" you will find it on the last options just click on it or mark on it and then click on apply and then
click on ok. then go to your respective folder which you want to lock. Just right click on it and then click on properties.click on the security tab and then in the security tab mark all the options in the permission for administrators such as tick mark on full control,modify,read and execute, read and write........ click on apply and ok. so when you open the folder it will not open .
to open it go again to security and then unmark all the mark items. click on apply and then click on ok.
How to increase or decrease the speed of start menu.
well most of the computer specialist doesn't know this trick. They even don't know that is there any speed of start menu or not
so here is the answer.
just go to start and then click on run .type regedit and hit enter
a registry editor will open. Here expand "HKEY_CURRENT_USER" then a new list will open. Here expand "control panel"
then in the control panel search desktop. Do not expand desktop.
Just make a single click on desktop and then look toward the right side of the registry editor. here double click on "menu show delay" and then make its value data to 0.
thus your start menu speed is increased.I
f you still doesn't understand you can watch this video.
so here is the answer.
just go to start and then click on run .type regedit and hit enter
a registry editor will open. Here expand "HKEY_CURRENT_USER" then a new list will open. Here expand "control panel"
then in the control panel search desktop. Do not expand desktop.
Just make a single click on desktop and then look toward the right side of the registry editor. here double click on "menu show delay" and then make its value data to 0.
thus your start menu speed is increased.I
f you still doesn't understand you can watch this video.
Make your computer 100 times faster
Just go to my computer and right click on any empty side and click on properties. You will see some options on the top of the pop up appear
such as general , computer name, hardware , advanced..... click on advanced and then click on settings in performance.
here you will see again that some options are given on the top of the box which appear such as visual affects,advanced,data execution prevention.
click on visual affects and mark the option "adjust for best perfomance"click on apply and then click on ok.
it will take a moment to load new setting.be patient and chill.
such as general , computer name, hardware , advanced..... click on advanced and then click on settings in performance.
here you will see again that some options are given on the top of the box which appear such as visual affects,advanced,data execution prevention.
click on visual affects and mark the option "adjust for best perfomance"click on apply and then click on ok.
it will take a moment to load new setting.be patient and chill.
How to change the name of recycle bin
Step1 First go to start menu and then run
Step2. Then type regedit.
Step3. Then click on “HKEY_CLASSES_ROUT
Step4. THEN FIND HERE “CLSID”
Step5. THEN CLICK ON IT.IT WILL EXPAND FURTHUR.
Step6. THEN FIND THERE “645FF040”THEN JUST CLICK ON IT SO SOME THINGS WILL APPEAR ON THE RIGHT HAND SIDE.
Step7. FIND THERE A THING WRITTEN “DEFAULT”(ON THE RIGHT HAND)
JUST CLICK ON IT AND TYPE ANY THING ON THE PLACE OF RECYCLE BIN thanks..
Step2. Then type regedit.
Step3. Then click on “HKEY_CLASSES_ROUT
Step4. THEN FIND HERE “CLSID”
Step5. THEN CLICK ON IT.IT WILL EXPAND FURTHUR.
Step6. THEN FIND THERE “645FF040”THEN JUST CLICK ON IT SO SOME THINGS WILL APPEAR ON THE RIGHT HAND SIDE.
Step7. FIND THERE A THING WRITTEN “DEFAULT”(ON THE RIGHT HAND)
JUST CLICK ON IT AND TYPE ANY THING ON THE PLACE OF RECYCLE BIN thanks..
Hack IE Title Bar
This can be an impressive bit of personalization.
Use your name or moniker to brand Internet Explorer.
Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ and left-click on Main to change the string "Window Title" to whatever you wish.
Use your name or moniker to brand Internet Explorer.
Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ and left-click on Main to change the string "Window Title" to whatever you wish.
Change Your Ip In Less Then 1 Minute
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Emerge Desktop
Emerge Desktop is a Windows Shell just like Windows Explorer. Its an OpenSource and that means you can get it absolutely free, and if you get really good with it, you can make your desktop look really brilliant. Their Website has really easy ways to help you customize your desktop so do visit it if you are interested.
It has the Linux Fluxbox like interface so if your not much used to Windows and you had been using Linux before this is a really good thing.
I would rather says its worth trying because you will get to learn a lot of thing while coustomizing it as well. But if you have a Windows Vista Service Pack 1 I would rather ask you not to use it for a longer time as it has fcking crashed a lot on mine, but when I used on my Windows XP, it was smooth as butter. Another very important thing is, if you really wanna make your Desktop look all cool it takes you about a Kazillion hours, and then when you finally like one you keep it for a day, then the next day again you think its not that cool so you spend another Kazillion hours changing it, it this just never stops.
So, the thing is that all the fcking time you sit on that chair facing your computer, you do nothing but search of ways to make your Desktop look more beautiful than your wife or girlfriend, and just forget all the daily chores like playing Warcraft or Checking Emails or Watching Porn.
Anyways even after all this, Its good to try out once, and I mean just once if you have a habit of getting addicted to everything new you get on the computer.
Its a good software overall. The Latest Version Is 4.1.3
It has the Linux Fluxbox like interface so if your not much used to Windows and you had been using Linux before this is a really good thing.
