Sunday

Top 10 best MCA colleges (universities) in India for admission

Top 10 best MCA colleges (universities) in India for admission
MCA (Master of Computer Applications) is best career option for those who missed the opportunity of Engineering degree. Any one who have taken Math at 10+2 level and passed in math at 10+2 are eligible for admission for MCA course in some Indian college or university After completion of graduation in any subject.
MCA is usually 3 year course. After getting MCA degree they can apply for same post as Computer engineering graduate for any software company. B.E. in computer science and MCA degree are technically equivalent. But generally salary and job for MCA passed out is slightly lower as compared to B.E in computer science.
All colleges or Universities in which MCA course is there, take admission in their own way.
There is no single one window exam for getting admission in any universities except All India MCA Common Entrance Test (AIMCET). By qualifying AIMCET you will be eligible for admission in some state colleges on quota basis.
You need to apply separately for each universities where you are interested in taking admission. University will conduct written entrance exam, some universities may also conduct GD and interview. Criteria for admission may vary for different universities. All admission procedure information will be available at admission brochures.
Keep good command in math for sure admission. Read all syllabus of MCA entrance test and prepare for it.
Here is the top 10 Universities for MCA with number of approximate seat.
1. Pune University - 60 seats
2. Delhi University - 40 seats
3. JNU., New Delhi -30 seats
4. NIT Trichy - 60 seats
5. MNNIT, Allahabad -30 seats
6. BHU, Varanasi -30 seats
7. IIT Roorkee- 30 seats
8. ICSE Indore - 60 seats
9. VJTI, Mumbai- 30 seats
10. Jalgaon University -30 seats
All the above are Gov universities, so fees is low. MCA at private collage is not of much value.

IF Dont Detect Your Flash Drive USB

There are several Solutions bro i would advice try serial wise here..

Solution 1

http://support.microsoft.com/kb/925196

Solution 2
Fix:
You can fix this issue by following some simple steps given below.

1. Click Start, click Run, type compmgmt.msc, and then click OK. 
2. In the console tree, click Disk Management. The DiskMAgnet  window will appear.



[AD]
3. On thisdisk magnet window, you can see some drives including the portable drive . Right click on your portable drive and click change drive letter and paths.
4. Now a assign a new drive letter which is not being used by any of your drives in My Computer.
5. After assigning the new drive letter your portable drive will show up in my computer with other drives
We hope the above solution will help to fix this trouble.


Solution 3


There is a simple solution for this in the case of windows.
Just do a "regedit" for StorageDevicePolicies key.
. Get into the Registry - Press Start -> Run, enter regedit, press Ok
. Click on My Computer. Then press File -> Export, give some file name to backup& registry. Just incase you ever need to rollback.
. Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/StorageDevicePolicies
. In the right pane select "writeprotect"
. RESET the value to '0'

About ANKIT FADIATM

    ANKIT FADIATM, 24 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 14 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 10 million copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions around the world.

Fadia is also a widely recognized computer security guru and Cyber terrorism expert. He has also led several investigations pertaining to national security and cyber terrorism. In November 2001, Fadia was consulted by a classified intelligence agency for breaking an encrypted message sent by one of Osama Bin Laden's men. Since then Fadia has been involved in numerous classified projects pertaining to cyber terrorism and crime. In August 2008, Fadia was consulted by the Navi Mumbai Police Department to trace the terror email sent just a few minutes before the Gujarat serial blasts. Fadia was also consulted by the Mumbai Police for decoding VOIP messages in relation to the Mumbai terror attacks.
Widely traveled, Fadia has provided customized cyber security training and consulting solutions to clients all across Asia, Australia and North America including Google, Citibank, Shell, Volvo, Thai Airways, UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro, Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd and many other organizations in the government, police and corporate sectors. He has also conducted more than a 1000 different training sessions across 25 countries on various topics related to cyber security to an audience comprising of CEOs, CIOs, top level management, entrepreneurs, technical specialists, defense personnel and students.
With the vision to create a more secure Internet, Fadia started a unique computer security training and certification course known as the ANKIT FADIATM Certified Ethical Hacker program. Today it has become Asia's largest cyber security training and certification program with almost 20,000 people trained in the last three years across 100+ cities in India and 40+ cities in China. To educate the average Internet user about the dangers of the Internet, Fadia also regularly writes Basic Security Tips which are displayed on OOH Media's 4500 screens in offices, shopping outlets and entertainment areas in over 22 cities in India. Fadia is also a consultant to many universities in India, Singapore, China and USA on the design and structure of their computer security courses. For example, Fadia has partnered with IMT Ghaziabad to start India's first government recognized postgraduate diploma course on Cyber Security.
Widely celebrated in international media publications, Fadia is also regularly invited by BBC Radio World News, London to share the latest updates on virus outbreaks, loopholes and cyber crime trends. For his outstanding contributions in the field of computer security globally, Fadia has been honored with numerous awards namely: MTV Youth Icon 2008, Indo-American Society Young Achiever Award 2005, IT Leader Award 2005, Person of The Year 2002, Limca Book of Records, Hall of Fame Award, Outstanding Young Achiever's Award, Silicon India Person of the Week, Embassy State Award, Best Speaker Award (4 occasions) and many more.
Born in India, Fadia is currently pursuing his Bachelors in Computer Science with specialization in Information Security at Stanford University, USA. Recently Fadia started his own computer security consulting and training company in Kuala Lumpur, Malaysia.

