How to remove CurlException in Facebook app

While developing a Facebook app I caught up with a problem – the ‘CurlException of Facebook app’. The reason why I quoted the phrase is because this is a very interesting exception that’s very much difficult to understand till one sees the exact error message.

Here is how the error message looks like,

remove curlexception in facebook app

The error doesn’t comes up every time an app is run. In most cases, it shows up once in a while. That’s what happened to me. The app sometimes ran fine while sometimes it didn’t.

Being an unknown problem, I looked at various sources and found that this is one of the common problems that developers face while building apps.

Why it occurs?

  1. Curl php extension must be installed in your web server. If this is absent you’ll see the exception.
  2. Next and probably the biggest reason could be the delay in loading your app. Usually an app should load/respond within 10 seconds otherwise the exception is thrown by Facebook’s php SDK.
  3. You can also see this exception when your curl functions are missing or working incorrectly. Facebook’s php SDK checks the presence of curl_init() and many other functions, and displays exception if they’re absent or working faultily.

Prevent exception from occurring

  1. If absent, install Curl library package to your php installation.
  2. Set the value of CURL_CONNECTTIMEOUT to 40-50 or more. This will allow your app to load within an extended time period. But you should know that this might run your app but this isn’t good from user perspective as they don’t like waiting such a long time for an app.

    alter curlexception timeout value remove curlexception from facebook app

  3. Another way is to keep your app lightweight. If you’re using JavaScript SDK then you’re loading an excess 170kb every-time your app runs. So avoid using the JavaScript SDK for HTTP POST/GET requests, rather use Ajax calls (in JavaScript or jQuery) for calling Graph API and FQL queries.
  4. And perhaps the best solution is to go for a better web server. Faster and responsive server makes sure your app files are loaded within time (10secs).

How to repair corrupt AVI videos

AVI is one of the best video compression format. It only takes a little damage to corrupt an AVI movie. Just a missing bit can ruin your movie experience, and suddenly you may find the picture breaks up at one point, or maybe the video will no longer play at all.

Today I’ll tell you about a simple solution called DivXRepair that will do all repair works regarding AVI files broken due to some missing bits or bad file sectors.

Click to enlarge

DivXRepair is a compact portable tool. There’s no need to worry about keyframes or other technicalities – the program will scan your video, skip any bad frames, and try to save everything else in a “fixed” version of the movie (the original will remain untouched).

Will it work? To know this I tried to mimic video files as damaged ones by removing data indexes to zeros and also tried with some bad broken AVI videos that I was having. And finally DivXRepair lived to its name and removed broken sectors and I was left with good AVI files that can be played


1.Download DivXRepair.(only 425KB)

2.Launch DivXRepair by double click to exe file.

3.Add one or more AVI files in the list using the Add File.

4.Click on Repair files

If undecodable and/or freezing frames are found, DivXRepair will cut off the bad parts and will save a new file in the same directory with the old file.

A complete report is generated and displayed after the operation is complete.

Sample report :

Bad Frame Report from DivxRepair
File Name: E:\repair\My avi 1.avi ; Total frames: 781
Total of 79 bad frames found.
Bad frames interval from 569 to 648
Repaired file: E:\repair\My avi 1.avi.REPAIR_OK.AVI
File Name: E:\repair\My avi 2.avi ; Total frames: 2343
Total of 237 bad frames found.
Bad frames interval from 569 to 648
Bad frames interval from 1350 to 1429
Bad frames interval from 2131 to 2210
Repaired file: E:\repair\My avi 2.avi.REPAIR_OK.AVI 

DivXRepair program is based on VirtualDub (version 1.4.2.x)  – mp3 –  VBR

DivXRepair cuts off the bad parts and re-assemble the avi file. (The bad parts of avi are undecodable frames / freezing frames) so its not necessary that your video files will be repaired for granted but it does its job most of the time and you should give it a try as its small (only 425 KB download), free of charge and does not require any installation .

Download: DivXRepair.

For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page; I will reply as soon as possible.


Leave a comment

How to setup, install and start WordPress blog on your web server

WordPress is the most preferred CMS for bulding a blog. If you loking to run one of your own, follow our stepwsie tutorial to get started.