I would rather says its worth trying because you will get to learn a lot of thing while coustomizing it as well. But if you have a Windows Vista Service Pack 1 I would rather ask you not to use it for a longer time as it has fcking crashed a lot on mine, but when I used on my Windows XP, it was smooth as butter. Another very important thing is, if you really wanna make your Desktop look all cool it takes you about a Kazillion hours, and then when you finally like one you keep it for a day, then the next day again you think its not that cool so you spend another Kazillion hours changing it, it this just never stops.
So, the thing is that all the fcking time you sit on that chair facing your computer, you do nothing but search of ways to make your Desktop look more beautiful than your wife or girlfriend, and just forget all the daily chores like playing Warcraft or Checking Emails or Watching Porn.
Anyways even after all this, Its good to try out once, and I mean just once if you have a habit of getting addicted to everything new you get on the computer.
Its a good software overall. The Latest Version Is 4.1.3
Some Intresting Geek Quotes!!
#1. Roses are #FF0000, Violets are #0000FF. All my base Are belong to you — someone on SlashDot
#2. There is no place like 127.0.0.1
#3. Girls are like Internet Domain Names, the ones I like are already taken
#4. Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning
#5. Computers are incredibly fast, accurate, and stupid; humans are incredibly slow, inaccurate and brilliant; together they are powerful beyond imagination. — Albert Einstein
#6. There are 10 types of people in the world: Those who understand binary and those who don’t.
#7. If at first you don’t succeed, call it version 1.0
#8. 1f u c4n r34d th1s u r34lly n33d t0 g37 l41d
#9. I’m not anti-social; I’m just not user friendly
#10. I would love to change the world, but they won’t give me the source code
#11. My Software never has bugs. It just develops random features.
#12. The speed of sound is defined by the distance from door to computer divided by the time interval needed to close the media player and pull up your pants when your mom shouts “OH MY GOD WHAT ARE YOU DOING!!!
#13. The glass is neither half-full nor half-empty: it’s twice as big as it needs to be.
#14. Passwords are like underwear. You shouldn’t leave them out where people can see them. You should change them regularly. And you shouldn’t loan them out to strangers
#15. Enter any 11-digit prime number to continue…
#16. A Life? Cool! Where can I download one of those?
#17. I spent a minute looking at my own code by accident. I was thinking “What the hell is this guy doing?”
#18. Concept: On the keyboard of life, always keep one finger on the escape button.
#19. Alert! User Error. Please replace user and press any key to continue
#20. If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization. — Weinberg’s Second Law
#2. There is no place like 127.0.0.1
#3. Girls are like Internet Domain Names, the ones I like are already taken
#4. Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning
#5. Computers are incredibly fast, accurate, and stupid; humans are incredibly slow, inaccurate and brilliant; together they are powerful beyond imagination. — Albert Einstein
#6. There are 10 types of people in the world: Those who understand binary and those who don’t.
#7. If at first you don’t succeed, call it version 1.0
#8. 1f u c4n r34d th1s u r34lly n33d t0 g37 l41d
#9. I’m not anti-social; I’m just not user friendly
#10. I would love to change the world, but they won’t give me the source code
#11. My Software never has bugs. It just develops random features.
#12. The speed of sound is defined by the distance from door to computer divided by the time interval needed to close the media player and pull up your pants when your mom shouts “OH MY GOD WHAT ARE YOU DOING!!!
#13. The glass is neither half-full nor half-empty: it’s twice as big as it needs to be.
#14. Passwords are like underwear. You shouldn’t leave them out where people can see them. You should change them regularly. And you shouldn’t loan them out to strangers
#15. Enter any 11-digit prime number to continue…
#16. A Life? Cool! Where can I download one of those?
#17. I spent a minute looking at my own code by accident. I was thinking “What the hell is this guy doing?”
#18. Concept: On the keyboard of life, always keep one finger on the escape button.
#19. Alert! User Error. Please replace user and press any key to continue
#20. If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization. — Weinberg’s Second Law
New Google Chrome!
Now Google helps you Surf the Net.
Yes! Now it’s Google which has its own internet browser which is supposed to be extremely less resource oriented, which promises to deliver faster web surfing with good security, and also is very user friendly.
Its beautiful and simple, trust me, it’s true. Just like all other browsers it has its own features as well.
One of its really brilliant and useful tool is its address bar, if you have it you won't require any other search toolbars. Because, all you need to do is type in the address bar and get suggestion for both the available web pages and the search content through Google. Not only this, it also saves a list of search engines that you have recently used while browsing the internet. Search boxes for the ones you have recently used automatically appear on the page for easy access. You can search the websites directly from this pop-up. All you need to do is click on them and there you go.
One of the coolest things you can do in Google Chrome is playing around with its tabs which they call Dynamic Tabs. What you can do is just drag a tab outside the window and it opens up in a new window, or just drag all open windows in one window and they all appear as tabs in it. I know we all do manage our tabs and windows properly but it does help us at times or it’s just fun when your extremely bored and you have already tried all other resources to keep you excited.
