Advertise Here

Support our Sponsors

Monday, December 30, 2013

How to Use Whatsapp on PC for Windows and Mac

Guys as you know Whatsapp is the most Popular Messanger available in the Market for Mobile Phones.Unfortunately if you dont own a Smart phone then you might not be able to use whatsapp. But don't worry today we Will learn How to use Whatsapp On PC as well.
You can Use it On both Windows and Mac.
 

To Run Whatsapp on Pc, We will Require Android Emulator, Android Emulator Helps us to Run Whatsapp on PC. 
 

Step 1: Youwave And Bluestack Are the Two Android Emulator which enable us to Run Whatsapp or any other Android App on PC.
Step 2: If you Go for Bluestack then Download and install it, then run the Bluestack and Click                

on " Apps "
Then Click on the Tab " Social " and select " Whatsapp " and Install it.

 


Step 3: If you Go for Youwave which I am Using On My PC then just download  and install.

Now download Whatsapp.apk and move the downloaded file to PC directory.
To Check PC's Directory, Open Youwave click on help > Instruction. Now move your 
 
whatsapp.apk file in to that directory . Then Click on View then Redraw Icons. 
 
Now You will see Whatsapp icon .
After Installing Whatsapp on Youwave or Bluestack you have to enter Mobile number which is not used earlier For Whatsapp account.  Then they will take 5 Minutes to verify and will send you Code.
Enter that code and thats all.


via geekofreek

MediaFire gives up to 50GB Free cloud storage space:signup now

Forget Dropbox .. MediaFire gives up to 50GB Free cloud storage space  Sign Up Now!

Friday, December 13, 2013

Stop the update of IDM gradually


Even though its  not so easy to  stop the update of idm  gradually ,lets give a try

Here is trick to disable automatic update of IDM   

Solution 1
Its   a much more effective way of stopping the update checks, you will need to open up regedit (there is no need to run as administrator) and go to the following key:

1 HKEY_CURRENT_USER\Software\DownloadManager
and then change the "LastCheck" and/or "LastTry" value to something like e.g.:

1 [10/22/15]
Then restart your computer !!

Solution 2
You can setup your firewall to block this IP on ALL ports: 174.133.70.198 AND 174.133.70.98 AND this Host: star.tonec.com
then it won't be able to access it's update server 

Tuesday, December 10, 2013

HOW TO RECOVER DELETED DATA FROM FORMATTED HARD DISK

Hello guys in this tutorial we will see how to recover deleted data from formatted hard disk  Some time's many of user accidently deleted or lost their data's from their hard disk, Pendrives and ,memory cards, these data's may be includes yours important documents, projects or picture, videos it can may be any things at that time many of user face a lots to problem to recover their lost data's. so my friends in this tutorial you definitely finds a relief from such types of  Problem , here I introduce to you from the two types of software which helps lots to recover your deleted data's the 1st is testdisk-6.14 and 2nd is rcsetup144. Ok this is a lots theory now its demo time..

 

Step 1 :- First you download testdisk-6.14  from the given links..

  For windows

www.cgsecurity.org/testdisk-6.14.win.zip

For Linux

www.cgsecurity.org/testdisk-6.14.linux26-x86_64.tar.bz2

For Mac

www.cgsecurity.org/testdisk-6.14.mac_intel.tar.bz2       

After download Extract testdisk-6.14 and open photorec_win.exe  file which is present inside the  testdisk-6.14 directory.

 001

Step 3 :- Now a DOS prompt type screen will appear in front of you which represents yours Computer Drives, select any one of drives which you want to recover deleted data's and hit enter.

 1

Step 4 :- Now select any one of options, here I will second option which is P NTFS and hit enter.

 2

Step 5 :- Now choose other options and hit enter.

 3

Step 6 :- Then select Free options and hit enter.

 4

Step 7 :- Now select location where you want to recover deleted data's, here inside testdisk directory I will choose Plugins folder and enter.

 5

Step 8 :- Now it will ask if the directory is correct then Press "C" then you press "C" for continue.

 6

Now data recovery process is started for stop these process press enter.

 7

If you want see where your recover data's are store then go to

Testdisk-6.14 – Plugins folder.

 9

Thursday, November 28, 2013

Manage Dropbox, Google Drive, SkyDrive, Amazon Cloud Drive, Box.net at Single Location with MultCloud


Cloud storage services are now getting more and more popular as they have the ability to sync files across devices which are connected to the Internet. This way you can get hold of the files on any devices anywhere across the world. There are many free cloud storage services like Dropbox, Google Drive, Box.net, SkyDrive etc. Most of these offer few GB of online storage for free. Most of us have multiple accounts across these cloud storage and the biggest pain is probably accessing these storage spaces independently.

