31 August 2009

Apple New iPod Touch

A friend gave me an Apple iPod Touch as a gift a couple of days ago. To this day, I have a "gift guilt" because I know I dont have something to give back to that person. The only thing I can do is just to thank that person for it and move on, but sometimes I just cannot help feeling guilty about receiving something. Have you ever felt weird about receiving an undesired, unexpected, generous gift? What did you do about it?

Well, anyway, I like the gift and it was one of the best gifts I got. For new users of an Apple iPod Touch like me, here is a guided tour for you.


28 August 2009

Encouraging Teamwork Among Students

It is sometimes very frustrating to give group activity to students especially when they dont like their team members.

The reason behind teamwork is to promote interaction, trust, enrichment and cooperation in a team that will usually lead to the accomplishment of goals.

Here is a video that might help teachers in helping students develop their leadership through working with their classmates.


26 August 2009

How to Know When to Stop Blogging?

I came across this site of Lorelle on Wordpress about blogging and I was stunned by these words, "Blogging isn’t for everyone, and everyone doesn’t need to blog. There are times when you should stop blogging, and there are times to take a rest from blogging".

I still consider myself new to blogosphere and I do believe in what she said that blogging isn’t for everyone and you don’t have to blog if you don’t want to.

So here are Lorelle's tips for "“how to know when not to blog”.

1. Stop blogging if you don’t have a purpose: Honestly, you don’t have to blog if you don’t want to, and if you don’t know what to blog about, don’t. If your blog has no purpose, stop blogging.

Your blogging purpose doesn’t have to be specific, but it does need to exist. A blog purpose is the reason you blog, the definition of your blog, and why your readers come back to read your blog. If you are blogging about your daily life’s activities and affairs, then that’s your purpose. If you are blogging about a specific industry such as online technology, space, transportation, or ice skating, that’s your blogging purpose. If you are blogging about a specific rare area of science, math, or research, you’ve found a purpose for blogging.

If you blog because it fulfills some deep inner need to express yourself, and it makes you happy and motivates you to get up in the morning, and that feeling lasts longer than 3 months, you’ve got a purpose for blogging. Keep blogging.

Vague, empty blogging just because it’s something to do, or because everyone else is doing it, is useless and a time waster. Stop blogging.

2. Stop blogging if you do not have the time: If your time is limited and you can’t find time to blog, don’t. You don’t have to post every day. You don’t have to post ten times a day. In fact, you don’t have to post more than once a week. Control your time and if you feel the time crunch, don’t blog.

3. Say “no” if you are already over-committed: Blogging isn’t for everyone and when you’ve got a lot of other things going on, stop blogging. If the withdrawal pain is too much, then you can restart blogging, and stop something else. But don’t start blogging when you can’t keep up with the rest of your life.

Stop blogging if you are over-committed on your blogging, too. You don’t have to blog every day. There are thousands of news bits and articles I’d love to write about on my blogs, but sometimes, I just have to “say no” when time is short and I’m running out of energy. Not everything has to be blogged about, so by choosing only the topics that really matter to me and to my audience, I’m blogging wisely and with purpose, not straining to get every ounce of information from every source published on my blog. Quality over quantity.

4. Don’t blog when you’ve run out of original things to say: If you find yourself blockquoting everyone else and not writing anything original, stop blogging. Find your own voice and say what you want to say. You can quote others and use their words to highlight your point of view and help your commentary, but don’t just blockquote and echo what everyone else is blogging about. Let your blog be you and your voice or stop blogging.

5. Don’t blog if you don’t have the temperament: Blogging is a fad for those who blog for short term or vague reasons. Blogging takes time, energy, commitment, discipline, organization skills, communication skills, and research and writing skills. Blog because you understand how it works and you enjoy blogging. It’s not for everyone. If you don’t have the temperament or personality for maintaining a blog, then don’t. Do something else.

6. Don’t blog when you are emotional: When something strikes at our soul and spirit, the natural tendency is to lash out. Stop. Don’t do it, and don’t do it on your blog. Go ahead and pummel your keyboard with your first thoughts and reactions but DO NOT PUBLISH IT. Save it and wait a while. Think or stop thinking about it. Come back in a few hours or days and then give it another look. Does it really say what you want it to say? Is it the truth or just a rant? Don’t blog when you are out of control with emotions. Take your time and make blogging a conscious decision.

7. Be careful blogging about topics “close to home”: This is a tough one. Much of blogging is about sharing your opinion and voice on a subject. But when that subject cuts too close to your spirit, your words may incite others or hurt you later.