Hacking and Hackers

      Hacking and Hackers are terms that generally tend to build a negative impression in people's minds. Each time one hears either of these terms, the first thing that immediately comes to mind is the image of a computer criminal sitting in one corner of a dark room and committing a crime. In reality, that is not true at all! Most people straightway start associating the term Hackers with computer criminals or people who cause harm to systems, release viruses and so on. And I do not blame them for holding such a negative opinion. Unfortunately, one tends to blindly accept what is being fed to them by popular media. And nowadays the media has been wrongly and outrageously referring to computer criminals as Hackers. They fail to recognize the fact that computer criminals and hackers are two totally distinct terms and are not associated with each other whatsoever. People have wrong notions and for reasons not justified at all, they have a negative opinion and utter dislike for Hackers and persons associated with Hacking.
Recently, I started India's first computer security training and certification program to train the next generation of computer security experts. On more occasions than not, when people hear about the program I receive a nod of disgust and disapproval-probably because most people don't know what the course is all about and think that I am probably training people to be criminals! People fail to notice that the description of Hackers provided by popular media is nowhere close to the actual description of hackers. In reality, computer security has two types of people-hackers and crackers.
Hackers are actually good, pleasant and extremely intelligent people, who by using their knowledge in a constructive manner help organizations to secure documents and company secrets, help the government to protect national documents of strategic importance and even sometimes help justice to meet its ends by ferreting out electronic evidence. Rather, these are the people who help to keep computer criminals on the run. On the other hand, crackers are the real bad guys or the criminals who indulge in cyber crime, deface websites, release viruses, steal credit card numbers and create havoc on the Internet.
Traditionally and historically, humans have been utilizing harmful objects to protect themselves when the need arises. The invention of the nuclear technology or weapons as simple as knives immediately comes to mind. Training people hacking is something like in the medicine field-each time a new virus is discovered, weaker forms of the same virus are injected into the human body in order to provide immunity to the body against it. All of us already know that vaccines have helped us save millions of lives. But what strikes me most about vaccines is how they actually work. Vaccination is like fighting evil with evil for positive gains.
The biggest problem that NASA and its team of engineers face in their space missions is that of disposing human wastes and providing and storing pure drinking water for the crew aboard. A young biologist suggested, 'Human wastes be converted into pure drinking water by passing it through advanced chemical processes.' At first, his colleagues had been dismissive of this rather strange idea. However, later after some detailed and animated discussions, they concluded that using the negative non-useful elements to get something good and useful was their best bet. Similarly in the field of computer security, it is very important for take help from the crackers (computer criminals), educate the Internet users and secure the Internet.
When I first presented the idea of starting a training course on computer security to a few Indian government officials and expressed my support towards training hackers, the reaction that I received was one of profound disbelief and resentment. Their response argued that teaching people how to hack would only increase the incidence of computer crimes and bluntly stated that instead, more laws against hacking (well, actually cracking) should be introduced. However, in my opinion, all the laws in the world can not and will not discourage computer criminals. Crackers are getting real smart these days and it is becoming increasingly easier for them to break into a system (using freely downloadable automatic tools), create havoc and escape without leaving any traces behind. Laws are absolutely useless when system administrators themselves are becoming ignorant of computer security and are dismissing all hackers as people belonging to the dark side of society. It has become absolutely necessary to teach people how crackers work, how cracking is executed and how to protect computer systems from crackers. If this is not done soon, then the crackers will remain ahead in the security race. And we really don't want this to happen, do we?
If everybody who uses the Internet understood its risks, if everybody who uses the Internet understood how the computer criminals work, if everybody who uses the Internet understood the tools and techniques already known to the bad guys, then the Internet would be a much safer place to be in. Wouldn't Internet users be able to better protect their data and systems if they were more aware of how computer criminals work? If we are able to learn and understand how someone can break into our system, then wouldn't we fix the loopholes even before the cracker strikes? All I want to say is that instead of being resentful and afraid of fire, it would be much better if we learn to live with fire. Let us fight fire with fire itself! We manufacture knives every single day. A knife in the hands of a murderer can take lives, but the same knife in the hands of a surgeon can save lives! So just because there is a risk of a knife being misused by murderers, that does not mean that we should stop manufacturing knives.
Happy Hacking!
Ethically Yours,
Ankit Fadia
PS: Even I am a guilty of using the forces of popular media, the title of my course is testimonial to that fact-Ankit Fadia Certified ETHICAL Hacker course. If you can't beat them, simply join them!
(Ankit Fadia is author of internationally bestselling books on computer security. He offers computer security certification courses and even provides consulting solutions to Fortune 500 companies and government agencies.)

