NAME

M.Waqas Chughtai    Like my page **IT WORLD** MOB:03344025232

Monday, 27 October 2014

Free PC voice control software. A speech program for downloading.


Free PC voice control software.
A speech program for downloading.


An easy software solution to enable you to control your computer, dictate emails and letters, and have the computer read documents back to you.

Screen Shot

10 Reasons for Trying
e-Speaking's Software

  1. Free Download of software
  2. Over 100 commands built-in
  3. Ability to add more commands
  4. Runs in Windows2000 and WindowsXP
  5. Small file size
  6. Utilizes latest technologies from Microsoft
  7. Seemlesly integrate with Office
  8. Voice commands of Mouse events
  9. Based on SAPI and .NET technologies
  10. Easy to Use



Now you can tell your computer what you want it to do. 








How Expensive is It?

It is Shareware. That means: You can download it and try it out for 30 days to see if you like it. The 30 day trial period is Free! That's right. You can download it with over 100 built-in commands and begin using it today at no cost. If you really like the program and want to use it beyond the first 30 days, the cost is $14.

What Is It?

Command and control your Window's computer through your voice. Operate your computer using a minimum of keystrokes or mouse clicks. If you want to move the cursor down one line, simply say: Down One. Want to check your emails? Simply say: Open Email. Add commands to open and control any Window's document or program.

Command and Control

Your computer has a brain. With a headset and microphone, you can now let your computer hear you, respond to your commands, and even speak to you to let you know what it has performed.

Microsoft

Microsoft has developed programming (called: SAPI) to interface your voice with specific actions and recognition by the computer. The e-Speaking product uses this new technology to create a small and efficient program to take your voice input and convert it into keyboard, mouse, system, and program events.

Grammatical Language Interface

The SAPI interface provides you the ability to interchange nouns and verbs in your speach commands. For example, you could create a command that responds to "Open this file", "Open my file", and "Open new file". Or you could create a command that responds to: "Close document" or "Document, close".

How Does It Work?

Utilizing Microsoft's Speech Application Program Interface (SAPI) and Microsoft's .NET Framework, we have developed a very small and efficient voice command and recognition application. SAPI and .NET are both required to use this software.

Dictation as Well?

Voice Dictation is integrated into the e-Speaking application including 26 different Dictation Voice Commands.

Why e-Speaking?

Our intent in developing this product was to suppliment your ability to command and control your computer through your voice. To enable you to have access to dictation software using Microsoft's SAPI speech engine. And to allow the computer to read documents and emails to you.

Users Guide?

Access the on-line user's guide.

What is Speech Recognition?


Speech Recognition is a technology that allows the computer to identify and understand words spoken by a person using a microphone or telephone. The ultimate goal of the technology is to be able to produce a system that can recognize with 100% accuracy all words that are spoken by any person.
Even after years of research in this area, the best speech recognition software applications still cannot recognize speech with 100% accuracy. Some applications are able to recognize over 90% of words when spoken under specific constraints regarding content and previous training to recognize the speaker's speech characteristics.
Computer software that understands your speech enables you to have conversations with the computer. These conversations would include you and the computer speaking as commands or in response to events, input, or other feedback.
Speaking is easier and more intuitive than selecting buttons and menu items. Human speech has evolved over many thousands of years to become an efficient method of sharing information and giving instructions.
Useful when accessing systems through pay telephones that do not have attached keyboards.


Advantages of Interacting With Computers Through Speech


  1. Hands Speech does not require use of physical devices such as keyboards or pointing devices. Computing devices can become more compact as keyboard and mouse pointing devices take a less prominent role. Individuals with physical challenges may also benefit from the use of speech based applications.
  2. Eyes Does not require the use of vision. Speech can be performed effectively in low light environments or by persons with low or no vision. Applications for this technology may include uses where the individual needs to keep their eyes on equipment or the environment if navigating a vehicle.
  3. History People have been speaking for thousands of years and individuals start speaking at a young age.
  4. Distance Speech systems can process speech from individuals that may be at some distance away from the computer.
  5. Smaller Wireless and handheld devices are becoming increasingly smaller with corresponding smaller displays and input keys. A voice interface is not constrained by the physical size of the device.

    What is Speech Recognition?


    Speech Recognition is a technology that allows the computer to identify and understand words spoken by a person using a microphone or telephone. The ultimate goal of the technology is to be able to produce a system that can recognize with 100% accuracy all words that are spoken by any person.
    Even after years of research in this area, the best speech recognition software applications still cannot recognize speech with 100% accuracy. Some applications are able to recognize over 90% of words when spoken under specific constraints regarding content and previous training to recognize the speaker's speech characteristics.
    Computer software that understands your speech enables you to have conversations with the computer. These conversations would include you and the computer speaking as commands or in response to events, input, or other feedback.
    Speaking is easier and more intuitive than selecting buttons and menu items. Human speech has evolved over many thousands of years to become an efficient method of sharing information and giving instructions.
    Useful when accessing systems through pay telephones that do not have attached keyboards.

