Tuesday 30 April 2013

Skype Standalone Installer Free Download

Skype is a powerful medium to communicate with your beloved once no matter in any part of the video.It is powerful video calling messenger using Internet.It gives freedom to call any part of the world and offers many other premium services for free.
Skype not only works on Windows but also Mac , Linux and many other Operating systems.
You also can connect with your Facebook friends through Skype. See your Facebook newsfeed, update your status, comment and like direct from Skype.

Advantages of Skype Offline Installer:

  • With offline installer you can install skype even without internet connection.
  • This is the best way to install if you are trying to install the software on multiple computers.
  • If you have a slow internet connection then your installation may take long time.In such cases it is very much advised to go with offline installer.

Improvements made in Skype Latest Version:

They have made many improvements over the previous versions like Accessibility ,Tooltips , File sending , Localization ,Call Quality Guide etc.

Free Download Skype 6.3.0.105:

Download: Skype Windows Online Installer
Download: Skype EXE Offline Installer
Download: Skype 6.3.0.105 MSI Offline installer
Download: Skype for Windows 8
Download: Skype for Mac OS X v10.5.8
Download: Skype for Linux

Thursday 4 April 2013

Guide to Chkdsk in Windows 8

Chkdsk has been one of those great little tools built into just about every version of Windows that help fix NTFS file system errors, corruption in file system metadata, or hard disk errors. Before Windows Vista and Windows 7, chkdsk hadn’t changed much at all. In Windows Vista and 7, there were some significant speed improvements made to allow chkdsk to run faster, but chkdsk still depended on the number of files stored in a volume.

Because of that inherent design, it could take several hours for chkdsk to finish scanning a large drive with lots of files. Luckily in Windows 8, chkdsk has been completely revamped. What’s even better is that there have been several other additional features added to Windows 8 to catch and repair file system errors so that you may never have to run chkdsk again.

In this article, I’ll tell you about the changes to chkdsk in Windows 8 and the additional file system health tools that have been added. With Windows 8, a lot of errors will now be fixed automatically while running Windows that used to require running chkdsk after a reboot.

Windows 8 – Chkdsk and File System Health

First off, I immediately noticed the number of new options included with chkdsk on Windows 8 as opposed to Windows 7. Here is a screenshot of the list of parameters for chkdsk in Windows 7:

windows 7 chkdsk

Here are the list of parameters for chkdsk in Windows 8:

windows 8 chkdsk

As you can see after /B, there are about 6 more new parameters. I’ll go through those in more detail in just a bit. First, let’s go into detail about how the new health model works in Windows 8. To begin, you probably remember how a drive was marked as healthy or not (dirty). That’s not the case anymore. Now there is a whole set of stages or states for the health of the file system:

file system windows 8

Let’s go through these. First is Healthy. This means just that: the system is healthy and there are no issues. After that, there is something called Online Self-Healing, which is not shown as a stage, but occurs between Healthy and Spot Verification Needed. Online Self-Healing is a feature of NTFS introduced in Windows Vista that lets the file system fix itself while still online (meaning Windows can still be running). In Windows 8, the number of issues that can be self-healed has been increased.

After self-healing, a corruption needs to be verified. This is because some corruptions are memory-related and not actually disk-related. To detect this, Windows 8 has added a new service called Spot Verification Service. The service is only activated by the file system and it will verify if the corruption is actually disk corruption or not. If so, then we move to the next stage: Online Scan Needed.

Windows 8 has built-in maintenance tasks that run every day. Windows 8 will check these verified corruptions and log them into the system for later fixing. Again, this is all done while the system is online. The next stage is Spot Fix. This is where chkdsk in Windows 8 is completely different. Spot Fix is a new parameter that checks the disk and fixes any problems in just a few seconds. The time it takes to run chkdsk using spotfix is based on the number of corruptions instead of the number of files as in older versions of Windows. This means everything is fixed in seconds. Here’s a graph that shows the time using chkdsk /f vs the new chkdsk /spotfix.

faster chkdsk


As you can see, you can wait 6 hours running the chkdsk the old way or 2 seconds running it the new way! Awesome! Now to be clear, a spotfix means you need to restart the system in order to fix the problem. In Windows 8, there are two ways to manually run a chkdsk on your system. Firstly, you can go to Computer, click on the drive and then click on Properties.