If you use multiple cloud storage services and want to access all of them in a single interface, then MultCloud is your answer. MultCloud will help you do the centralized management with all your cloud drives. It supports almost all the popular cloud services including Dropbox, Google drive, Box.net, SkyDrive, Amazon Cloud Drive,SugarSync.

MultCloud

You need to create an account with the service to start using it. As you can see from the interface, you can add these services once you have verified your account. You can also add multiple accounts for the same service, supposing that you have registered two accounts in Dropbox,it can supervise all the files of both accounts simultaneously.

It can copy a file form one cloud to another, the file transfer function among multiple cloud drives. For Example, through MuitCloud, you can directly copy or cut the files in Google Drive to SkyDrive, and this process will be accomplished online without the need of downloading to local PC. MultCloud will allow you to share files from cloud drives with others, even with a specific person easily and safely.

MultCloud says that it uses 256-bit AES Encryption for SSL in data transfer and does not save the passwords of any of the service to connect with it.

Interface

The web app also has a viewer included, so all the common types of documents,like .doc, .pdf, .xls, etc, and also images can be viewed online.

Overall, the service looks pretty good and it is completely free of cost.

via LifeRocks


Saturday, November 23, 2013

Restricting or denying FTP access in Microsoft ISA Server or Microsoft Forefront TMG

Option 1: Restricting or denying FTP access in Microsoft ISA Server or Microsoft Forefront TMG

To restrict FTP to specific users only, it is advisable to create two rules: one to allow usage of common protocols to all users except FTP, and another to allow FTP to particular users only, example the administrator.

Screenshot 14: Microsoft ISA Server: Configured Firewall policies

The preceding screenshot shows both rules.

Firewall Policy Rule 2 allows common protocol traffic from all users to pass from the internal network to the Internet. Note that the Protocols list does not include the FTP protocol.

Firewall Policy Rule 1 allows FTP protocol usage only by the Administrator. To set this rule to allow the administrator to access an FTP server:

On Microsoft ISA Server

1. On the Microsoft ISA Server machine, navigate to Start > Programs > Microsoft ISA Server > ISA Server Management.

2. From the left panel, expand Arrays > <machine name> > Firewall Policy.

3. Right-click Firewall Policy and select New >Access Rule.

4. Key in a name for this rule; for example 'Allow FTP' and click Next.

5. Select Allow and click Next.

Screenshot 15: Microsoft ISA Server: Protocols dialog

6. In the Protocols dialog, click Add.

7. In the Add Protocols dialog, expand All Protocols, select FTP, click Add and Close.

8. In the Protocols dialog click Next.

9. In the Access Rule Sources dialog, click Add.

10. In the Add Network Entities dialog, expand Computer Sets, select Anywhere, click Add and click Close.

11. In the Access Rule Sources dialog click Next.

12. In the Access Rule Destinations dialog, click Add.

13. In the Add Network Entities dialog, expand Computer Sets, select Anywhere, click Add and click Close.

14. In the Access Rule Destinations dialog click Next.

15. In the User Sets dialog, select All Users and click Remove.

16. Click Add.

Screenshot 16: Microsoft ISA Server: Add Users dialog

17. In the Add Users dialog, select Administrator, click Add and click Close.

18. Click Next and Finish.

19. Make sure to save settings before exiting.

On Microsoft Forefront TMG

1. On the Microsoft Forefront TMG machine, navigate to Start > Programs > Microsoft Forefront TMG > Forefront TMG Management.

2. From the left panel expand Forefront TMG <machine name>.

3. Right-click Firewall Policy and select New > Access Rule.

4. Key in a name for this rule; for example 'Allow FTP' and click Next.

5. Select Allow and click Next.

Screenshot 17: Microsoft Forefront TMG: Protocols dialog

6. In the Protocols dialog, click Add.

7. In the Add Protocols dialog, expand All Protocols, select FTP, click Add and click Close.

8. In the Protocols dialog click Next.

Screenshot 18: Microsoft Forefront TMG: Access Rule Sources dialog

9. In the Access Rule Sources dialog, click Add.

10. In the Add Network Entities dialog, expand Computer Sets, select Anywhere, click Add and click Close.

11. In the Access Rule Sources dialog click Next.

12. In the Access Rule Destinations dialog, click Add.

13. In the Add Network Entities dialog, expand Computer Sets, select Anywhere, click Add and click Close.

14. In the Access Rule Destinations dialog click Next.

15. In the User Sets dialog, select All Users and click Remove.

16. Click Add.

Screenshot 19: Microsoft ISA Server: Add Users dialog

17. In the Add Users dialog, select Administrator, click Add and click Close.

18. Click Next and Finish.

19. Save settings before exiting.

Wednesday, November 20, 2013

Hack and Crack IDM (Internet Download Manager ) - How to?

