Posts

Showing posts from January, 2013

How to export Gmail contacts to Excel?

Image
Gmail allows us to export and import our contacts in csv format. CSV format is useful because it can be opened in Google Docs, Open Office and in MS Excel. The whole process of exporting gmail contacts to csv is pretty simple and it takes only three steps: 1.  Go to the Contact tab in your gmail account, 2.  Select a group of contacts or specific contacts, 3.  Click on  More – Export  to start extraction process. Choose option to export your gmail contacts to a csv file. Since csv files are supported by Excel, you can just click on the file and open it in Excel. If however, you come across any problems in opening it, you can solve them by importing csv file into Excel. Choose the  Data  tab and the  From Text  option, like you see in the picture. After this, the Text Import Wizard will appear. It will lead you through several steps, one of which is choosing the type of delimiter. Once you’re finished, you’ll have a list of gmail contacts in your Excel document.

Top 10 Windows apps of 2012

                   In 2011, we got a little crazy, recognizing the top 11 programs in Windows and Mac, as well as the top 11 programs in the top 11 software categories.                 In 2012, we return to Earth with a more classic list of the top 10 most downloaded software programs in our 10 most popular categories for Windows and Mac. The total download count for this distinction is based on the period from January 1, 2012 to December 14, 2012. Congratulations to all of this year's winners! Top 10 Windows Software Programs of 2012 1. Avast Free Antivirus                         59,609,689 2. AVG AntiVirus Free 2013                 53,460,154 3. CCleaner                                         24,434,867 4. Malwarebytes' Anti-Malware         22,410,671 5. YTD Video Downloader                 16,916,610 6. Advanced SystemCare                 14,579,023 7. WinRAR                                         14,281,620 8. Free YouTube Downloader                 13,26

Better Bridges Civil Engineers Test New Concrete for Stronger, More Durable Bridges

A new kind of concrete called Ductal will allow bridges to hold more weight and last longer. Made of a mixture of sand, cement, water, and small steel fibers, it is 10 times more expensive than traditional materials but also stronger and virtually impermeable, helping bridges become more durable. AMES, Iowa--Bridges take a beating, and it can really break the bank to repair them. Now, researchers are breaking bridges to learn how to build them better and save you money. Justin Doornink spends his mornings underneath bridges. He's an engineering student and, as part of his homework, he's installing sensors to measure the impact of traffic on the bridge. He's trying to figure out how to strengthen the structures. One option is ultra-high-performance concrete, which is made from sand, cement, water and small steel fibers. Brent Phares, a civil engineer and associate director at the Iowa State University Bridge Engineering Center in Ames, says, "It's much, much stronge

Protect Your Facebook, Gmail, Hotmail, Yahoo Accounts using Antilogger

Image
Today I am writing article on "How To Protect Your Computer, Facebook, Gmail, Hotmail, Yahoo Accounts From Hackers Using Zemana Antilogger". Zemana antilogger is a powerful way to protect your PC from malware, remote keyloggers and spyware programs that are widely spread all over the Internet. Zemana Antilogger is the No.1 privacy software that can protect your computer by blocking all the known and unknown Internet threats. Unlike most antivirus softwares, Zemana antilogger does not rely on the signature based and file scanning approach. Rather it makes use of a unique technology to detect and shut down the malware and spyware programs just before it can steal your identity or hurt your computer. Zemana AntiLogger eliminates threats from keyloggers, SSL banker trojans, spyware, and more.. Protect Your Computer, Facebook password,.... Today, hackers are constantly trying to intrude vulnerable systems with programs like keyloggers which are capable of recording each and every

phishing

The act of sending an  e-mail  to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a  Web site  where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user��s information. For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user��s account was about to be suspended unless he clicked on the provided  link  and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the  HTML   code , the scam counted on people being tricked into thinking they were actua

top Google tricks

Below is a list of our top ten Google tricks many people who use Google don't know about. Definitions Pull up the definition of the word by typing define followed by the word you want the definition for. For example, typing: define bravura would display the definition of that word. Local search Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants. Phone number lookup Enter a full phone number with area code to display the name and address associated with that phone number. Find weather and movies Type "weather" or "movies" followed by a zip code or city and state to display current weather conditions or movie theaters in your area. For example, typing weather 84101 gives you the current weather conditions for Salt Lake City, UT and the next four days. Typing movies 84101 would give you a link for show times for movies in that area. Tra

How to remove a Bluetooth device from My Computer In Window

Everytime you pair your computer with a bluetooth-enabled device or send a file to such a device, Windows Vista creates an icon for that device in the My Computer window. It can be nagging if you are the kind of guy who sends every other pics or mp3 with friends. Here is a how-to to remove it. 1) Open Control Panel from Start -> Control Panel. 2) Change the view to Classic View from the left hand side menu of the Control Panel. 3) Select Bluetooth Devices from the listing in the Control Panel. 4) This opens a new window with a list of all Bluetooth Devices that you have connected with so far. 5) Select the device that you wish to remove and right click on the icon. 6) Select remove from the menu. And then the icon on your My Computer is removed.