drive properties

Click on Tools and then click on Check.

check disk

Most errors can be fixed without restarting, but if a spotfix is needed, you’ll be prompted to restart. Again, remember, it’ll only take seconds to fix though! The other way is the command prompt, which you saw before. The new options are:
- /scan - runs an online scan meaning it will fix whatever can be fixed without restarting.
- /forceofflinefix - has to be used with /scan and is basically the same thing as running /spotfix
- /perf - You can make the online scan even faster by using this parameter. It will eat up more resources and slow down other tasks.
- /spotfix - The new magical spot fixing feature of chkdsk that fixes errors in seconds rather than hours
- /offlinescanandfix – Will run an offline scan and fix
When you run /spotfix or /offlinescanandfix on the current used volume, you’ll be asked to schedule the scan the next time the system restarts.

scanandfix

You can check to see if a drive is scheduled to be scanned by typing in chkntfs c: or whatever the volume you want to check.

chkntfs

Overall, the new chkdsk in Windows 8 has some great improvements and the new file system health states make the detection, verification and repair of file corruption quick and easy.

HTTPS, SSL and the Green Address Bar

Have you ever been on a website and noticed that the address bar is green? If you visit a different site, it’s sometimes not green. And on some sites, the text is green and the name of the company pops up too in green. I started noticing this last weekend and wanted to figure out what all the different versions of green in the address meant.
Green address bar
As you can see from above, browsing four different sites gives me four different types of address bars, some green and some not. So what’s all that about? First, let’s understand a simple concept that will make understanding the different icons and colors very easy: secure vs. insecure content.

Secure vs Insecure Content

The first thing to understand is what secure and insecure content really mean. That’s where HTTPS and SSL come into play. SSL stands for Secure Socket Layer and it’s the underlying technology that the protocol HTTPS uses to secure HTTP content. In simplest terms, HTTPS is HTTP over SSL. HTTP is unencrypted HTML traffic between a client and a server.
That’s why when you visit a site like Online Tech Tips, you won’t see any green text or HTTPS in the address bar. All you see in the screenshot above is a white document icon. What does that mean? It just means that the website is not using SSL, which means the data is not encrypted.
So if you were to type any information into a form on my site, for example, that data would not be encrypted over the Internet and therefore could potentially be captured by a third party and read. In Google Chrome, if you click on the little document icon, you’ll get some detailed info like below:
Ott secure connection
There are two tabs that show up: Permissions and Connection. Let’s talk about the Connection tab. Here you will see that the identity of the website has not been verified. All that means is that I have not bought a security certificate for my website from a trusted certificate publisher like Verisign and therefore Online Tech Tips could be owned by anyone, including the Russians and you really can’t be sure. That’s why you should never type any sensitive information on a website that is not encrypted, which will be almost all blogs and regular websites.