DOWNLOAD -->LINK

Sunday, 26 October 2014

Internet Concepts: How Internet Works



Internet Concepts: How Internet Works
In 21st Century, Internet is become essential after food. Maybe, still many people will not agree with this statement now but once they start using internet they will be agree .

Well, you are reading this article so i hope you are already aware of ‘what internet is’.
Are you?
I know you will say ‘Yes i know what is internet’
But is it enough ?  Don’t you ever wonder how internet works? Maybe you already know how it works if you are IT student or teacher but still i think everyone should know this because internet is common and it is for everyone. So Its study should not be only for IT student.
So coming to the point, i written this article to let everyone aware about internet and its working with the help of website Howstuffworks.com. I hope you have enough time to read it patiently.
The greatest thing about the Internet is that nobody really owns it. It is a global collection of networks, both big and small connected together in many different ways to form the single entity that we know as the Internet. The name ‘Internet’ comes from this idea of interconnected networks
Since its beginning in 1969, the Internet has grown from four host computer systems to tens of millions.
However, just because nobody owns the Internet, it doesn’t mean it is not monitored and maintained in different ways.
The Internet Society, a non-profit group established in 1992, oversees the formation of the policies and protocols that define how we use and interact with the Internet.

How computer connects to internet.


Every computer that is connected to the Internet is part of a network, even the one in your home.
When you connect to your ISP (Internet service provider), you become part of their network. The ISP may then connect to a larger network and become part of their network.
The Internet is simply a network of networks.Most large communications companies have their own dedicated backbones connecting various regions. In each region, the company has a Point of Presence (POP).
The POP is a place for local users to access the company’s network, often through a local phone number or dedicated line. The amazing thing here is that there is no overall controlling network. Instead, there are several high-level networks connecting to each other through Network Access Points or NAPs.Exmple:
Imagine that Company A is a large ISP.
In each major city, Company A has a POP. the POP in each city is a rack full of modems that the ISP’s customers dial into. Company A use fiber optic (a cable) to communicate.
Imagine that Company B is a corporate ISP. Company B builds large buildings in major cities and corporations locate their Internet server machines in these buildings. Company B is such a large company that it runs its own fiber optic lines between its buildingsso that they are all interconnected.
In this arrangement, all of Company A’s customers can talk to each other, and all of Company B’s customers can talk to each other, but there is no way for Company A’s customers and Company B’s customers to intercommunicate.
The Function of an Internet Router (Message passing)Therefore, Company A and Company B both agree to connect to NAPs in various cities, and traffic between the two companies flows between the networks at the NAPs.
In the real Internet, dozens of large Internet providers interconnect at NAPs in various cities, and trillions of bytes of data flow between the individual networks at these points.
The Internet is a collection of huge corporate networks that agree to all intercommunicate with each other at the NAPs.
In this way, every computer on the Internet connects to every other.

How Message passes between computers

All of the networks rely on NAPs, backbones and routers to talk to each other.
What is incredible about this process is that a message can leave one computer and travel halfway across the world through several different networks and arrive at another computer in a fraction of a second!
The routers determine where to send information from one computer to another.
Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways.
A router has two separate, but related, jobs:
  • It ensures that information doesn’t go where it’s not needed.
  • It makes sure that information does make it to the intended destination.
In performing these two jobs, a router is extremely useful in dealing with two separate computer networks.It joins the two networks, passing information from one to the other. It also protects the networks from one another, preventing the traffic on one from unnecessarily spilling over to the other.
Regardless of how many networks are attached, the basic operation and function of the router remains the same.
Since the Internet is one huge network made up of tens of thousands of smaller networks, its use of routers is an absolute necessity.

Internet Backbone

Backbones are typically fiber optic trunk lines. The trunk line has multiple fiber optic cables combined together to increase the capacity.
Fiber optic cables are designated OC for optical carrier, such as OC-3, OC-12 or OC-48. An OC-3 line is capable of transmitting 155 Mbps while an OC-48 can transmit 2,488 Mbps (2.488 Gbps). Compare that to a typical 56K modem transmitting 56,000 bps and you see just how fast a modern backbone is.The National Science Foundation(NSF) created the first high-speed backbone in 1987. Called NSFNET, it was a T1 line that connected 170 smaller networks together and operated at 1.544 Mbps (million bits per second). IBM, MCI and Merit worked with NSF to create the backbone and developed a T3 (45 Mbps) backbone the following year.
Today there are many companies that operate their own high-capacity backbones, and all of them interconnect at various NAPs around the world.
In this way, everyone on the Internet, no matter where they are and what company they use, is able to talk to everyone else on the planet.
The entire Internet is a gigantic, sprawling agreement between companies to intercommunicate freely.