Step1: Setup WordPress to web server

After purchasing a domain name and hosting space for the blog, you’ll have a username and password of your CPanel. Now do the following,

1. First download the latest version of WordPress from

2. Extract the downloaded WordPress files and see the ‘wordpress’ folder inside the extracted WordPress x.x.x folder.

extract wordpress files

3. Next reach your web server using an FTP program like FileZilla, by entering the given username and password.

4. Now drag the ‘wordpress’ folder from your system to server’s ‘www’ folder. By doing so you’ll upload all WordPress files to your web server. Uploading will take some time, so be a patient.

upload wordpress to web server using FTP

click to expand

5. Once the process completes, close FileZilla and login to your server ( using the same username and password.

6. Next step is to build your database. WordPress needs a database where all blogs and data will reside.

Step2: Creating database for WordPress

1. On cPanel, first click on ‘MySQL databases’.

setup wordpress blog-database and user creation

2. Create database with your desired name.

setup wordpress blog-create database

3. Add a user. Choose a strong password and remember it. We’ll need this in coming steps.

setup wordpress blog website-create user

4. And finally add user to the database.

setup wordpress blog-add user to database

5. While adding you’ll be asked for control that a user has over the database. Select ‘All Privileges’ to finish the step.

setup wordpress blog-give full permissions

6. Now its time to install WordPress and making required changes in few files.

Step3: Install WordPress

1. Once all the above mentioned steps are done. Open the ‘wordpress’ folder inside website’s root ‘www’ folder and rename the file ‘wp-config-sample.php’ to ‘wp-config.php’.

rename file to configure wordpress blog

2. Next open this ‘wp-config.php’ file and enter the database name, username and password that you provided while creating the database. [Here I have used different one so don’t get confused by it]

edit wp-config file to start wordpress website

click to enlarge

3. Next go to Enter required information when you see a page like this.

start wordpress installation

4. Click ‘Log In’ to finish the step. Your wordpress is successfully installed and is almost ready to use.

wordpress installed on web server

5. You’ll be then redirected to login page. Here you can login to your WordPress to post blogs. But we have last step remaining before our blog is ready.

Step4: Run WordPress blog

1. Basically all website files are hosted inside website’s root folder ie in ‘www’ folder [www>all-website-files]. But our wordpress files are located at www>wordpress>all-website-files. So we need to make some changes to inform the server about where our files are residing.

2. To do this, just copy [not move] the index.php file from www>wordpress folder to www folder.

copy index file to start wordpress

copy index file to start wordpress blog

3. Also open the file and make changes as shown below. [Replace . with wordpress as index.php is moved to a new location]

edit index file to finish wordpress installation

4. Once everything is done. Your website is ready to run. Just enter your website url and see it running.

Leave a comment

What Does Cloud Computing Exactly Means? Novice To Technical

With the advent of new technologies in last few years Cloud Computing has become a common term for most of the gadgets and softwares in 2012. We all are using cloud computing technology in one way or other through our mobiles,computers,servers,different softwares etc.but still most of us are unaware of the same.

People like to boast that they have got gadgets with cloud computing or synchronizing functionality without knowing what exactly cloud computing  means. Today I’ll tell you about cloud computing in a simple to average technical language so that you all can get to know the technology you are using in your daily life.


 ‘Cloud Computing’: Is it really related to clouds?

Cloud computing has nothing to do with clouds in the sky. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. This type of system allows employees to work remotely.

Why the name is  ‘Cloud Computing’?

Cloud computing is so named because the information being accessed is found in the “clouds”, and does not require a user to be in a specific place to gain access to it. Companies may find that cloud computing allows them to reduce the cost of information management, since they are not required to own their own servers and can use capacity leased from third parties. Additionally, the cloud-like structure allows companies to upgrade software more quickly.

How you are involved with cloud computing in your daily life:

  • Your PC and all of your mobile devices being in sync—all the time.
  • Being able to access all of your personal data at any given moment.
  • Having the ability to organize and mine data from any online source.
  • Being able to share that data—photos, movies, contacts, e-mail, documents, etc.—with your friends, family, and coworkers in an instant.

Whether you believe it or not but if you are using Gmail and Google Docs then you are already using cloud computing technology. In short all the information that is mobile, transferable, and instantly accessible is possible in today’s world through cloud computing.

The key feature of cloud computing in personal life is:

  • Ability to synchronize all our personal information with the cloud servers.
  • Retrieving the required information from cloud servers whenever and wherever we like 24×7.

i.e; having every piece of data you need for every aspect of your life at your fingertips and ready for use. Everything gets connected from your address book and music collection,movies to your reports and documents for work for your easy access to them round the clock around the world.