You also get nine thumbnails of your most visited websites when you open the browser for the first time, that’s same thing like Opera. Another feature is the "Recently Closed Tabs", this saves the links of the tabs which you have recently closed, which you can open up in case you accidently close a tab. What they also have is the "Crash Control", and trust me this is really very helpful as if you have multiple tabs or windows open, and a particular web application crashes, there is no need to restart the browser, you can just close that tab or window. This is possible because every tab or window runs separately or rather independently, and that the trick.
There is one thing very controversial though; as Google says Chrome is very less resource oriented, and every tab runs individually shouldn’t it use more resources.
Google Chrome also offers you the "Incognito Browsing Mode", in this mode you’re browsing and downloading history is not logged. So now you know what you can use it for.
One thing that most may not like is that everything on Chrome is Google so you don’t get to search on other sites directly over the browser, also it’s an automatic system, so you might start hating it after some time, “After all, it’s my PC.” So that’s not much freedom on your own PC.
It’s really not much different and it won’t change much of your browsing experience, but that’s what happens in a beta version. So maybe, with the final release and some add-ons it might improve a lot.
As for now you can just try using it, and stick to it if you do like the experience. I personally don’t use it maybe I’ll think after using the final release
Yes! Now it’s Google which has its own internet browser which is supposed to be extremely less resource oriented, which promises to deliver faster web surfing with good security, and also is very user friendly.
Its beautiful and simple, trust me, it’s true. Just like all other browsers it has its own features as well.
One of its really brilliant and useful tool is its address bar, if you have it you won't require any other search toolbars. Because, all you need to do is type in the address bar and get suggestion for both the available web pages and the search content through Google. Not only this, it also saves a list of search engines that you have recently used while browsing the internet. Search boxes for the ones you have recently used automatically appear on the page for easy access. You can search the websites directly from this pop-up. All you need to do is click on them and there you go.
One of the coolest things you can do in Google Chrome is playing around with its tabs which they call Dynamic Tabs. What you can do is just drag a tab outside the window and it opens up in a new window, or just drag all open windows in one window and they all appear as tabs in it. I know we all do manage our tabs and windows properly but it does help us at times or it’s just fun when your extremely bored and you have already tried all other resources to keep you excited.
You also get nine thumbnails of your most visited websites when you open the browser for the first time, that’s same thing like Opera. Another feature is the "Recently Closed Tabs", this saves the links of the tabs which you have recently closed, which you can open up in case you accidently close a tab. What they also have is the "Crash Control", and trust me this is really very helpful as if you have multiple tabs or windows open, and a particular web application crashes, there is no need to restart the browser, you can just close that tab or window. This is possible because every tab or window runs separately or rather independently, and that the trick.
There is one thing very controversial though; as Google says Chrome is very less resource oriented, and every tab runs individually shouldn’t it use more resources.
Google Chrome also offers you the "Incognito Browsing Mode", in this mode you’re browsing and downloading history is not logged. So now you know what you can use it for.
One thing that most may not like is that everything on Chrome is Google so you don’t get to search on other sites directly over the browser, also it’s an automatic system, so you might start hating it after some time, “After all, it’s my PC.” So that’s not much freedom on your own PC.
It’s really not much different and it won’t change much of your browsing experience, but that’s what happens in a beta version. So maybe, with the final release and some add-ons it might improve a lot.
As for now you can just try using it, and stick to it if you do like the experience. I personally don’t use it maybe I’ll think after using the final release
Increasing Band-Width Speed By 20%
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc
To get it back:
cl!ck Start then Run and type " gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.
Double cl!ck on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.
To get it back:
cl!ck Start then Run and type " gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.
Double cl!ck on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.
How To Make Your Own Baby Food
Are you one of those who swear by the baby food available in the market, for feeding their little angles? Do you rush to market every few days, to buy that big pack of baby food? Now, we have the perfect homemade option for you, as far as baby food in concerned. Not only is it much more economical and fresh, but also puts you in control of what is going inside your baby. Want to know more? If yes, then go through the following lines and explore instructions on how to make your own baby food, listed just for you!
Homemade Baby Food Recipe
Supplies Needed
Steamer Basket, Stand Alone Steamer or Microwave Steamer
Blender, Food Mill or Food Processor
Ice Cube Trays
Plastic Wrap
Food Storage Containers or Plastic Ziplock Bags
Fruits and Vegetables
Instructions
First of all, you need to get fruits and vegetables from the local supermarket. The choice depends entirely upon you.
After getting fresh vegetables and fruits, remember to give them a thorough wash, so as to remove dirt and possible pesticides.
In the next step, you will have to remove any peels from the fruits and vegetables. Otherwise, you will have to strain them later on.
Now is the time to cook the fruits and/or vegetables. You can steam them or boil them, the choice is yours.
While cooking the fruits and/or vegetables, you will have to decide on their consistency. If your baby has just started eating solids, it would be advisable to let the food go mushy. In case he/she has been on solids for some months now, cook the food until it is easily pierced with a fork.
In the next step, you will have to puree the fruits and/or vegetables in a blender or food processor. You can also make use of a food mill for the purpose. Keep on blending the food until it reaches the right consistency, depending upon the eating stage of your child.