Your words matter. What you say matters. Sometimes when the hurt is still too close, we tend to lash out or say things we regret later. Think through your blog writing and take care not to do more harm.

8. Be aware that there are certain stages in your life when blogging is not a good option for you: Once you start a blog, do you have to maintain it forever? Some do, but most people don’t. Your blog is a reference point in your life as you share your opinions and knowledge at this time in your life. Sometimes life will take priority over your blog and other times your blog will take priority over your life. Find a balance between the two, but if you can’t and you have to stop blogging, stop. You may not always blog, and you may not always blog about the same things, but go with the flow and know that not all blogs last forever and blogs evolve over time.

9. If you stop blogging, don’t burn your bridges: If you make the decision to stop blogging, don’t make a big deal about it. The more you publicize your quitting, the harder it will be to return if you choose. Don’t burn your blogging bridges. A note on your site that says you are taking a vacation or time out is fine. If it’s permanent, fine. If it isn’t, you can pick up where you left off, no harm done. Always leave your options open.

10. Don’t blog just because your friends blog: Again, just because everyone else is blogging, you don’t have to blog. If you do, do it because you want to blog. Do it because you have something to say and you love writing.

11. Don’t be bullied, coerced, or co-opted into blogging about a specific topic: You choose what you blog about. You don’t have to blog about something because everyone else is. You don’t have to blog about something because you are told to or challenged. Don’t let commenters or other bloggers pressure you into writing, commenting or responding to their comments if you don’t want to. There are a lot of mean spirited bloggers out there, many using flames and trolling to attract traffic to their sites. If you don’t want to play the game, don’t. It’s your choice.

12. Don’t blog about it unless you can prove it: Question your sources. Don’t blog about it unless you can prove it or stand by your claim, or be willing to ask forgiveness when proven wrong. Blogs are becoming sources for news, but not all blogs are reliable news sources. In fact, not all news sources are reliable. Check your sources before you make a claim to make sure what you claim on your blog is true. Don’t spread rumors and don’t tell lies. Verify when you can, and when you can’t, tell your audience of your doubts, or don’t share the information at all.

13. Stop blogging when there is no return on your investment: Just as with your investments, stop blogging when your investment in blogging gets little or no return. If it doesn’t “feel good”, you’ve run out of things to write, or it is consuming your time and energy away from “better” or more important things, stop blogging. If you are blogging to make money and expending more time and energy than the income you get from blogging, stop blogging. Find another way to make money. When what you put into blogging exceeds what you get out of it, stop.

14. Don’t risk your safety when blogging: Don’t steal other’s works. Don’t let others steal your work. Don’t spam or comment spam, and don’t encourage comment spam to exist. Do not blog about something that could get you arrested or worse, unless you are blogging to save the many and fully understand the risks. Take care when blogging against your employer or any other associates. Blogging can be dangerous as words can be used as weapons. Maintain your privacy, but also take care with your words.

15. Bored with blogging, stop blogging: If you are bored with blogging, or bored with what you are blogging about, or your blog writing bores you, it bores your readers. Stop blogging and find something else to do.

Remember, blogging is for everyone, but not everyone should be blogging.


Paying Attention

Since most of today's students can appropriately be labeled as "Digital Learners", why do so many teachers refuse to enter the digital age with their teaching practices?

This presentation was created in an effort to motivate teachers to more effectively use technology in their teaching.


Did You Know 2.0?

This is an amazing and powerful video!

An official update to the original "Shift Happens" video from Karl Fisch and Scott McLeod, this June 2007 update includes new and updated statistics, thought-provoking questions and a fresh design.


25 August 2009

Google Directory for Teachers

Teachers love Google because of its several online services that help them out when it comes to effective communication, file management and information dissemination.

Check out several tools and services that a Google Account can grant you access to:

1. Google Groups - allows group members to share files, post notes or comments, and discuss topics all via email. Students can store documents and organize web resources when working in teams. The group page can also help student organizations share news and announcements. On the other hand, teachers can post class handouts, reading materials, web links, and even email announcements to parents.

2. Google Earth – students can take virtual field and literary trips without leaving the four walls of the classroom.

3. Sketch Up – for quickly building and creating 3D drawings and models (like buildings and landmarks) which can also be placed on Google Earth

4. Picasa – makes embedding photos and slideshows into a webpage or blog easier. Students and parents can also share photos.