    Hello Friends, Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.
    I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses. This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.

Hack or crack IDM manually:

    Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.
    Step2: Now Go to START => Then go to RUN and type the following text and click enter:

    notepad %windir%\system32\drivers\etc\hosts
    Step3: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Detail Note about Granting Permission In Windows7:

    For Windows 7 users, due to security reasons you will not be able to save hosts file.so follow this steps : First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.
    Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is "Permission for SYSTEM" by clicking all checkbox under "Allow" Name and press Ok.Dnt click on any Deny check box.
    Note: If you have login through admin then skip this step6 .Its just for granting permission for editing file.
    Step4: Now a notepad file appears something like this as shown below:
    Now copy the below lines of code and add to hosts file as shown above image box :
    127.0.0.1 tonec.com
    127.0.0.1 www.tonec.com
    127.0.0.1 registeridm.com
    127.0.0.1 www.registeridm.com
    127.0.0.1 secure.registeridm.com
    127.0.0.1 internetdownloadmanager.com
    127.0.0.1 www.internetdownloadmanager.com
    127.0.0.1 secure.internetdownloadmanager.com
    127.0.0.1 mirror.internetdownloadmanager.com
    127.0.0.1 mirror2.internetdownloadmanager.com
    After adding these piece of code, save the notepad file. And exit from there.
    Step5: Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

    Step6: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
    RLDGN-OV9WU-5W589-6VZH1
    HUDWE-UO689-6D27B-YM28M
    UK3DV-E0MNW-MLQYX-GENA1
    398ND-QNAGY-CMMZU-ZPI39
    GZLJY-X50S3-0S20D-NFRF9
    W3J5U-8U66N-D0B9M-54SLM
    EC0Q6-QN7UH-5S3JB-YZMEK
    UVQW0-X54FE-QW35Q-SNZF5
    FJJTJ-J0FLF-QCVBK-A287M
    And click on ok to register.
    Step7: After you click ok, it will show an message that you have registered IDM successfully.
    Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.
    That means it will remain full version for life time and you can update it without any problem in future.

Proof of Successfully Hacking IDM:

    Note: To update idm you have to remove those websites added in the host file, after removing those website,save that Hosts file and update IDM software. After succesfull updation again follow above steps to crack Internet Download manager.
    I hope you are now able to convert your Trial version of IDM into Full Version. If you have any problem in this tutorial on Hack and Crack IDM,
    please mention it in comments. Enjoy.....

Saturday, November 9, 2013

How to Add Your Gmail Account to Outlook 2013 Using IMAP

00_lead_image_gmail_in_outlook

If you use Outlook to check and manage your email, you can easily use it to check your Gmail account as well. You can set up your Gmail account to allow you to synchronize email across multiple machines using email clients instead of a browser.

We will show you how to use IMAP in your Gmail account so you can synchronize your Gmail account across multiple machines, and then how to add your Gmail account to Outlook 2013.

To setup your Gmail account to use IMAP, sign in to your Gmail account and go to Mail.

Click the Settings button in the upper, right corner of the window and select Settings from the drop-down menu.

On the Settings screen, click Forwarding and POP/IMAP.

Scroll down to the IMAP Access section and select Enable IMAP.

Click Save Changes at the bottom of the screen.

Close your browser and open Outlook. To begin adding your Gmail account, click the File tab.

On the Account Information screen, click Add Account.

On the Add Account dialog box, you can choose the E-mail Account option which automatically sets up your Gmail account in Outlook. To do this, enter your name, email address, and the password for your Gmail account twice. Click Next.

The progress of the setup displays. The automatic process may or may not work.

If the automatic process fails, select Manual setup or additional server types, instead of E-mail Account, and click Next.

On the Choose Service screen, select POP or IMAP and click Next.

On the POP and IMAP Account Settings enter the User, Server, and Logon Information. For the Server Information, select IMAP from the Account Type drop-down list and enter the following for the incoming and outgoing server information:

Make sure you enter your full email address for the User Name and select Remember password if you want Outlook to automatically log you in when checking email. Click More Settings.