In case you didn't remove the peels from fruits and/or vegetables in the earlier step, this is time to strain the puree.
Thoroughly wash the ice-cube trays and spoon the pureed food into them. Now, cover the trays with plastic wrap and place in the freezer.
After the baby food has been frozen, in the form of cubes, it is the time to remove it from the tray and put the cubes in ziplock bags or some other food storage container.
When you place baby food cubes in the ziplock bag/ container, make sure to label it with the type of food therein as well as the date of its preparation.
Your homemade baby food is ready. Now, whenever you feel like feeding your child, take out some of the cubes from the ziplock bag/ container and allow them to thaw (or thaw in the microwave).
Some Tips
If your baby has just been introduced to solid foods, it is always advisable to give him/her only one fruit/ vegetable at a time, rather than a mix.
Keep the use of additives, such as salt and sugar, as less as possible. At the same time, avoid the preservatives altogether.
In case of certain fruits, such as kiwi fruit and bananas, you don't need to undertake the steaming process. Just peel, mash and serve.
Homemade Baby Food Recipe
Supplies Needed
Steamer Basket, Stand Alone Steamer or Microwave Steamer
Blender, Food Mill or Food Processor
Ice Cube Trays
Plastic Wrap
Food Storage Containers or Plastic Ziplock Bags
Fruits and Vegetables
Instructions
First of all, you need to get fruits and vegetables from the local supermarket. The choice depends entirely upon you.
After getting fresh vegetables and fruits, remember to give them a thorough wash, so as to remove dirt and possible pesticides.
In the next step, you will have to remove any peels from the fruits and vegetables. Otherwise, you will have to strain them later on.
Now is the time to cook the fruits and/or vegetables. You can steam them or boil them, the choice is yours.
While cooking the fruits and/or vegetables, you will have to decide on their consistency. If your baby has just started eating solids, it would be advisable to let the food go mushy. In case he/she has been on solids for some months now, cook the food until it is easily pierced with a fork.
In the next step, you will have to puree the fruits and/or vegetables in a blender or food processor. You can also make use of a food mill for the purpose. Keep on blending the food until it reaches the right consistency, depending upon the eating stage of your child.
In case you didn't remove the peels from fruits and/or vegetables in the earlier step, this is time to strain the puree.
Thoroughly wash the ice-cube trays and spoon the pureed food into them. Now, cover the trays with plastic wrap and place in the freezer.
After the baby food has been frozen, in the form of cubes, it is the time to remove it from the tray and put the cubes in ziplock bags or some other food storage container.
When you place baby food cubes in the ziplock bag/ container, make sure to label it with the type of food therein as well as the date of its preparation.
Your homemade baby food is ready. Now, whenever you feel like feeding your child, take out some of the cubes from the ziplock bag/ container and allow them to thaw (or thaw in the microwave).
Some Tips
If your baby has just been introduced to solid foods, it is always advisable to give him/her only one fruit/ vegetable at a time, rather than a mix.
Keep the use of additives, such as salt and sugar, as less as possible. At the same time, avoid the preservatives altogether.
In case of certain fruits, such as kiwi fruit and bananas, you don't need to undertake the steaming process. Just peel, mash and serve.
How To Purify Water
Our body is made up of 70% water and the need to maintain this ratio has been well proven with the fact that staying hydrated is the key to fight all diseases. While the world is looking forward for a better living, certain crucial and essential things have been taken for granted. One amongst them is the necessity for clean and purified water. Though industrialization is important, its one disadvantage - contaminating drinking water - is proving to be very costly. To fight this situation, you need to take the responsibility on your own and take efforts to purify the water before drinking. Now, are you wondering how to purify water? If yes, then read through the following lines to know the best ways for the same.
Best Ways Of Purifying Water At Home
Boiling
The best way to purify water would be to boil it. Take a well-cleaned container and pour the water in it. Set it on the gas for boiling. Keep on heating the water until the bubbles appear. Once the water has reached this stage, turn off the gas and allow it to cool.
Using Household Chlorine
Using a dish soap and water, clean the container in which you would store the water. Using an eye dropper, add liquid chlorine bleach to water, at the rate of 8 drops per gallon. Add 16 drops, if the water is too cloudy. Allow the water to stay for at least 30 minutes.
Using Iodine
Purifying water with iodine is found to be an effective way. For this, add 2% tincture of Iodine in the water i.e. 20 drops per gallon of water. Add 40 drops, if the water is cloudy. Stir the solution and allow it to stand for about 30 minutes.
Using Granular Calcium Hypochlorite
Dissolve a heaping tsp of high-test granular calcium hypochlorite in two gallons of water. Stir this water well, to make a disinfecting solution. Now, add a part of the above solution to 100 parts of water. This would purify the water.
Using Potassium Permanganate
Potassium permanganate is also quite effective in purifying water. For this, you need to addabout 3 or 4 crystals of the chemical compound per liter of water. Stir the solution well and leave it for about 30 minutes.
Solar Water Disinfection Method
Solar energy is found to be beneficial in purifying the water and disinfecting it. For this, you need to pourwater into clear plastic PET bottles and expose it to direct sunlight, for at least 6 hours.