5. Google Desktop – an advanced search program that searches a topic not only on the web but also on the documents in your computer.

6. Google Docs – for project collaboration by sharing documents and other kinds of files.

7. Google Sites – for creating own web pages

8. Google Calendar - online calendars that can be shared and subscribed to.

9. Blogger – for creating blogs for the classroom (announcements, linkages, etc)

10. Knol – while this is still in beta phase, it is very promising. Experts can go into Knol and write an article on their topic of expertise. These articles can be available for other people to read and collaborate among each other.

11. Google Custom Search – another advanced search engine that only searches the websites you want.

12. Google Books – online books can now be viewed in full or preview mode in the classroom.

13. iGoogle – lets you customize your web page for easy access to all the websites you often use and check.

14. Google Reader – keeps you updated on RSS feeds

15. Google Educator – a site for educators and how to use Google applications in the classroom.

16. Even More Google – for more Google updates on new applications

Sample activities that can be done with Google Apps are:

1. A Place in Time with Google Tools [PDF, Podcast, Video] – a project plan for studying history and landmark historical photos

2. A Candidate Watch with Google Tools [PDF, Podcast, Video] - can be used for tracking presidential candidates with Google Earth, Docs, News Archives and Blogger

3. Spring Sojourn: A lesson in Civil Rights History and Geography [Website] – a multimedia project to document a class trip on civil rights

4. Postcards from the Past with Google Tools [PDF, Podcast, Video] – can use Google Earth and Google Pages to compare sites and how they look now and before.

5. Google Lit Trips [Website] – using Google Earth so students can see the places mentioned in books and other literary works

Source: Smart Tools


Google Docs and Google Apps

Google Docs and Google Apps have tremendous potential to be of great assistance in the classroom. Here is a short tutorial on how to navigate the two.

Google Docs

Google Docs can be used for everything from work to personal files. It enables one to upload documents, presentations, spreadsheets, and to collaborate with others on the uploaded files!

It can be used for group papers, wherein the students can all have access to the same draft from any computer with Internet access. Groups can add information, edit, tweak, embed, among others, all because of the convenience and ease of the Internet.

As a teacher, you can also check collaborations like the group paper to see who have been participating and those who are simply letting the others do the work. You can also collaborate with other teachers from other schools or even cities on projects, teams and ideas, and even create online surveys!

Here’s how to create documents in your Google Docs:

Create a Google account on Gmail or Blogger. Having an account with Google means you can also use other tools associated with Google.

Click on Google Documents, and click New to create a new document, spreadsheet, presentation or folder. This you can edit and share with students and teachers alike, depending on the project.

If you want to edit your document, you can make editing changes similar to Microsoft Word. You can change text, as well as put in pictures.

To share the documents you have, just click Share and input the email address of the person you want to collaborate with.

Save and exit.

When you just want to upload files, click on Upload and a window will appear to walk you through uploading the file.

Google Groups

Getting in touch with students outside the classroom has always been a bit hard. If they have questions, clarifications and last-minute instructions, then it usually happens the day they turn in assignments, not the day before.

With Google Groups, students can post messages, class discussions and questions in an open forum manner, making everyone else’s lives easier.

Here’s how to create a group:

Click on Create a Group from the Google Groups homepage.

Fill up the information regarding your group. Choose if it is going to be a public, announcement or public group.

Add members up by typing their email addresses.

Check the settings to make sure your preferences are covered on navigating the Discussions, Members page, etc.

If you want to start a discussion thread, do it like you would sending an email. Members can read the discussion topic (and corresponding comments) on their emails if they choose to be notified or from the homepage.

The best thing about Google Groups is that it is simple to set up and easy to use, making information dissemination to a lot of students, and even parents, easy. Online discussions and real-time editing can be a breeze, especially if students want to share research findings or compare notes.

Tools like Google Docs and Google Groups are paving the way for more effective and efficient communication, especially outside the classroom. So dive in the trend and see it for yourself.

Source: Smart Tools


22 August 2009

Job Openings at DEPED-CSCA

The Department of Education-Center for Students and Co-Curricular Affairs (DepED-CSCA) is now looking for full-time office staff and trainees.

For more information, click here.


Students Technologists and Entrepreneurs of the Philippines (STEP)

The STEP is a co-curricular organization of the Department of Education in the Edukasyon Pantahanan at Pangkabuhayan (EPP) , Technology and Livelihood (TLE) and Technical- Vocatioanal Education (TVE) which provides pupils and students with practical experiences, technical know-how and opportunities in home economics, agricultural technology, entrepreneurship and ICT integration while developing their leadership abilities and personal skills, and building wholesome character to strenghten national competitiveness and productivity.