Just imagine the benifits-they are uncountable. Even if you forget anything important to carry with you  like your documents or password for unlocking any personal stuff,you can easily use cloud services from any system of the world to access them.

Watch this video to have a better understanding of Cloud computing.

Security: Are cloud computing services secure enough?

Working in a cloud environment is the latest IT fashion, though has its advantages such as, flexibility, efficiency, cost reduction and environment friendliness, it raises questions about its security dynamics.

Generally all cloud synchronization providers assure you that its secure to share your data with them and it won’t be accessible to anyone except you. Its true for your personal information but Cloud computing poses privacy concerns because the service provider at any point in time, may access the data that is on the cloud. They could accidentally or deliberately alter or even delete some info.

Although you may think now that its not good to use the synchronization facility for security of your private data but let me tell you that no one can access your data from cloud servers except the service provider. And I can assure you that well recognized service providers will never let your private data leak to anyone. So you can confidently use synchronization services for all your personal stuff with Google, Microsoft, Norton, Mozilla, Amazon or any other well known firm.

Click to enlarge


Characteristics of Cloud computing (with self-explanatory wiki links):

  • Agility improves with users’ ability to re-provision technological infrastructure resources.
  • Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. Cloud computing systems typically use REST-based APIs.
  • Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house). The e-FISCAL project’s state of the art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house.
  • Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.
  • Virtualization technology allows servers and storage devices to be shared and utilization be increased. Applications can be easily migrated from one physical server to another.
  • Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:
    • Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
    • Peak-load capacity increases (users need not engineer for highest possible load-levels)
    • Utilisation and efficiency improvements for systems that are often only 10–20% utilised.
  • Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
  • Scalability and Elasticity via dynamic (“on-demand”) provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads.
  • Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.
  • Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users’ desire to retain control over the infrastructure and avoid losing control of information security.
  • Maintenance of cloud computing applications is easier, because they do not need to be installed on each user’s computer and can be accessed from different places.

Cloud Computing Deployment Models:

Click to enlarge

 1.Public cloud: watch video

Public cloud applications, storage, and other resources are made available to the general public by a service provider. These services are free or offered on a pay-per-use model. Generally, public cloud service providers like Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered).

2.Community cloud: watch video

Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost savings potential of cloud computing are realized.

3.Hybrid cloud: watch video

Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models.

By utilizing “hybrid cloud” architecture, companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity. Hybrid Cloud architecture requires both on-premises resources and off-site (remote) server based cloud infrastructure.

Hybrid clouds lack the flexibility, security and certainty of in-house applications. Hybrid cloud provides the flexibility of in house applications with the fault tolerance and scalability of cloud based services.

4.Private cloud: watch video

Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.

They have attracted criticism because users “still have to buy, build, and manage them” and thus do not benefit from less hands-on management,essentially “the economic model that makes cloud computing such an intriguing concept”.

Cloud computing models: watch video


Cloud computing providers offer their services according to three fundamental models:

  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)
  • Software as a service (SaaS)

Where IaaS is the most basic and each higher model abstracts from the details of the lower models.

I hope now you have got enough knowledge and understanding as a general user about cloud computing and how it works.

For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page; I will reply as soon as possible.


Source: Wikipedia, Investopedia and other internet databases


Hide/Unhide your entire hard disk partition using CMD

We all are concerned about our privacy and the best way to perform any task in Windows is to run it through CMD prompt. Some people want to hide a disk partition for security and privacy while others may need to hide a disk drive (example: boot drive of 100 MB) just because it looks ugly. Today I’ll tell you how to hide/unhide your disk partition using CMD.

Click to enlarge

Steps for hiding a disk drive:

  1. Click on Start Button in taskbar and then goto Run.
  2. In Run type cmd
  3. Now type Diskpart in command prompt and press Enter key. (This will start your Diskpart session)
  4. Now type List volume (This will list all your volumes)
  5. Now you have to select a volume that you want to hide.(Example: Type select volume 3 and your volume 3 will be selected).
  6. Type Remove letter E (you should type your volume name instead of E).

By using these 6 steps you can hide your complete disk drive, no one can see or access the data of that drive.