Some Tips
Storing the purified water in clean containers is very crucial to maintain its purity.
For taste, aerate the purified water between two clean containers.
You can add a pinch of salt to sweeten the taste of purified water.
Best Ways Of Purifying Water At Home
Boiling
The best way to purify water would be to boil it. Take a well-cleaned container and pour the water in it. Set it on the gas for boiling. Keep on heating the water until the bubbles appear. Once the water has reached this stage, turn off the gas and allow it to cool.
Using Household Chlorine
Using a dish soap and water, clean the container in which you would store the water. Using an eye dropper, add liquid chlorine bleach to water, at the rate of 8 drops per gallon. Add 16 drops, if the water is too cloudy. Allow the water to stay for at least 30 minutes.
Using Iodine
Purifying water with iodine is found to be an effective way. For this, add 2% tincture of Iodine in the water i.e. 20 drops per gallon of water. Add 40 drops, if the water is cloudy. Stir the solution and allow it to stand for about 30 minutes.
Using Granular Calcium Hypochlorite
Dissolve a heaping tsp of high-test granular calcium hypochlorite in two gallons of water. Stir this water well, to make a disinfecting solution. Now, add a part of the above solution to 100 parts of water. This would purify the water.
Using Potassium Permanganate
Potassium permanganate is also quite effective in purifying water. For this, you need to addabout 3 or 4 crystals of the chemical compound per liter of water. Stir the solution well and leave it for about 30 minutes.
Solar Water Disinfection Method
Solar energy is found to be beneficial in purifying the water and disinfecting it. For this, you need to pourwater into clear plastic PET bottles and expose it to direct sunlight, for at least 6 hours.
Some Tips
Storing the purified water in clean containers is very crucial to maintain its purity.
For taste, aerate the purified water between two clean containers.
You can add a pinch of salt to sweeten the taste of purified water.
Different Types Of Roses
The alluring fragrance and beauty of rose makes it one of the most common flowers exchanged as a sign of love, affection and friendship. It is also much adored by home gardeners and florists alike. While you may be well acquainted with the most common types of roses, there might be many others, particularly the hybrid ones, which you may not have come across. Some of them are even too peculiar to be classified as roses. If you want to learn more about the different types of roses, go through the following lines.
Common Types Of Roses
Alba
Derived from Rosa arvensis, Alba is a white rose, which blossom only once in a year, during the spring season. It is believed that Romans brought this old garden rose to Great Britain. Its shrubs, with blossoms of white, feature gray-green foliage. 'Hite rose of York' and 'Alba Semiplena' are popular Alba varieties.
Damask
The binomial name of Damask rose is Rosa damascena. Damask is a rose hybrid, derived from a cross between Rosa gallica and Rosa moschata. It is one of the most common types of old garden rose, characterized by stems - armed with stout, curved thorns and stiff bristles. Discovered in 1254, Damask blooms once during the summer season.
China Rose
As the name suggests, China rose originates from the East Asian country - China. The flower was brought to Western Europe in the late 1700s. It blooms in summer and late autumn season. Characterized by small size and less fragrance, the flower has shrubs that are sensitive to cold. 'Mutabilis', also known as 'butterfly rose', is a common variety of China rose.
Bermuda Rose
A group of around a dozen roses was "found" to be grown in Bermuda, for over a century. The high resistance to plant diseases, fungal diseases and nematode damage makes Bermuda rose favorable to grow in tropical and sub-tropical regions. These roses are capable of flowering in hot and humid climatic conditions as well.
Bourbon
Native to Madagascar coast, Bourbon rose is characterized by a purple-tinted cane, with semi-climbing shrubs. It has been derived from a cross between Autumn Damask and the Old Bush China Rose. Bourbon rose is found in vibrant colors, like deep red, pink, blush and white. It has lush flowers and fragrance.
Noisette
A cross between China Rose's Parson's Pink and Rosa moschafa gave rise to Noisette rose. Its shrub blossoms from spring to fall and produces huge clusters of small pink roses. The flower originated in the United States, in the beginning of 19th century, as one of the first climbing roses. 'Blush Noisette' is an example of Noisette rose.
Gallica
Gallica rose originated in central Europe. Derived from Rosa Gallica, this type of rose is characterized by large patches of shrubbery, with prickles in the stem, and glandular bristles. The pinnate leaves contain 3-7 bluish-green leaflets. Gallica flowers are found in a cluster of four, each with five deep pink petals.
Centifolia
The globular-shaped flowers of Centifolia rose make it look like cabbage. Hence, it is also called cabbage rose. It was grown in Netherlands, in the 17th century. Derived from a cross between Damask and Alba rose, Centifolia rose is once-flowering. 'Paul Ricault' is an example of this type of rose.
Tea Rose
Tea rose has been derived from a cross between China rose, Noisette and Bourbon roses. As compared to the old garden roses, Tea rose is more tender. The flower can be found in the pastel shades, including yellow, pink and white. It is characterized by pointed tip petals, which tend to roll back at their edges. 'Lady Hillingdon' is an example of Tea rose.