Internet Protocol: IP Addresses and Domain


Every machine on the Internet has a unique identifying number, called an IP Address.
The IP stands for Internet Protocol, which is the language that computers use to communicate over the Internet.
A protocol is the pre-defined way that someone who wants to use a service talks with that service. The “someone” could be a person, but more often it is a computer program like a Web browser.
To make it easier for us humans to remember, IP addresses are normally expressed in decimal format.E.g. 216.27.20.164.
But computers communicate in binaryform.
the four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers.
Since each of the eight positions can have two different states (1 or zero), the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between zero and 255.Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!
Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses.
For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts.
The octets serve a purpose other than simply separating the numbers.
They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need.
The octets are split into two sections: Net and Host.
The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
Host (sometimes referred to as Node) identifies the actual computer on the network.
The Host section always contains the last octet.
There are five IP classes plus certain special addresses.

DOMAIN NAME SYSTEM:


Its very complex to use and remember IP addresses of the computer you wanted to establish a link with.
For example, a typical IP address might be 216.27.20.164.
This was fine when there were only a few hosts out there, but it became unwieldy as more and more systems came online.
The first solution to the problem was a simple text file maintained by the Network Information Center that mapped names to IP addresses. Soon this text file became so large it was too cumbersome to manage.In 1983, the University of Wisconsin created the Domain Name System (DNS), which maps text names to IP addresses automatically.
This way you only need to remember www.technotification.com, Instead of How technotification.com’s IP address.
URL: Uniform Resource Locator
When you use the Web or send an e-mail message, you use a domain name to do it.
For example, the Uniform Resource Locator (URL) ” http://www.technotification.com” contains the domain name technotification.com.
Every time you use a domain name, you use the Internet’s DNS servers to translate the human-readable domain name into the machine-readable IP address.
Top-level domain names, also called first-level domain names, include .COM, .ORG, .NET,  .EDU and .GOV. Within every top-level domain there is a huge list of second-level domains. For example, in the .COM first-level domain there is:
  • Google
  • Yahoo
  • Microsoft
Every name in the .COM top-level domain must be unique.
The left-most word, like www, is the host name.
It specifies the name of a specific machine (with a specific IP address) in a domain.
A given domain can, potentially, contain millions of host names as long as they are all unique within that domain. DNS servers accept requests from programs and other name servers to convert domain names into IP addresses.
When a request comes in, the DNS server can do one of four things with it:
  1. It can answer the request with an IP address because it already knows the IP address for the requested domain.
  2. It can contact another DNS server and try to find the IP address for the name requested. It may have to do this multiple times.
  3. It can say, “I don’t know the IP address for the domain you requested, but here’s the IP address for a DNS server that knows more than I do.”
  4. It can return an error message because the requested domain name is invalid or does not exist.

How DNS, and URL works? (EXMPLE)

Let’s say that you type the URL www.technotification.com into your browser and than The browser contacts a DNS server to get the IP address.
A DNS server would start its search for an IP address by contacting one of theroot DNS servers. The root servers know the IP addresses for all of the DNS servers that handle the top-level domains (. COM, . NET, . ORG, etc.).
Your DNS server would ask the root for www.technotification.com, and the root would say, “I don’t know the IP address for www.technotification.com, but here’s the IP address for the .COM DNS server.”

Friday, 10 October 2014

Software removal tool

Remove software that affects Chrome

The Software Removal Tool is available for Windows users only.
If you notice Chrome behaving strangely (for example, showing you unusual startup pages, toolbars, or pop-up ads you can’t get rid of), it may be due to an unwanted program on your computer.
You may be able to fix the problem by downloading and running the Software Removal Tool. Think of this as a “factory reset” of Chrome. It restores Chrome's original settings and removes programs that affect its behavior.

Download -->LINK

Sunday, 2 February 2014

New Tricks of NotePad To Scare Your Friends

 New Tricks of NotePad To Scare Your Friends



1:Cycle a message in your friend’s computer.
Type :
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it as pc.bat and send it to your friends.
--------------------------------------------------------------------------------------------------
2:Make Keyboard Keys Type Continuously:

Type :
MsgBox “stop me..! if you can”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
------------------------------------------------------------------------------------------------------------

3:Convey your friend a message and shut down his/ her computer.