The Green Address Bar

Now that you are understand why you don’t have green text in the address bar, let’s explain the different situations when we are working with a secure connection. First, let’s talk about a site that always has confused me until now: Gmail! When you first load Gmail, your address looks like this with a nice pretty green padlock icon and green HTTPS text.
Gmail secure
However, after a point, suddenly the icon would grey with a yellow triangle in the center:
Gmail not secure
So what’s up with that? This icon basically means that the website is using SSL with encryption, but some content on the page is insecure (not encrypted). So does this make the website unsafe? Not necessarily. In Gmail, for example, images that show up in emails are not secure and therefore not encrypted. That’s why you always have to click the “Always display images from…” link. The second you click that link, you will notice the green padlock icon change to the grey triangle one. So Gmail is still secure, but some of the content in that email is not secure.
Secure gmail images
The only time you should really worry is if you see a padlock with a red icon and a strikethrough on the HTTPS text.
high risk
This could mean a couple of things including the website’s security certificate being expired or other content like Javascript being insecure on the site. This is called high-risk insecure content. Images are not considered high-risk because there is usually no interaction with the user. However, if Javascript is insecure, users could be filling out forms and that data being transmitted insecurely.
So how do you know what content is insecure on a page? You can actually check that in Google Chrome. Click on the Settings icon at the top right, then click on ToolsDeveloper Tools.
Developer tools
Once there, click on the Console tab and you’ll get a list of all the warnings or errors like shown below.
Insecure content
As you can see from above, the email from AA has a bunch of images that I’ve decided to display and those are insecure. In the Console, you can see the actual specific images that are causing the page to be insecure. This is a nice way to see if something important is insecure or if it’s just images and that sort of thing.
Lastly, on some sites you see the green text and the name of the company in green also like in the first screenshot when logged into my Apple account online. There is no difference in the level of encryption or security, it’s just a visual indicator of trust.
Companies can apply for Extended Validation certificates, which basically cost more money and make the company verify more information about the website and themselves. The name of the company or website is on the certificate and therefore it shows up in a fancy green box to the left of the HTTPS text.
If you click on the padlock here, you’ll see a lot more security information than in the same screenshot above for my website:
Apple cerfiticate
As you can see, Apple Inc. has been verified by a  VeriSign Class 3 Extended Validation SSL certificate. You can also see the amount of encryption (128-bit) and other info. Banks normally have 256-bit encryption, which is good since that’s your financial data traversing the Internet.

How to Use the Command Line to Kill a Program

Everyone knows how to kill a program using Task Manager in Windows or Force Quit in OS X, but sometimes it’s useful to kill a program using the command line. I’ve run into several situations where the program refused to end via Task Manager, even when I tried to kill the underlying process. Force Quit has it’s own quirks and doesn’t always kill a program like it should. That’s when you can use the power of the command line.
In this article, I’ll go through the commands for killing a program in Windows, OS X and Linux. Interestingly, there is usually more than one command for accomplishing this, so I’ll try to mention the different ones that I have used. It’s not an exhaustive list, so if you use a different command not mentioned here, please let us know in the comments.

Windows – TSKILL and TASKKILL

In Windows, you can use two commands to kill a program: TSKILL and TASKKILL. TSKILL is a simpler and less powerful command, but does the job just fine. For example, if you’re running Microsoft Word, the process name is winword.exe. To kill Word from the command line just type the following command:
tskill winword
That will kill Word and you will lose any unsaved data, so you have to be careful using it. I tried it out on an unsaved Word doc and it just disappeared when I ran this, no prompts to save the documents. This is pretty much true of all the commands I’m going to mention here as that’s kind of the point. You can to kill a program instantly without any questions.
Tskill
One thing to note is that most of the time that this command is used, it’s used with the /A parameter. /A tells the command to end the process running under all sessions. So typically you would type the following command to be extra sure the process is killed:
tskill /A winword
The second command, which has more options and is more powerful, is TASKKILL. If you look at the help page for TASKKILL, you see what I mean:
Taskkill
If you want to have more control and options for killing a program in Windows, use TASKKILL. For starters, you can kill a program by using the following command:
taskkill /F /IM winword.exe
Note that you have to use .EXE when using the TASKKILL command. /F means to forcefully terminate the process forcefully. /IM means the image name, i.e. the process name. If you want to kill using the process ID (PID), you have to use /PID instead of /IM. /T is great because it will kill all child processes started by the specified process.
You can also use TASKKILL to remotely connect to another system and kill a process on that remote system. What I also like is the ability to use wildcards in TASKKILL.