With the STEP rallying banner "STEP: Upgrading Skills, Improving Lives", this year's edition of the skills development and competition shall feature new skills contest packages and job orders approved during the STEP Annual and Planning Conference, apart from STEP Awards and other activities.


19 August 2009

How to start windows programs quickly with Run Command

The run option of Start menu is used to run a program or to open a document directly. If you do not know the exact location of the program or document then click on Start button to open Run and type the programs shortcut name to open it directly.

Run Commands

appwiz.cpl -- Used to run Add/Remove wizard
Calc --Calculator
Cfgwiz32 --ISDN Configuration Wizard
Charmap --Character Map
Chkdisk --Repair damaged files
Cleanmgr --Cleans up hard drives
Clipbrd --Windows Clipboard viewer
Control --Displays Control Panel
Cmd --Opens a new Command Window
Control mouse --Used to control mouse properties
Dcomcnfg --DCOM user security
Debug --Assembly language programming tool
Defrag --Defragmentation tool
Drwatson --Records programs crash & snapshots
Dxdiag --DirectX Diagnostic Utility
Explorer --Windows Explorer

Fontview --Graphical font viewer
Fsmgmt.msc -- Used to open shared folders
Firewall.cpl -- Used to configure windows firewall
Ftp -ftp.exe program
Hostname --Returns Computer's name
Hdwwiz.cpl -- Used to run Add Hardware wizard
Ipconfig --Displays IP configuration for all network adapters
Logoff -- Used to logoff the computer
MMC --Microsoft Management Console
Msconfig --Configuration to edit startup files
Mstsc -- Used to access remote desktop
Mrc -- Malicious Software Removal Tool
Msinfo32 --Microsoft System Information Utility
Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP
Netstat --Displays all active network connections
Nslookup--Returns your local DNS server
Osk ---Used to access on screen keyboard
Perfmon.msc -- Used to configure the performance of Monitor.
Ping --Sends data to a specified host/IP
Powercfg.cpl -- Used to configure power option
Regedit --Registry Editor
Regwiz -- Registration wizard
Sfc /scannow -- System File Checker
Sndrec32 --Sound Recorder
Shutdown -- Used to shutdown the windows
Spider -- Used to open spider solitaire card game
Sfc / scannow -- Used to run system file checker utility.
Sndvol32 --Volume control for soundcard
Sysedit -- Edit system startup files
Taskmgr --Task manager
Telephon.cpl -- Used to configure modem options.
Telnet --Telnet program
Tracert --Traces and displays all paths required to reach an internet host
Winchat -- Used to chat with Microsoft
Wmplayer -- Used to run Windows Media player

Wab -- Used to open Windows address Book.
WinWord -- Used to open Microsoft word
Winipcfg --Displays IP configuration
Winver -- Used to check Windows Version
Wupdmgr --Takes you to Microsoft Windows Update
Write -- Used to open WordPad


17 August 2009

Amazing Language Facts

  • There are more than 2,700 languages in the world. In addition, there are more than 7,000 dialects. A dialect is a regional variety of a language that has a different pronunciation, vocabulary, or meaning.
  • The most difficult language to learn is Basque, which is spoken in northwestern Spain and southwestern France. It is not related to any other language in the world. It has an extremely complicated word structure and vocabulary.
  • All pilots on international flights identify themselves in English.
  • Somalia is the only African country in which the entire population speaks the same language, Somali.
  • The language in which a government conducts business is the official language of that country.
  • More than 1,000 different languages are spoken on the continent of Africa.
  • Many languages in Africa include a “click” sound that is pronounced at the same time as other sounds. You must learn these languages in childhood to do it properly.


How to increase your Laptop Battery's Life?

Laptop manufactures gives you the guarantee about the battery that how long it works. The battery of laptop always stops working very early at some stage in essential research, just like when you are watching a DVD movie.

Follow the few steps to increase the laptop battery's life:

Lower the backlighting on your screen.

The screen of your Laptop takes up significant amount of power and you do not require its maximum brightness. You should have to check your system and decrease the screen brightness it to a comfortable point.

Stop your wireless signal when you are not using.

After turning off your Laptop can save max. 20 minutes of your laptop's battery time because WiFi can use a considerable quantity of power. By right clicking you can stop your WiFi signal when you are not using.