Type :
@echo off
msg * I don’t like you
shutdown -c “Hahahah You are Doomed” -s
Save it as pc.bat and send it to your friends.
------------------------------------------------------------------------------------------------------------

4:Toggle your friend’s Caps Lock button simultaneously

Type :
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as pc.vbs and send it to your friends.
Frustrate your friend by making their keyboard hit Enter simultaneously whenever they press a key :
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Save it as pc.vbs and send it to your friends.
------------------------------------------------------------------------------------------------------------

5:Hack your friend’s keyboard and make him type “You are a fool” simultaneously:

Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
Save it as pc.vbs and send it to your friends.
Open Notepad, slowly type anythingand freak your friends out:
Type :
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo “
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re “
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? “
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! “
Save it as pc.vbs and send it to your friends.
------------------------------------------------------------------------------------------------------------

6:Frustrate your friend by making their keyboard hit Backspace simultaneously whenever they press a key :

Type :
MsgBox “Let’s rock and roll”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
Open Notepad continuously in your friend’s computer:
Type :
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
Save it as pc.bat and send it.
------------------------------------------------------------------------------------------------------------

7:Continuously pop out your friend’s CD or DVD Drive.

Type :
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as pc.vbs and send it to your friends.
------------------------------------------------------------------------------------------------------------
8:Kebord LED Dancing Trick 

How to do that ?
 1. Open Notepad and copy below codes into it.
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop
     
2. Then save this file as led.vbs (.vbs is must)
3. Open your save file and see your keyboard led blinking like disco lights.
 How to disable blinking Led ?
       1. First open Task Manager [ctrl+alt+del ]
       2. Then Go to process tab.
       3. Select wscript.exe
       4. Click on End process.
 ------------------------------------------------------------------------------------------------------------

NOTE: It is only educational purpose 

Tuesday, 24 December 2013

If your Pen Drive is infected with any of the following viruses

If your Pen Drive is infected with any of the following viruses:


* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.
Actually this viruses are hidden and can't be seen even after you enable show hidden folders.Following simple dos command will change the attributes of these files ,there after you can remove it by pressing delete
key.

Follow these steps:
Step1.:Type cmd in Run
Step2.: Switch to the drive on which pen drive is connected
(like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter
(don't forget spaces).
Now you can see hidden virus files and you can delete them.

How to Hack Memory card password

How to Hack Memory card password


Hi friends!


To hack the password, follow these steps-



1> open C:\System by using any file explore (where 'C:\' is 

ur memcard drive letter)

2> rename 'mmcstore' as 'mmcstore.txt'

3> open that file. There you can see the password. 

Saturday, 21 December 2013

DriverPack Solution for Windows 8 / 7 / Vista / XP










 DriverPack Solution for Windows 8 / 7 / Vista / XP

DOWNLOAD FORM ------> LINK 1 




DOWNLOAD FORM ------> LINK2

DriverPack Solution is the most popular program that makes the job of finding and automatically installing drivers a pleasure.

DriverPack Solution simplifies the process of reinstalling Windows on any computer. No more problems with searching and installing drivers. Everything will be done in a couple of mouse clicks!

Automated driver installation

The program installs all required drivers to any computer in just about 5 minutes.

Saves Time and money

No more wasting time on looking for drivers; all required drivers will be installed with only a few clicks.

Any driver for any computer

All drivers on a single DVD!

Simplifies downloading new drivers from the Internet.

Drivers update capability

Updates previously installed drivers to their latest versions.

Windows 8 / 7 / Vista / XP

Supports all modern operating systems!

Both 64-bit and 32-bit versions!

Easy to use

Simple and foolproof interface.

Customization ability

Our program is open source software.

Distributed for FREE

Under the GNU GPL license.

 

 steps for Installing driver pack

 


1.launch driverpack solution.

 2. make just a couple of clicks!

 3.in 3 to 5 minutes all required drivers will be installed on your computer.









 Now program is ready

Program interface

make yourself familiar with the program 

(interface emulator)




















DOWNLOAD FORM ------> LINK 1 






DOWNLOAD FORM ------> LINK2


Monday, 9 December 2013

Those who are facing Fake Serial error in IDM can follow this post

Those who are facing Fake Serial error in IDM can follow this post :








Here is the latest IDM 6.18 + crack file which is working superbly. This version is much more faster than old versions.

STEPS TO USE :

1) At first download IDM 6.18 + Crack from this link ↓↓

http://cslovers.com/IDM%206.18%20+%20CRACK%20BY%20RAVI%20MISHRA.zip

2) After extracting, you will get 2 folders - Setup & Crack.

3) Remove previous versions of IDM and install this setup.

4) Now open crack folder and copy IDMan.bak, IDMan, IDMGrHlp, and IDMGrHlp.exe.BAK and paste all files in C:\Program Files \Internet Download Manager

Note : If popup comes, then select " COPY & REPLACE".

5) Now run reg file which is in Crack folder and click on Yes twice.

Done !! Its cracked now. Open IDM full feature with superb downloading speed.