Steps for unhiding a disk drive:

  1. Run the cmd and Now type Diskpart in command prompt and press Enter key. (This will start your Diskpart session)
  2. Now type List volume (This will list all your volumes)
  3. Now you have to select a volume that you want to unhide. (Example: Type select volume 3 and your volume 3 will be selected)
  4. Now Type assign letter E (You should type your volume name instead of E)Enjoy your security and privacy with this trick 🙂

1. Only administrator of the system can perform this trick to hide and unhide disk partitions.
2. Never hide your system drive (C drive) by this trick as it contains all the registry keys and may lead to problems.

For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page ;I will reply as soon as possible.

Leave a comment

What is Google drive, features, pricing and more

Google launched a new service called Google drive. Its much like Dropbox that allows you to share files – images, videos, documents and more with your buddies. Just drag and upload them to your Google drive account and access it from anywhere in the world, share with all or selected friends.

Share movies, softwares, presentations and everything that you can’t do through emails.

Google Drive features

Google-Drive by Google

  1. Create documents, files, spreadsheets and presentations. Its has Google Docs support.
  2. All images, videos uploaded on Google Drive are available on Google Plus. You can also hide them if you want.
  3. Upload videos and images to your Google drive account and send the link to your buddies to share.
  4. Provides powerful image search. It provides improved results categorizing images by files-types, owner and more.
  5. You can open more than 30 file types in a single Google drive window – HD video, Adobe Illustrator and Photoshop files even if you don’t have the supporting program installed in your computer.
  6. Use variety of apps like HelloFax to do different things with your Google drive files.
  7. Upload files and share it with selected friends. You can also keep it private f you want. Google drive provides full control over the uploaded data and how you want to share it.
  8. You can open discussions on shared files – presentations, documents in real time with your friends.

Google drive has lots more in offering, just visit the website to check Google drive features in detail.

Pricing of Google Drive

Initially a 5Gb free space is provided to every Google user. However, more space can be purchased. Here is the expected monthly pricing of Google drive beyond 5Gb mark,

  • 25 GB: $2.49
  • 100 GB: $4.99
  • 200 GB: $9.99
  • 400 GB: $19.99
  • 1 TB: $49.99
  • 2 TB: $99.99
  • 4 TB: $199.99
  • 8 TB: $399.99
  • 16 TB: $799.99

Its officially been released but users can’t access it instantly. They have to first apply for it.

Among the Google competitors in the market, we have DropBox, SugarSync, Mozy’s Stash, Apple’s iCloud, Adobe’s Creative Cloud, Yandex, and Microsoft’s SkyDrive. But Google Drive is expected to be stronger just because it collaborates its other services like Google Docs, Picasa, Gmail and Google Plus with it.


Ace Translator 9.4.6 with Text-to-Speech feature

Often we are using translation tools for our language assignments and learning purposes. Generally people like to settle down with free google translate service but most of the time its not handy and may give wrong translations.

Today I’ll tell you about a software called Ace Translator that can give translation results in its own U.I. within a few seconds.

Ace Translator uses the caliber of Internet machine language translation engines, and facilitates you to easily translate Web contents, letters, chat, and emails between major International languages.

Latest version 9 comes with 65 languages support and text-to-speech (TTS) support for 43 languages, which makes it an ideal language learning app as well.

Click to enlarge

Ace Translator supports translations between the following 65 languages. Languages marked with have TTS feature enabled.