Manage the correct power scheme in XP

Windows XP contain a number of predetermined power plans, which control settings like how rapidly your laptop turns off and when your screen saver boots in. You can change your laptop power scheme by choosing Control Panel > Power Options. For max. Battery life from the "Power scheme" chooses the option "Max. Battery" and decline the list. There are good choices for you just like "Low Power Mode" and Portable /Laptop. They don't conserve as much power as Max Battery. After selecting a power scheme you click Ok button to finish the process.


15 August 2009

How to login with multiple IDs at the same time in Yahoo Messenger?

If you have multiple yahoo IDs and wants to login with more than one yahoo ID at the same time then don't worry, you can login with more than one yahoo ID at the same time using this tip. There is no need to install any other yahoo multi messenger version, you can easily convert your normal yahoo messenger into multi messenger and enjoy your many ID's at the same time.

Follow the given steps to change the yahoo messenger registry value:

- Click Start button and type regedit in Run option then press Enter for next.

Here locate the location to:

Here in right side panel, right click to create a new Dword value with name Plural and give it value 1.

- Now close the registry editor and restart your computer after any changes to go into effect.

- For signing in with new YAHOO ID open another messenger open as many messengers you need.

- If you want to disable the multiple messenger option then again open registry editor and change Plural value 1 to 0.


How to restrict users to access shutdown button?

This tip is very interesting for home and some small office users, who wants to restrict users ability to shutdown their computer. You can hide the Shutdown button from the Start menu using registry editor and also restrict access to shutdown, if a user clicks on Ctrl+Alt+Del.

Follow the given steps to hide system shutdown button from start menu:

- To use this feature, you will need to be logged into your computer with administrative rights.

- Click Start button and type regedit in Run option then press Enter for next.

- Here locate the location to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer

- Here in right side panel, right click to create a new DWORD value with name NoClose.

- Now assign number 1 to its value data box.

- Now close the registry editor and restart your computer after any changes to go into effect.

- But next time, if you want to unhide the shutdown button then simply change the value data box to 0 or delete this DWORD item.

- Again close the registry editor and restart your computer after any changes to go into effect.


14 August 2009

Wedding Rituals

Most wedding traditions, like throwing rice and eating cake, started long ago. Here are some of the stories behind the rituals.

Bridal dress
-Wearing a new white dress to be used only for a wedding ceremony is a tradition that is only about 150 years old. Before that, few women could afford a dress they would wear only once.
-White traditionally symbolizes youth and innocence.
-Red and orange are popular in Asia and the Middle East, where they are considered joyful and festive colors.

- Using wheats and grains in the making of wedding cakes is an ancient symbol of fertility.
- In ancient Rome a thin loaf of bread was broken over the marrying couple's heads. The crumbs were saved and taken home by the guests as tokens of good luck.
- Tiered wedding cakes originated in old England, where the bride and groom kissed over a stack of little cakes.

- The canopy used in Jewish weddings is called a huppah. The couple and the rabbi stand under the cloth canopy during the wedding ceremony; it is a symbol of the couple's future home.

- Ancient Roman brides wore bunches of herbs under their veils as symbols of fidelity.
- Orange blossoms are symbols of happiness and fertility because the orange tree blooms and bears fruit at the same time.
- Roses are the flowers of love, making June, the month of roses, the most popular wedding month.
- The early Greeks believed ivy to be the sign of everlasting love. It is still used to trim wedding bouquets.

Flower girls
- Flower girls first appeared in wedding ceremonies in the Middle Ages. Two young girls—usually sisters—dressed alike, carried wheat before the bride in the procession. Later on, flowers replaced the wheat and it became customary for the flower girls to strew petals at the bride's feet.

Glass breaking
- At the end of a Jewish wedding ceremony a wine glass is covered with a white cloth and laid on the ground. The groom breaks it by stomping on it. This symbolizes the destruction of the ancient Jewish temple. It is a reminder of the seriousness of marriage and that it cannot be reversed.

- This first vacation taken by a newly married couple dates back to very early times when a groom wanted to hide the wife he had captured.
- The Teutons, an ancient German tribe, gave the honeymoon its name. After the wedding ceremony, honey was drunk until the moon waned.

Rice throwing
- Rice is a symbol of fertility and long life. Guests throw it at the bride and groom as a wish for children and a good life. Other good luck charms are confetti, orange blossoms, corn, barley, chickpeas, and dates and figs to sweeten the marriage.