Wednesday

Download from FileFlyer when file is locked

When i try to download from file genarally my file is locked so i found a trick to download when file is locked....
.
.Here it is....
First fetch the file as u fetch in simple way...
.
.
If you see file is locked then....
use url up to "/" means....
.
.

http://hotfile.com/dl/33840926/f3123ff/backup.CDIndia72.part7.rar.html

..
use only up to /
.
.http://hotfile.com/dl/33840926/f3123ff/
.

Then the link generated after half link is unlocked......

Tuesday

Tutorials in making wap and website with some HTML



What is HTML? 

HTML is a language for describing web pages.
HTML stands for Hyper Text Markup Language
HTML is not a programming language, it is a markup language
A markup language is a set of markup tags
HTML uses markup tags to describe web pages
.
what is HTML TAGS?


HTML tags are keywords surrounded by angle brackets () like
HTML tags normally come in pairs like and
The first tag in a pair is the start tag, the second tag is the end tag
Start and end tags are also called opening tags and closing tags.

Below are SOME COMMON TAGS na ginagamit natin sa isang simple html page.


Defines the document's body 
Defines big text
bold text
underlined textitalic textDefines emphasized text

Download youtube video in AVI work on mobile



How to Download on pc: Check Page 4 with SS

These days no site is working for downloading youtube video on mobile.Lot of searching i found this amazing site which support many format like
AVI,3gp,flv,mp3,ogg,ACC,WMV,WMA
. it work with reliance back string trick and work on mobile with RESUME support.Here is the site:
http://www.clipconverter.cc
enjoy youtube downloading.

1. Fist open youtube.com

2. after finding your fevorite video open add bookmark

3. you can see this type of long url. you need to edit it.


After editing, you can see it as(delete all thing between watch? to v=). also remove m from m.youtube.com as this:


now follow step by step as ss shows. you may need to reload 3 to 4 times as shows in ss. you will be success....good luck.

Monday

480Mbps Speed with Samsung New Wireless USB Chips


    Samsung Electronics introduced its latest wireless universal serial bus (USB) solution, developed using Ultra Wide Band (UWB) technology. This solution capable of transmission speeds up to 480Mbps with an actual throughput rate of 200Mbps. The result is reportedly ten times more power efficient than 802.11g Wi-Fi. Offered in a two-chip set, Samsung's newest S3C2680/ S5M8311 WUSB solution enables high definition content to be wirelessly transmitted from a mobile host device to a tethered device for viewing.
Initial applications are high-resolution cameras, camcorders, TVs and PCs with prospects for adoption in other applications including tablet PCs, printers, beam projectors, portable HDDs, Blu-ray players, and mobile handsets. Samsung Electronics  is a worldwide leader in advanced semiconductor technology solutions. The product is made up of two chips, S3C2680, a baseband processor with an ARM 9 core, built-in NAND flash controller, SD I/O, and two USB 2.0 PHYs; and S5M8311a, a separate RF transciever.