On the Internet E-mail Settings dialog box, click the Outgoing Server tab. Select the My outgoing server (SMTP) requires authentication and make sure the Use same settings as my incoming mail server option is selected.

While still in the Internet E-mail Settings dialog box, click the Advanced tab. Enter the following information:

  • Incoming server: 993
  • Incoming server encrypted connection: SSL
  • Outgoing server encrypted connection TLS
  • Outgoing server: 587

NOTE: You need to select the type of encrypted connection for the outgoing server before entering 587 for the Outgoing server (SMTP) port number. If you enter the port number first, the port number will revert back to port 25 when you change the type of encrypted connection.

Click OK to accept your changes and close the Internet E-mail Settings dialog box.

Click Next.

Outlook tests the accounts settings by logging into the incoming mail server and sending a test email message. When the test is finished, click Close.

You should see a screen saying "You're all set!". Click Finish.

Your Gmail address displays in the account list on the left with any other email addresses you have added to Outlook. Click the Inbox to see what's in your Inbox in your Gmail account.

Because you're using IMAP in your Gmail account and you used IMAP to add the account to Outlook, the messages and folders in Outlook reflect what's in your Gmail account. Any changes you make to folders and any time you move email messages among folders in Outlook, the same changes are made in your Gmail account, as you will see when you log into your Gmail account in a browser. This works the other way as well. Any changes you make to the structure of your account (folders, etc.) in a browser will be reflected the next time you log into your Gmail account in Outlook.

[via howtogeek]

www.techshare.tk

Monday, November 4, 2013

How To Prepare Windows 8.1 Bootable USB On Mac OS X



How To Prepare Windows 8.1 Bootable USB On Mac OS X

Posted: 04 Nov 2013 03:07 AM PST

If your Windows installation is corrupted and you don't have a bootable USB or DVD to perform a clean install of Windows 8.1, you can use your Mac machine to create bootable Windows 8.1 USB drive without having to install third-party utilities. One can use the native Boot Camp Assistant software that ships with all […]




Saturday, November 2, 2013

How to Break Into a Windows PC (and Prevent It from Happening to You)

If you're trying to break into a Windows computer—whether you've forgotten your password or are hatching a more sinister plan—you have quite a few options. Here's how to do it, and how to keep your own computer protected.

Music by Multifaros.

There are a few methods to breaking into a computer, each with their own strengths and weaknesses. Here, we'll go through three of the best and most common methods, and nail down their shortcomings so you know which one to use—and how to exploit their weaknesses to keep your own computer secure.

The Lazy Method: Get at the Files with a Linux Live CD

How to Break Into a Windows PC (and Prevent It from Happening to You)1

If you don't need access to the OS itself, just a few files, you don't need to go through much trouble at all. You can grab any Linux live CD and just drag-and drop files onto a USB hard drive, as you would in any other OS.

How It Works: Just download the live .iso file for any Linux distribution (like the ever-popular Ubuntu) and burn it to CD. Stick it in the computer you want to access and boot up from that CD. Pick "Try Ubuntu" when it comes up with the first menu, and it should take you right into a desktop environment. From here, you can access most of the hard drive just by going to the Places menu in the menu bar and choosing the Windows drive. It should see any NTFS drives just fine.

Note that depending on the permissions of some files, you might need root access. If you're having trouble viewing or copying some files, open up a terminal window (by going to Applications > Accessories > Terminal) and type in sudo nautilus, leaving the password blank when prompted. You should now have access to everything.

Related
How to Encrypt and Hide Your Entire Operating System from Prying Eyes

Over the years, we've written about loads of different ways to hide and encrypt your private data from others, but if you're really serious … Read…

How to Beat It: This method can give you access to the file system, but its main weakness is that the malicious user still can't access any encrypted files, even when using sudo. So, if the owner of the computer (or you) has encrypted their files (or encrypted the entire OS), you won't get very far.

Break Into Windows, Method One: Clear the Password with the Trinity Rescue Kit

How to Break Into a Windows PC (and Prevent It from Happening to You)

If you need access to the operating system itself, the Linux-based Trinity Rescue CD is a good option for breaking in. You'll need to do a bit of command line work, but as long as you follow the instructions closely you should be fine.

Related
How to Boot From a CD or USB Drive on Any PC

Occasionally, if you're troubleshooting your PC or installing a new operating system, you'll have to "boot it from a disc" or USB … Read…

How It Works: Just download the ISO file from the Trinity Rescue web site and burn it to disc. Boot from the disc and wait for everything to load. When you get to the main menu, choose the "Windows Password Resetting" option, and go to "Interactive Winpass."