Moss
Moss rose is a mutation of Centifolia rose and sometimes, Damask rose as well. A once-flowering rose, Moss is characterized by a pleasant balsam-like fragrance and excrescence on its stems and sepals. 'Alfred de Dalmas' is an example of this type of rose.
Portland Rose
Derived from a cross between Gallicas and Damasks, Portland rose has been named after the Duchness of Portland. The entire class of Portland rose was derived from 'Scarlet Four Seasons' rose, received by the Duchness in 1800. The plant of Portland rose is characterized by short size and shrubby appearance, with short flower stalks.
Canadian Hardy Rose
Morden Research Station in Manitoba and the Experimental Farm in Ottawa developed the Canadian Hardy rose. This type of rose was grown specially to withstand the extreme weather conditions prevalent during the chilly winters of Canada.
Hybrid Perpetual
Hybrid Perpetual rose has been derived largely from the Bourbon rose and blooms in spring. The flower was first found in 1838. With time, it became a popular garden and florist rose of northern Europe. 'Ferdinand Pichard' is an example of Hybrid Perpetual, which is available in white, pink and red colors.
Hybrid Tea
Derived by hybridizing Hybrid Perpetuals with Tea roses, in 1800s, Hybrid Tea rose is a popular modern garden rose. It is characterized by stiffly upright bushes and sparsely foliaged shrubs, with one flower per stem. The flowers have high-centered buds. Hybrid tea is hardier than Tea rose, but less strong than Hybrid Perpetuals. The flower is found in a number of vibrant colors, including deep yellow, apricot, copper, orange, true scarlet, yellow bicolors, lavender and gray.
Grandiflora
Characterized by large flowers, Grandiflora rose was derived from a cross between Hybrid Tea and Floribunda, in the 1900s. The flowers of Grandiflora are similar to Hybrid Tea rose, grouped into small clusters - with three to five flowers in each cluster. 'Montezuma' is an example of Grandiflora rose.
Hybrid Musk
Rev. Joseph Pemberton created Hybrid Musk, in the beginning of the 20th century. Hybrid musk is characterized by cluster of flowers, with a strong musk fragrance. Rose multiflora is the parent of the rose, with 'Buff Beauty' being its example.
Miniature Rose
Characterized by blooms in Hybrid Tea colors, Miniature roses are twiggy, with repeat-flowring shrubs. Their height ranges from 6" to 36". Many of its varieties also emulate the classic high-centered hybrid tea flower shape. 'Cupcake' is a modern miniature rose.
Floribunda
Floribunda has been derived by crossing Polyanthas with Hybrid Tea. It is characterized by the profusion of Polyanthas, with the beauty and color of Hybrid Tea. 'Gruss an Aachen', an example of Floribunda, was created in 1909. The shrubs of Floribunda are typically smaller and bushier as compared to the Hybrid Tea rose and less dense than Polyantha.
Common Types Of Roses
Alba
Derived from Rosa arvensis, Alba is a white rose, which blossom only once in a year, during the spring season. It is believed that Romans brought this old garden rose to Great Britain. Its shrubs, with blossoms of white, feature gray-green foliage. 'Hite rose of York' and 'Alba Semiplena' are popular Alba varieties.
Damask
The binomial name of Damask rose is Rosa damascena. Damask is a rose hybrid, derived from a cross between Rosa gallica and Rosa moschata. It is one of the most common types of old garden rose, characterized by stems - armed with stout, curved thorns and stiff bristles. Discovered in 1254, Damask blooms once during the summer season.
China Rose
As the name suggests, China rose originates from the East Asian country - China. The flower was brought to Western Europe in the late 1700s. It blooms in summer and late autumn season. Characterized by small size and less fragrance, the flower has shrubs that are sensitive to cold. 'Mutabilis', also known as 'butterfly rose', is a common variety of China rose.
Bermuda Rose
A group of around a dozen roses was "found" to be grown in Bermuda, for over a century. The high resistance to plant diseases, fungal diseases and nematode damage makes Bermuda rose favorable to grow in tropical and sub-tropical regions. These roses are capable of flowering in hot and humid climatic conditions as well.
Bourbon
Native to Madagascar coast, Bourbon rose is characterized by a purple-tinted cane, with semi-climbing shrubs. It has been derived from a cross between Autumn Damask and the Old Bush China Rose. Bourbon rose is found in vibrant colors, like deep red, pink, blush and white. It has lush flowers and fragrance.
Noisette
A cross between China Rose's Parson's Pink and Rosa moschafa gave rise to Noisette rose. Its shrub blossoms from spring to fall and produces huge clusters of small pink roses. The flower originated in the United States, in the beginning of 19th century, as one of the first climbing roses. 'Blush Noisette' is an example of Noisette rose.
Gallica
Gallica rose originated in central Europe. Derived from Rosa Gallica, this type of rose is characterized by large patches of shrubbery, with prickles in the stem, and glandular bristles. The pinnate leaves contain 3-7 bluish-green leaflets. Gallica flowers are found in a cluster of four, each with five deep pink petals.
Centifolia
The globular-shaped flowers of Centifolia rose make it look like cabbage. Hence, it is also called cabbage rose. It was grown in Netherlands, in the 17th century. Derived from a cross between Damask and Alba rose, Centifolia rose is once-flowering. 'Paul Ricault' is an example of this type of rose.