OS X/Linux – KILL and KILLALL

In OS X and Linux, you have two commands for killing processes: KILL and KILLALL. You have to run these in the terminal window. In order to kill a program, you either have to use the program name or the process ID. There are some ways you can find this info. One way is via the Activity Monitor.
Activity monitor
However, that requires the GUI interface. If you are using the command line to kill a process, you can use the command line to find the process info also. Two commands that come to mind are top and ps -ax.
Top os x
top will give you a list of processes with the PID and the program name also sorted by CPU usage. It’s a quick way to find the process you want to kill. ps -ax will give you a listed sorted by PID and the path of the program. It’s slightly different than top.
Ps command os x
Now for killing the program in OS X. You can simply type the following command to kill a specific process:
kill -9 83002
83002 is the Terminal process and the 9 means to kill the process. You can use other numbers like 3, which means Quit, or 6, which means Abort. Mostly, though, you’ll be sticking with 9. You can also use the KILL command to kill all running processes, though you should probably never use this command.
kill -TERM -1
Where KILL is useful for killing one process or all processes, KILLALL is using for killing a group of processes. For example, if you’re running Google Chrome, you might have 10 Chrome processes running. It would be really annoying to use KILL ten times to shut down Chrome. Instead, you could use KILLALL like so:
killall Evernote
or
killall 'Google Chrome'
Note that you have to use the single quotes or anything longer than one word. Also, if the process is not running under your name, but is instead running under root, you have to use the following command:
sudo killall 'Google Chrome'
or
sudo killall -9 'Google Chrome'
Again, the 9 is sending the specific signal to KILL rather than TERM. Sudo is only needed if you get an error about not having permission. Otherwise you can do killall program or killall -9 program. On OS X, the KILLALL command comes in really handy when you can’t force quit a program. You don’t have to know the process ID, which is nice. Just type in the name and all processes will be killed associated with that name.

Top 8 Financial Management Tools for better Money Handling

Be it personal or business related, everyday expenditures if not limited may topple the “whole ship”. This is how tracking expense has become vital for personal as well as business success.
Several online tools are available for tracking and recording  all sorts of expenses with high accuracy, that can be retrieved instantly every time you need. How you can choose one, that suits your needs best from a big crowd. Here lie’s the challenge. Let us go through some major expense management tools available online.These tools vary from each other with its features,Portability,Security,
Usability Etc.Some of them are free and some are Paid.
Anyway its good to try these if you are having difficulties in managing your money.

Best Online Financial Management Tools:

1.Tistify

It is one of newly launched expense management tool known for its simplicity. Its flexible for personal as well as business users. You can enjoy the service for free. The tool is very easy to use and you can add expense and income in separate pages. You can get solid report. If you need custom reports you have the option of adding customised categories and tags. The tool is now in its β version and is on the path of development and so you can expect more. No support is needed to use the simple yet effective tool for a beginner, still they provide active customer support and a detail help page. It is perfect and flawless for personal or small business use and we can expect an immediate update from Tistify home.

2.Certify


A comparatively better tool available for fulfilling your expense management needs. Features seemed to be ideal for complex business organisation's. Fast method to store and quick way to retrieving data are its peculiarity but you have to pay for enjoying its pretty good features.
It has automated expense management process which  automatically extracts data about expense from any receipt image. They offer varied options such as certify E-receipt and certify spend smart features. Two sorts of workflows include locked and approval types. As one has to pay for enjoying its features, it suits large business firms and not personal needs

3.Expensify


You can file your expense, add receipt and analyse your reports using this expense management site. Options for category customisation, image uploading, and multi-tag setting make the site better but the whole thing lies crowded in the dashboard and there exists a shortage of guidance. For enjoying premium features you need to upgrade to a premium plan. It is moderately suited for business peoples.

4.Mint


This website(and app) expense tracking so simple, and has many other functions as well.Once you create a Mint account you can connect all your financial accounts to it including  Checking accounts, credit cards, savings accounts,brokerage accounts, retirement accounts,  mortgage, auto payments, college savings; any financial account can be connected to this website so you have all your details aggregated in one place. Concerned about security? The web page utilizes the same protection as online financial institutions like banks, and because it’s read only no transactions can be made through it if someone were to breach your account. Then all you need to do is log on and Mint.com up-dates the details from all your various banking organisation's and gives you real-time information from your Accounts.

5.Xpenser

Xpenser known for the performance of the primary function of any expenses recording application - recording expenses. The purpose, in most situations, that's what you really look for. And that's not to say that Xpenser doesn't have reports and other features, but the greatest promoting function of the app is how simple it is to record transactions.

One advantage of Xpenser is you don't have to log in to the app to record an entry. And also there's a suitable iPhone app available. But Xpenser can also get entries via text, voice call, e-mail, Twitter, or instant messenger. As a customer you're not likely to use all of those techniques all the time, but the versatility is mentionable.