- Engagement rings originated from the custom of exchanging rings to seal an important agreement.
- Rings are circular and without end to symbolize eternal love.
- A wedding ring is worn on the third finger of the left hand because it was believed that a vein or nerve ran directly from this finger to the heart.

- Roman brides wore veils 2,000 years ago. Veils were worn as a sign of modesty and secrecy and were removed only by the husband after the wedding ceremony.
- The first American woman to wear a wedding veil was Nelly Custis, Martha Washington's daughter. She wore the veil to please her husband-to-be, who had complimented her on how pretty she looked when seen through a lace-curtained window.
- In some Eastern countries a veil is placed between the man and woman throughout the wedding ceremony. This ensures that they cannot see or touch one another until after the marriage.


How to Recover Lost Bookmarks on Firefox?

You can export the bookmarks folder to a specific folder or location using import and export option in Firefox. If you are new computer user, first you should learn about the importance and need of backup, because without backup yon can lose your favorite websites list any time due to any virus, power failure and hard disk problem.

So, what happen if your Fierfox's bookmarks suddenly disappear? It is very frustrating and disappointing but don't worry, Firefox actually do this job for you to create automatic backup.

Follow the given steps to retrieve the lost bookmarks list:

Now go to your system C drive and navigate the following path "C:\Documents and Settings\your account name\Application Data\Mozilla\Firefox\Profiles\".

Under profiles folder, you will see a folder with random name, in our case this folder name is awrvfkuo.default.

Double click on awrvfkuo.default folder and you will see another folder with name "bookmarkbackups". Here is actual place where firefox store your bookmarks backup.

Now copy the all latest bookmarks detail and go up one level then past it.Here rename the file to "bookmarks.html" and now your bookmarks should be restored.


12 August 2009

Who am I by Casting Crowns


Sports Superstitions

We all hear popular superstitions when the 13th day of the month falls on a Friday. And no player wants to wear the number 13. It is said that superstitions have been a part of sports since their beginning. Players and fans alike have their ways of avoiding bad luck.

Some superstitions are stranger than others. For example, Michael Jordan (a graduate of North Carolina) always wore his blue North Carolina shorts under his Bulls uniform for good luck. Baseball pitcher Turk Wendell brushes his teeth and chews licorice between every inning. Wade Boggs eats only chicken the day of a game and draws a symbol that means “To Life” in the dirt before every at-bat. Former pitcher Mark “The Bird” Fidrych used to play with the dirt on the mound and talk to himself before every inning.

Here are some other common superstitions.
- Spitting into your hand before picking up the bat is said to bring good luck.
- A wad of gum stuck on a player's hat brings good luck.
- It is bad luck if a dog walks across the diamond before the first pitch.
- Some players believe it is good luck to step on one of the bases before running off the field at the end of an inning.
- It is bad luck to touch the baselines while running off and onto the field between innings.
- Lending a bat to a fellow player is a serious jinx.
- Some players actually sleep with their bat to break out of a hitting slump or stay in a groove.
- If a pitcher is throwing a perfect game or a no-hitter, never speak of it while it's going on.

- The last person to shoot a basket during the warm-up will have a good game.
- Wipe the soles of your sneakers for good luck.
- Bounce the ball before taking a foul shot for good luck.

- To continue a winning streak, wear the same clothes.
- The number 300, a perfect score, on your license plate will increase your score.
- Carry charms on your bowling bag, in your pockets, or around your neck for good luck.

- Fish may not bite if a barefoot woman passes you on the way to the dock.
- Spit on your bait before casting your rod to make fish bite.
- Throw back your first catch for good luck.
- It is bad luck to change rods while fishing.
- Don't tell anyone how many fish you've caught until you're done or you won't catch another.

- Double numbers on a player's uniform brings good luck.
- It's bad luck for a professional football player to take a new number when he is traded to another team.
- A mascot is an important good luck symbol.

- Start only with odd-numbered clubs.
- Balls with a number higher than 4 are bad luck.
- Carry coins in your pockets for good luck.

Ice Hockey
- It is bad luck for hockey sticks to lie crossed.
- It is bad luck to say “shutout” in the locker room before a game.
- Players believe they'll win the game if they tap the goalie on his shin pads before a game.

- Always put the right foot in the stirrup first.
- Avoid wearing the color yellow.
- Always shave before a competition (for men only!)

- It's bad luck to hold more than two balls at a time when serving.
- Avoid wearing the color yellow.
- Walk around the outside of the court when switching sides for good luck.


11 August 2009

How to Hide Drives and Partitions?