  English       English language text-to-speech
 Latin     Latina       Latin language text-to-speech
 French     français       French language text-to-speech
 German     Deutsch       German language text-to-speech
 Italian     italiano       Italian language text-to-speech
 Dutch     Nederlands       Dutch language text-to-speech
 Portuguese     Português       Portuguese language text-to-speech
 Spanish     español       Spanish language text-to-speech
 Catalan     català       Catalan language text-to-speech
 Greek     Ελληνικά       Greek language text-to-speech
 Russian     русский       Russian language text-to-speech
 Chinese (Simplified)     中文(简体)       Chinese (Simplified) language text-to-speech
 Chinese (Traditional)     中文(繁體)       Chinese (Traditional) language text-to-speech
 Japanese     日本語       Japanese language text-to-speech
 Korean     한국어       Korean language text-to-speech
 Finnish     suomi       Finnish language text-to-speech
 Czech     česky       Czech language text-to-speech
 Danish     Dansk       Danish language text-to-speech
 Romanian     Română       Romanian language text-to-speech
 Bulgarian     български
 Croatian     hrvatski       Croatian language text-to-speech
 Urdu     اردو
 Tamil     தமிழ்       Tamil language text-to-speech
 Hindi     हिन्दी       Hindi language text-to-speech
 Gujarati     ગુજરાતી
 Kannada     ಕನ್ನಡ
 Telugu     తెలుగు
 Bengali     বাংলা
 Indonesian     Bahasa Indonesia       Indonesian language text-to-speech
 Latvian     latviešu       Latvian language text-to-speech
 Lithuanian     lietuvių
 Norwegian     norsk (bokmål)       Norwegian language text-to-speech
 Serbian     српски       Serbian language text-to-speech
 Ukrainian     українська
 Slovak     slovenčina       Slovak language text-to-speech
 Slovenian     slovenščina
 Swedish     svenska       Swedish language text-to-speech
 Polish     polski       Polish language text-to-speech
 Vietnamese     Tiếng Việt       Vietnamese language text-to-speech
 Arabic     العربية       Arabic language text-to-speech
 Hebrew     עברית
 Turkish     Türkçe       Turkish language text-to-speech
 Hungarian     magyar       Hungarian language text-to-speech
 Thai     ภาษาไทย       Thai language text-to-speech
 Albanian     Shqip       Albanian language text-to-speech
 Maltese     Malti
 Estonian     eesti
 Belarusian     Беларуская
 Icelandic     íslensku       Icelandic language text-to-speech
 Malay     Bahasa Malaysia
 Irish     Gaeilge
 Macedonian     македонски       Macedonian language text-to-speech
 Persian (Farsi)     فارسی
 Galician     galego
 Welsh     Cymraeg       Welsh language text-to-speech
 Yiddish     אידיש
 Afrikaans       Afrikaans language text-to-speech
 Swahili     Kiswahili       Swahili language text-to-speech
 Haitian Creole     Kreyòl Ayisyen       Haitian Creole language text-to-speech
 Armenian     հայերեն       Armenian language text-to-speech
 Azerbaijani     Azərbaycan dili
 Georgian     ქართულად
 Basque     Euskara
 Esperanto       Esperanto language text-to-speech

Note: At present I found that the text-to-speech (TTS) feature has a limit of 100 characters but according to developers they are soon going to remove this limit.

In my tests I found Ace Translator as a handy and fast translation tool that worked without any bugs. I recommend it to use for all language assignments and enthusiasts of language learning.

Download: Ace Translator – Version 9.4.6
Released on April 27 2012, Size: 2.1 MB

Ace Translator is free to try for 14 days thus, you have enough time to evaluate the product and complete your assignment works 🙂

For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page ;I will reply as soon as possible.

Leave a comment

Trick to use IDM longer without registration

IDM is one such software that you’ll love to pack with you while dying. Everybody loves it. But the sad point with this awesome software is that it’s a shareware, which means it’s available free for only 30 days and after that you need to purchase it.

use IDM longer without registration

We have a cool solution to use IDM longer than 30 days without registration. Its perfectly legal and is based on one feature of Windows OS called System Restore. All you need is to first install the software and when you have some 4-5 days left, restore your windows back by 20-25 days.

System restore feature in windows allows you to take your system with all files back to a specified date. So if have installed IDM on 1st April then you can use it till 30th. To extend it, you need to do a system restore on 25-26th April to any date after 1st April, say 3 or 4th. By doing so, your free use of IDM increases by 20+ days because system thinks you’ve used it only from 1st(ie the day of installation) till 3 or 4th (the date to restored).

Its just like erasing a young man’s memory and taking him back to his childhood. He would think himself as a 5-6 yr old kid rather than a grown up 25yr old adult.

IDM is one such deary piece that you wouldn’t mind doing system restore again and again. But restoring a system isn’t a good practice but doing it 8-10 times(max) is okay.

You’ll find option for System Restore in All Programs > Accessories > System Tools > System Restore. You can also search ‘System Restore’ from your Windows Search.

Some people download and use the crcked version of IDM but its very dangerous for computer. It can work fine for some days but it can also crash system beyond repair. So you better use the trick that we told you rather than killing your system using risky alternatives.

Leave a comment

Download Powerful Sonic PDF Creator 3.0 worth $50 for Free

Investintech is giving away full version of Sonic PDF creator which worth $50 for free.

Sonic PDF Creator is a versatile application to create secure and safe PDF files. Create professional looking and secure PDF documents from hundreds of Windows applications. A simple to use interface with value added features you’ll need, like batch conversion, watermarking, PDF merging and splitting & more.It is a professional software that is fully loaded with PDF creation and conversion tools.