Tea Rose
Tea rose has been derived from a cross between China rose, Noisette and Bourbon roses. As compared to the old garden roses, Tea rose is more tender. The flower can be found in the pastel shades, including yellow, pink and white. It is characterized by pointed tip petals, which tend to roll back at their edges. 'Lady Hillingdon' is an example of Tea rose.
Moss
Moss rose is a mutation of Centifolia rose and sometimes, Damask rose as well. A once-flowering rose, Moss is characterized by a pleasant balsam-like fragrance and excrescence on its stems and sepals. 'Alfred de Dalmas' is an example of this type of rose.
Portland Rose
Derived from a cross between Gallicas and Damasks, Portland rose has been named after the Duchness of Portland. The entire class of Portland rose was derived from 'Scarlet Four Seasons' rose, received by the Duchness in 1800. The plant of Portland rose is characterized by short size and shrubby appearance, with short flower stalks.
Canadian Hardy Rose
Morden Research Station in Manitoba and the Experimental Farm in Ottawa developed the Canadian Hardy rose. This type of rose was grown specially to withstand the extreme weather conditions prevalent during the chilly winters of Canada.
Hybrid Perpetual
Hybrid Perpetual rose has been derived largely from the Bourbon rose and blooms in spring. The flower was first found in 1838. With time, it became a popular garden and florist rose of northern Europe. 'Ferdinand Pichard' is an example of Hybrid Perpetual, which is available in white, pink and red colors.
Hybrid Tea
Derived by hybridizing Hybrid Perpetuals with Tea roses, in 1800s, Hybrid Tea rose is a popular modern garden rose. It is characterized by stiffly upright bushes and sparsely foliaged shrubs, with one flower per stem. The flowers have high-centered buds. Hybrid tea is hardier than Tea rose, but less strong than Hybrid Perpetuals. The flower is found in a number of vibrant colors, including deep yellow, apricot, copper, orange, true scarlet, yellow bicolors, lavender and gray.
Grandiflora
Characterized by large flowers, Grandiflora rose was derived from a cross between Hybrid Tea and Floribunda, in the 1900s. The flowers of Grandiflora are similar to Hybrid Tea rose, grouped into small clusters - with three to five flowers in each cluster. 'Montezuma' is an example of Grandiflora rose.
Hybrid Musk
Rev. Joseph Pemberton created Hybrid Musk, in the beginning of the 20th century. Hybrid musk is characterized by cluster of flowers, with a strong musk fragrance. Rose multiflora is the parent of the rose, with 'Buff Beauty' being its example.
Miniature Rose
Characterized by blooms in Hybrid Tea colors, Miniature roses are twiggy, with repeat-flowring shrubs. Their height ranges from 6" to 36". Many of its varieties also emulate the classic high-centered hybrid tea flower shape. 'Cupcake' is a modern miniature rose.
Floribunda
Floribunda has been derived by crossing Polyanthas with Hybrid Tea. It is characterized by the profusion of Polyanthas, with the beauty and color of Hybrid Tea. 'Gruss an Aachen', an example of Floribunda, was created in 1909. The shrubs of Floribunda are typically smaller and bushier as compared to the Hybrid Tea rose and less dense than Polyantha.
Uses For Vinegar
What comes to your mind when you think of vinegar? Its use in salad dressing, as a cooking ingredient, for pickling and in home canning, isn’t it? If yes, then the various uses of vinegar mentioned below are sure to come as a surprise to you. Do you know that apart from the traditional uses, the utility of vinegar expands to various shores? Right from cleaning mechanical appliances to washing windows, walls and floors to being used in the laundry work, vinegar has been proven to be extremely effective and efficient in varied aspects. To know more about the various household uses for vinegar, read through the following lines.
Different Household Uses Of Vinegar
Vinegar helps in washing no-wax floors. Take half-gallon of warm water and add ½ cup of white distilled vinegar to it.
Rinse the floor with this solution.
Mix a tsp each of liquid detergent and white distilled vinegar in a pint of lukewarm water. Dip a towel in this mixture and rub onto the carpet stain, gently. This would help in removing non-oily stains from carpets.
Vinegar has proven to be efficient in cleaning windows. Mix equal parts of white distilled vinegar and warm water and wash the windows. This would surely make the glass panes gleam.
Painted walls, woodwork and Venetian blinds can be washed efficiently, using vinegar. Mix a cup of ammonia, ½ cup of white distilled or cider vinegar and ¼ cup of baking soda, in a gallon of warm water. Wash the walls with the above mixture.
Vinegar makes it easy to remove the persistent water or alcohol marks on wood. For this, mix equal parts of white distilled vinegar and olive oil and rub over the stained area.
Cleaning a coffee maker would no longer be a difficult task, as vinegar helps dissolve mineral deposits that collect in automatic drip coffee makers. For this, you need to fill the reservoir with white distilled vinegar and run it through a brewing cycle. Thereafter, make sure you rinse it thoroughly.