You can hide your system partitions or drives from other users. This tip is very useful if different type of users are using same computer then you can protect your important drives with this trick from any illegal action. You can use windows XP TweakUI utility or registry editor to hide drives. To work with windows XP TweakUI go to Run and type tweakui then press enter. A small TweakUI interface will open with options to uncheck drives that you want hidden. Click OK to finish it.

You can also use registry editor to edit the computer registry to turn off the display of drives, but be careful to work with computer registry.

Follow the given steps to hide computer drives:

- First click on Start button then type Regedit in Run option.

- Here locate the location to:
HKey_Current_User \ Software \ Microsoft \ Windows
\ Current Version \ Policies \ Explorer

- Here right click on right side of Registry editor panel and add new DWORD then put its value 3FFFFFF.

Now close the registry editor and restart your computer after any changes to go into effect.


10 August 2009

Fashion Hazards

Virginia Woolf once said, “It's clothes that wear us, and not we them.” As you will see, this can be downright dangerous.

- Throughout history, cosmetics made from mercury and lead disfigured faces and sometimes poisoned people to death.

- Hair dying, fashionable in ancient times, often resulted in total hair loss.

- When small feet were considered aristocratic and feminine, women squeezed their feet into the smallest possible shoes, causing the bones of their feet to become twisted and deformed.

- Tightly laced corsets made breathing and movement difficult.

- Hoop skirts made getting through a door difficult, getting into a carriage almost impossible, and, if the wearer sat down too fast, the hoop could fly up and break her nose.

- Layers of crinolines or hoops made falling down easy but getting up almost impossible.

- Wearing high heels has immobilized women and resulted in bunions, corns, twisted ankles, spinal deformities, and shortened calf muscles.

- The bustle of the 1900s, a rolled fabric attached to a woman's behind, made sitting down difficult.

- The hobble skirt of 1915 was so narrow below the knees that it made it difficult for women to walk


Top 10 Animated Films of All Time


07 August 2009

Dating Customs Around the World

These are some of the ways teens date in other countries of the world.


Dating is rare in Afghanistan because most marriages are arranged by parents, and schools are separate for boys and girls. The opportunities to meet are rare. Girls have a 7:00 P.M. curfew, while boys have an 11:00 P.M. curfew.


Most teens go out in large groups and don't pair off until they are 18 or 19 years old in Australia. Girls often ask out boys and pay for the date, too. Couples often go to dinner parties, barbecues, or the beach.

Central and South America

Dating is not allowed until the age of 15 here. When of age, most boys and girls date in large groups, going out together to weekend dance parties. When not dancing, teens gather at local clubs to eat and talk.


Dating is usually a group event in Europe. In Finland, as many as 30 teens may attend a movie together. Slumber parties are common in Italy and Switzerland, where teens gather for parties at a home and sleep there when the party is over.

In Spain teens join a pandilla, a club or a group of friends with the same interests, like cycling or hiking. Dating is done one-to-one and both girls and boys ask each other out and split the cost of the evening's entertainment.

In Russia dates take place at dances or at clubs where teens eat or chat with friends. In small towns, teens meet in the streets downtown or gather around a fountain.


It is against the law to date in Iran. Teens are separated until they are of marrying age, then their families introduce them to each other and sometimes a courtship follows.

Japan and Korea

In Japan and Korea, most high school students don't date or go to parties, but spend their time studying instead. Dating begins in college, when only boys do the asking and pay for the dates.


How to secure your password from hackers attacks?

There are some hacker’s breaks into your computer without using any impressive programming skills but trying to find words to guess as your password. Normally people use their name, house number, mobile number and word “password” as a password. If you have very simple password then a hacker can hack your computer very easily. To safe your computer from hackers there is a best way to create a tricky password. Here I will tell you some different type of tricks to make your password that can’t guess easily by any body.

Use the maximum characters in your password.

Always set the password using maximum characters length, because it is simple method, if your password is longer then it is very difficult to guess.

Use the combination of lower-case and upper case letters in your password.

Normally computer users use the lower case in password selection but it is best practice to use the combination of both (lower-case and upper case). So using different cases in your password makes it much more difficult to crack.

Use the combination of letters and numbers in your password.

When you mix both letters and numbers just like one letter and one number then your password is more incomprehensible.

Avoid using the name of your family members as password.

Always try to avoid the name of your child, spouse, city and country name as password, because if any body knows about your personal life’s details then they try to use these detail to guess your password.

Use any tools to create random password.