The chips can be deployed in SD cards, USB dongles, or embedded directly into consumer electronics. Samsung says the solution is especially suited for digital cameras and HD camcorders for high throughput local content sharing. Samsung's S3C2680/S5M8311 WUSB chipset is now sampling to select customers. Mass production of the chips is expected to begin in the fourth quarter of 2010.
According to Mr. Yiwan Wong, vice president, System LSI marketing, Samsung Electronics, "The ability to handle wireless high-speed data transmission while consuming less power is a key requirement for many consumer electronic devices. Due to power/performance issues, previous generations of [Wireless USB] products were unable to meet the consumers' expectations. Samsung's new WUSB chipset delivers up to 480Mbps (Megabit per second) data transmission rate, at an average power consumption of less than 300mW. This level of power efficiency greatly increases the attractiveness of WUSB connectivity in consumer electronic and mobile applications."

Google Android Phone Secret Codes

    There're many hidden secret codes on your Android phone that can be used to accomplish certain tasks with more easy way. Those from some advanced to basic codes. Some of them do fairly basic, practical things, while others can be used to perform complete alterations, such as factory resets. Lest start from here: 

~The code *#*#4636#*#* shows the following information about your phone and battery:

    * Phone information
    * Battery information
    * Battery history
    * Usage statistics

~The
 *#*#7780#*#* performs a factory data reset, and will remove the following:

    * Google account settings stored in your phone
    * System and application data and settings
    * Downloaded applications

Nokia as Most Trusted Brand in India

Nokia, the mobile manufacturer from Finland, has been ranked No.1 in The Economic Times-Brand Equity's annual 'Most Trusted Brands' survey for 2010 in India, marking Nokia's recognition as India's most trusted brand for three consecutive years. Nokia has appeared in the survey since 2005, and has held the first position in 2008, 2009 and now, 2010.

Nokia's leadership rating over the years in this survey is also an indicator of the dramatic impact mobility has on India's consumers over the years.  India has been among the fastest growing telecom markets in the world with an estimated current mobile subscriber base in excess of 670 million subscribers.

"Nokia has always been a consumer-centric company and a consumer award for 'trust' is the pinnacle of all awards.  This award is a testament to our team's deep focus and determined efforts to better understand the needs of the evolving Indian consumer and connect with them. Our initiatives for India - ranging from 'made in India, made for India' handsets, services such as Nokia Life Tools and extensive retail and care networks - are a proof of the fact that we are continuously striving to make a positive impact on the lives of our consumers,"  said D. Shivakumar, Managing Director, Nokia India Pvt. Ltd.

The award marks the celebration of 15 years of mobility and Nokia in India. The first mobile phone call was made on a Nokia phone using Nokia network on July 31, 1995.

Brand Equity's 'Most Trusted Brands' survey judges 300 brands from consumer products and services. Consumers across 13 Indian cities evaluate the brand on seven key attributes.

Newest proxies 2010

websiterevert.com
easybig.info
todayfast.com
px4u.info
goodme.info
bestcome.info
supergood.info
bestalways.info
easyfor.info
todaygo.info 

Thursday

History Of Computer Virus : 1949


V.I.R.U.S - 
V= Vital

I= Information and 
R= Research 
U= Under
S= Siege. 
History


Academic work

The first academic work on the theory of computer viruses (although the term "computer virus" was not invented at that time) was done by John von Neumann in 1949 who held lectures at the University of Illinois about the "Theory and Organization of Complicated Automata". The work of von Neumann was later published as the "Theory of self-reproducing automata".In his essay von Neumann postulated that a computer program could reproduce.
In 1972 Veith Risak published his article "Selbstreproduzierende Automaten mit minimaler Informationsübertragung" (Self-reproducing automata with minimal information exchange).The article describes a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system.
In 1980 Jürgen Kraus wrote his diplom thesis "Selbstreproduktion bei Programmen" (Self-reproduction of programs) at the University of Dortmund.In his work Kraus postulated that computer programs can behave in a way similar to biological viruses.
In 1984 Fred Cohen from the University of Southern California wrote his paper "Computer Viruses - Theory and Experiments".it was the first paper to explicitly call a self-reproducing program a "virus"; a term introduced by his mentor Leonard Adleman.
An article that describes "useful virus functionalities" was published by J.B. Gunn under the title "Use of virus functions to provide a virtual APL interpreter under user control" in 1984.
Science Fiction

The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been programmed to randomly dial phone numbers until it hit a modem that is answered by another computer. It then attempted to program the answering computer with its own program, so that the second computer would also begin dialing random numbers, in search of yet another computer to program. The program is assumed to spread exponentially through susceptible computers.
The actual term 'virus' was first used in David Gerrold's 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmail the man who wants to turn him off.
Virus programs

The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s.Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971.Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
A program called "Elk Cloner" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality."
The first PC virus in the wild was a boot sector virus dubbed (c)Brain created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written[15]. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.
Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years.
Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's.