Today I’ll tell you how to get this powerful PDF suite for free. Let me first explain its features to you

Click to enlarge

36 great features of Sonic PDF Creator 3.0:

  1. Create a blank one page PDF file and open it for editing with Sonic PDF Creator.
  2. Open an existing PDF file for editing.
  3. Open a PDF file from the file folder using the “open” or “open with” context menu.
  4. Dragging a PDF file and dropping it into the Sonic PDF Creator program window will open the file in Sonic PDF.
  5. Sonic PDF Creator supports opening and editing multiples PDF files at the same time.
  6. Edit and save PDF documents using Sonic PDF Creator.
  7. Create a new email using the active document as an attachment.
  8. Print your PDF document out on a printer before or after editing.
  9. Insert pages into the active PDF document.
  10. Delete selected pages from the active PDF document.
  11. For the selected PDF pages, rotate them 90, 180 or 270 degrees.
  12. Change the original paper size of the selected PDF pages in the active PDF document.
  13. Change the size of the PDF content in the active document.
  14. Crop pages by adjusting the margins of selected pages in the active PDF document.
  15. Add text or information, such as date, time, page numbers, bates number or the filename of the document, in the top or bottom margins of the active PDF document.
  16. Stamp text on the active PDF document.
  17. Stamp an image on the active PDF document.
  18. Overlap several PDF pages onto one PDF page.
  19. Create a new file or several new files using pages from the active PDF document.
  20. Merge multiple PDF files into a single PDF file.
  21. Attach a PDF file into the active document as an attachment.
  22. Add bookmarks to the PDF document.
  23. Re-arrange pages to make compact 2-up, double-sided booklets.
  24. Combine multiple PDF pages onto a single sheet.
  25. Set passwords on the active PDF document to protect the document from being opened or modified.
  26. Modify title, subject, author, and keywords for the active document.
  27. Enjoy one click PDF creation from your MS Office applications.
  28. Sonic PDF Creator has a unique user interface that lets you be sure what type of PDF documents you are creating, either regular or secure PDF.
  29. A variety of PDF compression options, including text and color images, to make your PDF documents extra compact for easy sharing.
  30. Add watermarks to your PDFs for branding purposes.
  31. Batch creation capabilities into PDF from a variety of formats, including Word, Excel, PowerPoint, RTF, HTML and a variety of image formats.
  32. Split by page – split the output PDF file into some files, 1 page per file.
  33. Stitch two adjacent PDF pages into one page.
  34. Font/Color and Display options.
  35. PDF to Text extraction capabilities.
  36. Create PDF from over 300 Windows applications, including the following:

How to get all these features for free in Sonic PDF Creator

  • Go to Investintech Facebook Fan Page from here.
  • Like the Page  to get the Download Code.(reload the page again if required)

    Click to enlarge

  • Now copy the Code and Click on the blue link appearing below the code.A new page appears with following option to paste your code.
  • Paste copied code in the text field and click on the Download button.That’s it,now you can have a $50 powerful PDF creator and viewer for free. Be quick to get this giveway offer as its free to download for limited period only. Enjoy 🙂

    For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page ;I will reply as soon as possible.


ESET Smart Security 5: Power,Performance and Security review

When it comes to ESET the first thing clicks on our mind is its light weight system impact and performance.ESET has a proven track record that illustrates its caliber to combat malwares. ESET Smart Security 5 integrates powerful antimalware scanner, a two-way firewall and intelligent antispam to effectively eliminate all types of security threats.


Click to enlarge

Its true that ESET possess a good track record and is followed by millions of users worldwide for cyber security but lets see how it performed in realtime system handling and performance tests.

In my test with 5600 virus sample ESET Smart Security 5 managed to clear 4861 viruses with detection rate of 89% and removal rate of 86.8% (while NIS 2012 scored 98.7%) which was a below average score. If we consider security lab test reports of ESS 5;it performed well in tests with Windows XP,Vista and 7. Most of the security labs report ESET in ‘good’ category. ESET is also the regular winner of VB 100 award for protection.(Scroll down for category-wise ratings).