There are many third party tools are available to create the random password. You can create passwords containing a very difficult –to-guess collection of random characters with these tools.


What kind of attachments can contain viruses?

Basically, anything that is executable (able to run). You're generally safe with picture files, text files, and the like. However, it still pays to scan first.

Here is a very short list of the most common to watch out for:

Those are the most common; don't misinterpret this to mean that if you get one of these files it's automatically a virus. A ".zip" file may be nothing more than a set of compressed files your friend sent you to look at. A "doc" or "xls" file may simply be an MS Office file. It's just that these type of files could also be viruses.

A couple other virus tricks you need to be aware of. First, MS Office files can contain what are called "Macro Viruses". Without getting into too much detail, these files can run a "macro" (a macro is a mini-program run from within another program) that can be as destructive as any "regular" virus. So, my advice on MS Office attachments is not to open them unless you are expecting them. If they just show up, verify with the sender first.

The other trick you need to look out for is an extra extension added to an attached file. For example, you may have something like "mypicture.jpg.vbs". In fact, if you don't have your computer set to view file extensions, it may just look like "mypicture.jpg" and omit that last "vbs" part.

This may appear to be a jpg picture file, but it's actually a Visual Basic Script file. If executed, it will happily infect your computer with a virus.

So, be careful out there.


06 August 2009

Paalam President Corazon Aquino


04 August 2009

President Cory Aquino Tribute


03 August 2009

My New Asus Eee PC 1000

I travel a lot and I always bring with me my laptop anywhere I go. After 3 years, I finally gave up my old Laptop and gave it to my nephew, Jepoy. I bought one which would suit my needs- ASUS Eee PC 1000. The Eee PC 1000H I got has the following specs: 1GB RAM, Intel Atom N270 CPU, 160GB HDD, 1.3 MP webcam, 6-cell battery, and Windows XP OS.

Prior to buying the Eee PC 1000H, I was seriously considering several options such as the 10-inch Aspire One, MSI Wind U100, and HP 2140. Unfortunately the Aspire One and HP Mini 2140’s price tag was way above my budget. And while the MSI Wind U100 may have almost the same price tag as the Eee PC 1000H, my loyalty to the Eee PC won over the promise of perhaps faster performance with the MSI Wind.

The casing looks great ebony black with silver hinges, and the new improved Asus logo makes this a cool looking piece of equipment, and then you open the case and the first thing that you notice is the spaciousness of the keyboard, no need to worry about your fingers cramping up on this one it is an ideal size.

The Asus Eee PC1000 is a sleek piece of kit indeed, and at just 2lb 8ounces the weight of this machine will not weigh you down on your travels, it fits snugly into your bag or backpack you would hardly notice it was there.

Was I disappointed with my decision? Certainly not. I love the Eee PC 1000H – from its classy black looks to its dependably fast performance and most especially for its price. How do they say it? You get more bang for you buck?


Difference Between Intel core 2 duo vs Intel dual core vs Intel Pentium D

Many people are confused what exactly the difference between Intel Core 2 Duo and Between Intel Pentium D or Intel Dual Core processors…. I, myself, is confused too. I found the answer from chotocheeta.com.

I would try to explain from a END user point a view rather not going in to details architecture over view…

The Simple facts are,
All Core 2 Duo Processors are Dual Core Processors..
All Pentium D Processors are Dual Core Processors..
All Intel Dual Core Processors are Dual Core Processors

Pentium D is nothing but 2 Prescott Processors side by side… runs very hot, not a good OverClocker…
Intel Core 2 Duo processors are next gen processors from Intel on 65 nm platform… developed from Ground up with new Architecture called Core… so they are whole new Processors just Jump like Pentium 2 to Pentium 3 or Pentium 4… Expect one Core 2 Duo Lowest End Processors like E4400/E4300 taking up and beating Intel Pentium D 3.8 GHz ones with ease … runs damn cool and super over clocker…

Intel Dual Core Processors are just launched striped down version of Core 2 Duos.. there are 2 in Market for Desktop range, E2140 runs at 1.6 GHz with 1 MB L2 and 800 MHz FSB and E2160 with 1.8 GHz with same specs of E2140…. these are not Pentium D rather they are same batch like Core 2 Duo based on the new Core Technology…. they perform same like Core 2 Duos but they were launched with a very low price to counter the market of super low cost but high performer AMD X2 range line up to AMD X2 4000….



  © Free Blogger Templates 'Greenery' by Ourblogtemplates.com 2008

Back to TOP