6.Chargify:


Be it digital or not, if you intend to get an online subscription for your product, Chargify works better for you. It is an advantage that the dashboard is nicely designed to permit you to manage special offers and coupons and renewal deadlines and changing expiration dates all in a single place.

7.InDinero:

It is another useful application for medium and small business runners. It automatically pulls in information from the account holder’s credit card and bank account, and provides all latest the latest financial information. Moreover it puts forward better suggestions for future planning and budgets.

8.FreshBooks:

This service is particularly helpful for managing invoices. When you create an invoice, receive or both, you may find difficult to keep everything in order. This system helps you to monitor things easily.

8 Unconventional iPhone Cases You’ve Never Seen Before

We have here a collection of 8 Unconventional iPhone Cases You’ve Never Seen Before. Being unconventional is not the only reason why you have not seen these designs or why you are not using them. But no matter how weird or exaggerated the designs for these iPhone cases they are still fun to look at. Perhaps it would also be more exciting to have a real one. Not for everyday use but just for the fun of it. Heck you already have the coolest phone on the planet. An out of ordinary case will not make it less cool whatsoever. Just be read because most of these are rare, hard to find and pricey too.

#1 –  4th Design Trigger Titanium iPhone 5 Case

4th-design-trigger-iphone-5-case-
This rugged looking design for iPhone 5 case has toughness written all over it. It’s made of titanium for total protection and also its light weight. The whole case consists of 10 separate pieces which you will have to put together. No special skills needed just simple screwing is needed. Everything you need to learn is shown on a manual plus designer has complete video documentation. Buy it from 4th Design for $99 a piece!

#2 - Case Scenario x Pantone Universe iPhone Bookcase

case-scenario-x-pantone-universe

Two heads are always better than one. So when two creative designers decided to put up a design for an iPhone 5 case, Panton Universe and Case Scenario come up with this bookcase inspired case. This is made of soft premium nuback leather. The case has a high rating when it comes to usability and design. It comes in two different style or color combinations to be exact. We have the one on the picture called the Red Scarlet Sage and Black Tap Shoe.

#3 - Coin 4 iPhone 4 Case

coin-4-iphone-4-case-3
In this ingenious iPhone protective case it takes advantage in using your spare change as a case stand. The case has grooves at the back lined in different angles. It allows you to stick a coin in and presto you have a case with a stand. Insert the coin in different slots to try varying angles.

#4 - Gizmon iCA iPhone 5 Case

gizmon-ica-iphone-5-case
Innovation and ingenuity in design are things that make the best product. The all popular Gizmo ICA phones casing is now made perfectly compatible with iPhone 5. This case made of premium leather and powerful viewfinder is the best case you can have if you use your iPhone as a primary camera to take pictures. This case comes in different colors and lens can be changed too, like fisheye, center focus, cross screen, etc. This is available at around $60 each.

#5 - iPhone 5 Mophie Juice Pack Helium


iPhone5-Mophie-Juice-Pack-Helium
I would highly recommend this case for heavy users of their iPhones. This case can boost your battery life for long hours. This will carry an additional 80% more battery for your iPhone. In spite of the this large reserve power capacity the case is still slim that it’s impossible to notice the difference in this case from ordinary casing. Micro USB connector will allow you to simultaneously charge your phone and the case.

#6 - Meet Peel, the Super Thin iPhone Case

peel-super-thin-iphone-case
This case is very thin, it’s barely there and very hard to notice. It’s just 0.35 mm in thickness. This is the perfect case for you if you love how your original iPhone design looks like. This is just perfect for everyone. The case can be bought at around $20.

#7 - Omniscient Siri 3D iPhone Case

siri-3d-iPhone-case-4jpeg
This case is sold by Shapeways created by Saga designs. This has been featured a lot of times because the design was created for a 3D printed iPhone 5 case competition. The concept was to come up with a design inspired by Siri. Now the case covers the screen with just enough space to press the home button and call for Siri. So how you will use your phone will greatly depend on Siri’s help.

#8 - SNAP! iPhone Case

snap-iphone-case-4
So here is another case for photographers out there. Snap! is a case for you if you are into photography. The case has a working shutter button. It also allows you to mount your iPhone on a tripod so you can start taking pictures.