ESET Live Grid ESET Live Grid (Cloud-powered Reputation)
Delivers optimized real-time protection against Internet threats and social media exploits.
Parental Control Parental Control  Watch video
Protects your family from potentially offensive web content by blocking various website categories.
Smart Detection Smart Detection
Advanced heuristic detection technology flags even never-before-seen malware protecting you from unknown threats and neutralizing them before they can do any harm.
Intelligent Firewall Intelligent Firewall 
New and improved firewall module prevents unauthorized users from accessing your computer and taking advantage of your personal data.
Improved Antispam Improved Antispam 
Tightly integrated into ESET Smart Security, the antispam module has undergone a thorough optimization for even higher level of filtering precision.

Enhanced Media Control Enhanced Media Control Watch video

Automatically scans all USB flash drives, memory cards and CDs/DVDs. Blocks removable media based on type of media, manufacturer, size and other attributes.

Advanced HIPS Functionality Advanced HIPS Functionality Now you can customize the behavior of the system in greater detail: specify rules for the system registry, active processes and programs, and fine-tune your security posture.
Gamer Mode Gamer Mode Watch video
Postpones all pop-up windows, updates or other system-intensive activities to conserve system resources for gaming or other full-screen activities.
Optimized Startup Procedure Optimized Startup Procedure
No more waiting for signature database download to complete – ESET Smart Security 5 lets you start working immediately after booting, without compromising your security.

Special Features:

  • Internet Security Training teaches you tips and techniques to make your online experience even safer.Watch video
  • Proactive Protection – ESET’s smart ThreatSense® technology offers multiple layers of protection with precise identification of even never-seen-before forms of malware.
  • Built for Speed – ESET Smart Security 5 is lightning fast and operates smoothly in the background, so you won’t even notice it’s there.
  • Easy on You – From its compact and intuitive user interface to its minimal use of alerts, you’ll be up and running in a snap without undue interruptions.
  • Seamless Updates – Security updates are discreetly sent to your computer, ensuring your defenses are always at their strongest.

Click to enlarge

Scanning: Scanning speed of ESS-5 is appreciable.Though first scanning requires your patience as it will take hours but further scans will be fast requiring only 10 minutes i.e; faster in comparison to other security suites scan time average of 18.9 minutes.

Resource usage during scanning were reasonable with 30-50% CPU usage and 1.7 GB RAM in my 2.1 GHz Core2Duo and 4 GB RAM platform.


Click to enlarge

Interface:ESS-5 comes with a improved interface for basic to advanced users but the ‘advanced setup’ interface still looks cluttered in comparison to other suites. Powerful security suites like Norton Internet Security 2012 and Kaspersky Internet Security 2012 are loaded with much advanced features and manage to look great with clean interface.

ESET seriously needs to improve their U.I. for advanced setup.

Click to enlarge

Quarantine & false positive management:Quarantine & false positive management in ESS-5 is not the easiest but good in comparison to other security suites. ESS-5 can be annoying at times by catching files that are safe.Configuring exceptions is difficult for novice users and it may betray you sometimes by catching customized exceptional files.

When compared to other security suites of 2012,I personally found Quarantine & false positive management much easier and better in NIS 2012.


Click to enlarge


Superior Performance:

ESET Smart Security 5 was placed #1 in performance tests run by PassMark Software beating nine internet security products and achieving the best overall performance in the selected performance metrics.

Although ESS-5 is a good internet security suite;it lags in some areas like:

  • Requires third-party assistance for complete malware removal .
  • Poor malware blocking.
  • Old style firewall defaults thus, no program control.
  • Limited parental control system.

Installation time was comparetively average to high-along with its virus definitions updates ESS-5 took about 10-15 min for getting all work done. Boot time was increased from 43 seconds to 55 seconds.

With all its features and efficiency ESET Internet Security-5 secured following ratings in my security test:

POWER: 7/10 (malware removal)
PROTECTION: 6/10(malware blocking)
PERFORMANCE: 9.5/10(system impact and slowdown)

Final Verdict: ESET Smart Security 5 though not best but is a good security suite. ESS-5 is good for keeping your system safe with zero to average performance impact. At the same time ESS-5 needs some powerful malware blocking and program features improvement where Norton Internet Security 2012 and Kaspersky Internet Security 2012 outperforms ESS-5. Thus,overall my first choice is Norton Internet Security 2012.

Download: ESET Smart Security 5 (Trial version)

For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page ;I will reply as soon as possible.

1 Comment

Why to choose Facebook apps wisely before using

You use an app and it magically tells your behavior. You try another app that predicts your marriage. Every other day you use one or the other app. More than 75 percent of Facebook apps are merely for fun. They are unreal and have little to do with reality. But while using such apps you give away lots of information about yourself which is a clear privacy threat.