To clean a microwave, make a solution by mixing 1/4 cup of white distilled vinegar and 1 cup of water in the microwave. Put it in the microwave, in a bowl. Turn on the microwave for 1-2 minutes. It would help loosen the spilled food particles and even deodorize the microwave.
For deodorizing the kitchen drain, take a cup of white distilled vinegar and pour it down the drain once a week. After about half an hour, flush the drain with cold water.
Vinegar makes cleaning refrigerator an easy task. For this, mix equal parts water and white distilled vinegar. Clean the refrigerator using this mixture.
Utensils made from brass, copper and pewter will shine if cleaned with vinegar. For this, take a tsp of salt in a cup of white distilled vinegar and stir in some flour, until it forms a thin paste. Apply this paste on the metal items and keep it for 15 minutes. Thereafter, rinse them with clean water.
To get rid of ants, wash the counter tops, cabinets and floors with white distilled vinegar.
Fruit flies and gnat can be removed, using vinegar. For this, take a bowl and fill it with ½ quart water. In it, add 2 tbsp each of sugar and apple cider vinegar and a couple of drops of dish soap, to attract the fruit flies.
For removing streaks from a stainless steel appliance, take a soft cloth and dip it in vinegar. Rub the appliance with the damp cloth and find the streaks ebbing away.
To get rid of bathtub film, wipe the tub with white distilled vinegar and then with soda. Thereafter, wash the bathtub with clean water.
For killing unwanted grass on sidewalks and driveways, pour concentrated white distilled vinegar on it.
Killing weeds is also made easy with the help of vinegar. For this, just spray concentrated white distilled vinegar on tops of weeds.
Vinegar is useful in increasing soil acidity. Take a gallon of tap water and add a cup of vinegar to it. Now, use it to water the soil. The vinegar would release iron in the soil, for the plants to use.
To keep the pets free from pests, add a tsp of white distilled vinegar in each quart bowl of their drinking water. (One teaspoon in a quart is normally used for a forty-pound animal).
Different Household Uses Of Vinegar
Vinegar helps in washing no-wax floors. Take half-gallon of warm water and add ½ cup of white distilled vinegar to it.
Rinse the floor with this solution.
Mix a tsp each of liquid detergent and white distilled vinegar in a pint of lukewarm water. Dip a towel in this mixture and rub onto the carpet stain, gently. This would help in removing non-oily stains from carpets.
Vinegar has proven to be efficient in cleaning windows. Mix equal parts of white distilled vinegar and warm water and wash the windows. This would surely make the glass panes gleam.
Painted walls, woodwork and Venetian blinds can be washed efficiently, using vinegar. Mix a cup of ammonia, ½ cup of white distilled or cider vinegar and ¼ cup of baking soda, in a gallon of warm water. Wash the walls with the above mixture.
Vinegar makes it easy to remove the persistent water or alcohol marks on wood. For this, mix equal parts of white distilled vinegar and olive oil and rub over the stained area.
Cleaning a coffee maker would no longer be a difficult task, as vinegar helps dissolve mineral deposits that collect in automatic drip coffee makers. For this, you need to fill the reservoir with white distilled vinegar and run it through a brewing cycle. Thereafter, make sure you rinse it thoroughly.
To clean a microwave, make a solution by mixing 1/4 cup of white distilled vinegar and 1 cup of water in the microwave. Put it in the microwave, in a bowl. Turn on the microwave for 1-2 minutes. It would help loosen the spilled food particles and even deodorize the microwave.
For deodorizing the kitchen drain, take a cup of white distilled vinegar and pour it down the drain once a week. After about half an hour, flush the drain with cold water.
Vinegar makes cleaning refrigerator an easy task. For this, mix equal parts water and white distilled vinegar. Clean the refrigerator using this mixture.
Utensils made from brass, copper and pewter will shine if cleaned with vinegar. For this, take a tsp of salt in a cup of white distilled vinegar and stir in some flour, until it forms a thin paste. Apply this paste on the metal items and keep it for 15 minutes. Thereafter, rinse them with clean water.
To get rid of ants, wash the counter tops, cabinets and floors with white distilled vinegar.
Fruit flies and gnat can be removed, using vinegar. For this, take a bowl and fill it with ½ quart water. In it, add 2 tbsp each of sugar and apple cider vinegar and a couple of drops of dish soap, to attract the fruit flies.
For removing streaks from a stainless steel appliance, take a soft cloth and dip it in vinegar. Rub the appliance with the damp cloth and find the streaks ebbing away.
To get rid of bathtub film, wipe the tub with white distilled vinegar and then with soda. Thereafter, wash the bathtub with clean water.
For killing unwanted grass on sidewalks and driveways, pour concentrated white distilled vinegar on it.
Killing weeds is also made easy with the help of vinegar. For this, just spray concentrated white distilled vinegar on tops of weeds.
Vinegar is useful in increasing soil acidity. Take a gallon of tap water and add a cup of vinegar to it. Now, use it to water the soil. The vinegar would release iron in the soil, for the plants to use.
To keep the pets free from pests, add a tsp of white distilled vinegar in each quart bowl of their drinking water. (One teaspoon in a quart is normally used for a forty-pound animal).
Subscribe to:
Posts (Atom)