Within the "pirate scene" of hobbyists trading illicit copies of retail software, traders in a hurry to obtain the latest applications were easy targets for viruses.
Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected e-mail, those viruses which did take advantage of the Microsoft Outlook COM interface.
Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents".
A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.
Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo.

Reliacne GPRS Trick



First of all do a chota recharge for 10 rs on your Reliance prepaid Sim-card number.
After you recharged your account your balance may around 8 rs if you already had positive Rs balance.
Now subscribe 5rs daily plan by sending an sms as
M5 to 51234
.
Now you can use 50 MB till midnight.Rs.5 will be deducted on your account.

The trick of this plan is as follow:

Just deactivate the current 5rs plan by sending
unsub 2085


(code may be different for different states so follow the deactivation code sent by them on during activation message) and send it to
155223
.
What an awesome !!!Your five rupees has been refunded now,use this trick daily to enjoy free gprs on reliane.c

NOTE:You must send an deactivation message during before 11.59 PM (11PM-11.30 PM is recommended),or else you will be charged Rs.5.Now enjoy 100% working reliance free gprs.

the crediting process is required after 3 days to continue using of this trick
for credit for next 3 days, send cred to 51234 and enjoy."the msg is toll free"

UC 7.4.0.57-FINAL-ENG-FASTEST WEB BROWSER-ALL OPERATOR


UC Browser v7.4.0.57 Closed Beta 60v2 ENG Translated

Here is the much awaited UCWEB v7.4.057-27-10082511 Closed Beta Version ENGLISH
The second round of closed Beta:
Test focus: WAP2.0 analysis.
Functional development andoptimization :

1.WAP2.0 optimization, a
new analysis engine,
support more dazzling
effect.
2. Skins optimization, the
menu is more convenient to use.
3. To increase the default
setting to download call UC Thunder
4. Camera function optimization, support zoom function.
5. Input box Search Box
from the painting, more
convenient to input use (V5).
6. Search Results page
opens a new window.
7. Bookmarks interface,
interface and other UI
effects optimization history.
--------------------------------
Main bugfix :

1. To solve wap site lost
map problem arise.
Known Issues (Do not report
the following problems)
1.V5 click on input box and
search box will be flashed,
filling the system, the
proposed system for a light
color theme can be temporarily resolved.
2. Sina 3G version of the
upper-left corner of the
picture shows bad, is restoration.
3. Spacing wap site failure,post will do to improve.
4. Select the box to restore
the site to the real effect,
selected, only the box, and
other sites to show how the
definition of what.
5. Theme files and ucs video feeds will not call the Thunder download.
6. In the past saved UTHM
format, 7.4 can not open
properly.
7.V5 help documentation
errors, late replacement will do.
8. Part of the model home
problems would be fixed.
--------

This version need an your phone imei number for registration.
How to
register it?
Its simple.

1. Install Python 1.45 or higher and Zntxhan 2.04 or higher. 2. Run zntxhan and press menu (left softkey)>Start>Hexadecimal way (see screenshot). 3. Browse and open file UCWEB74.app in System>Apps>UcWeb74 4. After showing the Hex screen. press menu>Edit>Search>UTF-8 code. 4. On box Find Content fill it by typing "004400701690172" then press OK and wait for while. 5. After find result use (C) Key to delete the bloked content. 6. After deleted press Menu>Edit>Insert>Enter Your Imei number>OK. 7. Then press Menu>Save>OK or by pressing Right Softkey>Save modify>OK for saving. 8. After this step ok and working you can delete the original file (UcWeb74.app_.bak file).
Regards
;
ENGLISH VERSION]
Hi all,
Latest UC BROWSER with Low cost gprs (wap version) and Full GPRS Version.
Features:
1. Brand New Interface with Two Absolutely new and improved Themes.
2. Multi window browsing at once is support is improved.
3. Clipboard for easy copy and paste function is improved.
4. One more skin can be added in updated version.
5. Bookmark and search function is improved.
6. Download is extremly fast in this version. Download manager is improved.
7. Uploading function is improved. Now you can upload large files in your forum.
8. Page save, image save, find word in page, themes and lots more new functions added.
Download : wap.ucweb.com

Sri Krishna Jayanti ( Sept 2010 )

    Sri Krishna Jayanti ( Sept 2010 )

Govinda aala re...aala.. Govinda aala re...alla
       

  
 ]       
Related Posts with Thumbnails

Cpx


Internet blogs