Like most users, you probably don’t take it too seriously what information an app gathers from you.

User can grant and revoke permissions to a Facebook app.

You should know that very few apps take your profile name and basic information. Most grab big information, right from your friends list to your posted updates and comments. Not only this, apps can view all your activity on Facebook if you allow them. This includes shared photos, videos, likes, location and lots more.

They can save these information to their servers and use in any, right or the wrong manner. A app with 10000 per month users can sell the users email address and location information to online marketers and make big money.

All these activity might seem unlikely to happen but in fact, these things happen more often than not.

choose facebook apps wisely-1

A live example:

Mr. Naik, a Facebook user from Mumbai told us that some days back he started receiving promotional emails on his newly created id. When he inquired and discussed the matter with his friends then he came to know that some of his friends are facing the same issue. All of them used the same app, which had the permission to read email addresses. They immediately figured out the culprit, which is the Facebook app that they used. Such examples are common and happen too often with netizens.

Apps can also publish status updates and comments on your behalf. So its important to take note of the permission you grant before using an application.

choose facebook apps wisely-2

You should carefully read the permission that an app is asking from you before using it. Apps that asks for details like your email address, location, permission to read and make post on your behalf should not be used at all. Though, some apps allow you to opt out of certain permissions.

Personally, I prefer to use apps that takes little information, and never use the one that asks for my email address, or permission to read and write my Facebook posts.

These apps are third party service. They have little to do with Facebook and the social networking giant has less control over how these apps work and use the collected data. Though Facebook T&C for apps clearly prohibits existence of unsafe apps but its not possible for it to monitor each and every app running on its platform.

The Mantra: Choose apps wisely before using them. Most are crappy, so better don’t waste your time on such apps. Use only the most useful ones.

1 Comment

MOBILedit: The Ultimate PC Suite for all phones

Are you tired of installing different PC suites for different phones? Want a PC suite that can-
  • Manage your contacts, photos and music
  • Easy phone to phone copy and backups
  • Provide Internet storage for seamless synchronization
  • Works with nearly all phones

If yes….then MOBILedit! PC Suite is the perfect choice for you.

MOBILedit! allows you to control your phone from a PC. After installing MOBILedit! to any computer, you can connect your phone via cable, Bluetooth, or IrDA. You can view the entire contents of the phone where you can synchronize, add, edit, or delete anything you’d like.

When you receive SMS it arrives like an e-mail thus you can reply to your SMS more productively. You can even create a document that your mobile can read anytime. Thus,enhancing your simple phone to a capable document reader.

View the video about MOBILedit! and see how it works,

Click to enlarge

Phone Support

MOBILedit! supports the widest range of phones on the market. See complete supported model list here.

Beyond support for common mobile phone brands like HTC, Nokia, Sony Ericsson, Samsung, LG, and Motorola, MOBILedit! is also at the forefront of supporting many different smartphone operating systems including Android, iPhone, Blackberry, Symbian, and Windows Mobile.

Now no need to worry about connecting your friend’s,colleges phones to your system or any incompatibility issues-MOBILedit! will do everything you want-from data transfer to backup or other extra works like video conversion for phones. It’s really the ultimate PC suite for all phones.

Click to enlarge

Become a power networker by quickly sending messages. Never fear the loss of your phone. You can safely backup all its contents. When buying a new phone you can seamlessly transfer all of your information.

Main Features:

  • The only universal PC Studio with thousands of phones supported
  • Manage, improve and print a phonebook from the comfort of a computer
  • Copy phonebook from any phone to a new phone regardless of manufacturer or system
  • Backup all phone content to a PC or Internet cloud storage
  • Complete ringtone editor
  • Built-in video editor
  • Live view of phone and card memory, battery, signal, IMEI and more
  • Contact optimization and internationalization
  • Copy pictures and videos between phone and PC
  • Download, read, store and print text messages
  • Send text messages using PC keyboard
  • Install applications to the phone from a PC
  • And many more…

MOBILedit! is much more than just a PC suite for all phones available in the market;it only lacks GPRS/EDGE/3G internet connectivity feature other wise its much better than all other PC suites. Moreover its the only PC Suite that supports all mobile phones including all smartphones and different mobile OS.

Download: MOBILedit! PC Suite

For any queries and help related to my tricks and tips or related to computer hardwares/softwares please comment on our Facebook page ;I will reply as soon as possible.


Leave a comment