Next, just follow the onscreen instructions. Choose the partition you want to edit, select "Edit User Data and Passwords," type in the name of the user you want to edit, and choose option 1: "Clear (Blank) User Password" (option 2 did not work for me). When you're done, you can type an exclamation point (!) to quit that menu, then press q to quit the Winpass menu. Restart your computer and you should be able to enter Windows password-free.

How to Beat It: Once again, the weakness of this method is that it still can't beat encryption. Wiping the password will disallow you access to those encrypted files, which, if the user has encrypted their entire OS, makes this method pretty useless. If they've only encrypted a few files, though, you'll still be able to access all the unencrypted stuff without a problem. This method also doesn't work with Windows 8 PCs that use Microsoft accounts to log in, though it will work on local accounts.

Break Into Windows, Method Two: Crack the Password with Ophcrack

How to Break Into a Windows PC (and Prevent It from Happening to You)2

Where the other methods are vulnerable to encryption, this method will give you full access to everything the user can access, including encrypted files, since this method relies on finding out the user's password instead of bypassing it. It also works on Windows 8 computers even if the user in question authenticates with a Microsoft account.

How It Works: All you need to do is download and burn the Ophcrack Live CD (use the Vista version if you're cracking a Windows 7 or 8 PC) and boot from it on your computer. It'll take a little bit of time to boot, but eventually it will bring you to a desktop environment and start attempting to crack passwords (if it doesn't, try choosing "Text Mode" from the original menu). This may take a while. You'll see the passwords pop up in the top pane of the window, though, when it finds them (or, if it doesn't find them, it'll notify you). You can then reboot and log in to Windows using those passwords.

How to Beat It: Ophcrack uses Rainbow Tables to crack the password directly. So, while this method works on encrypted OSes, it can't crack every password out there. To increase your chance of having an uncrackable password, use something complicated and greater than 14 characters. The stronger your password, the less likely Ophcrack will be able to figure it out.

Thursday, October 10, 2013

nafees khan invited you to check out Dropbox

Hi there,

nafees khan wants you to try Dropbox! Dropbox lets you bring all your photos, docs and videos with you anywhere and share them easily.

Accept invite

Thanks!
- The Dropbox Team
To stop receiving invites from Dropbox, please go here.
Dropbox, Inc., PO Box 77767, San Francisco, CA 94107
© 2013 Dropbox

Tuesday, October 8, 2013

7 Skype Tips for Power Users

skype-login

Now that Skype has been merged with Windows Live Messenger, it's more popular than ever. There's no way to use Skype with a third-party client, but Skype does offer hidden features that can make it more powerful.

These are a few useful Skype tricks you won't find unless you go off the beaten path, offering ways to sign into multiple Skype accounts, use IRC-style chat commands, record Skype calls, and even disable some of Skype's built-in advertising.

Sign Into Multiple Skype Accounts

Unlike some messaging programs, Skype doesn't allow you to easily log into multiple accounts. Try to launch the Skype shortcut once you've already opened Skype and it will just bring your already-open Skype window to the front. But you may have multiple Skype accounts — perhaps you have one for work and one for personal use.

Rather than open Skype as another Windows user account, Skype has a hidden option you can use to open a new Skype instance.

To do this, press Windows Key + R to open the Run dialog. In the Run dialog, enter the following command if you're using a 32-bit version of Windows:

"C:\Program Files\Skype\Phone\Skype.exe" /secondary

On 64-bit versions of Windows, enter the following command instead:

"C:\Program Files (x86)\Skype\Phone\Skype.exe" /secondary

Skype will open a second Skype window, which you can log into as another Skype account. If you wanted to use this frequently, you could create a new Windows shortcut that opened Skype with the /secondary switch.

sign-into-multiple-skype-accounts[4]

Disable Contact List Advertisements

Skype will always show advertisements in its home pane, but it also shows advertisements at the bottom of your contact list by default. You can click the X button to close these advertisements whenever they appear, but they'll just keep coming back. But there's a better way — you can disable them permanently if you know where to look.

To disable the contact-list advertisements, or "promotions," open Skype's Options window, navigate to Notifications -> Alerts & messages, and uncheck the Promotions checkbox.

disable-skype-contact-list-promotions

Edit or Delete Sent Messages

This feature also isn't immediately obvious if you're used to other chat programs. If you make a mistake when typing a message or send a message you didn't mean to, you can edit or delete a sent message later.

To do so, just right-click a message you've already sent and select Edit Message or Remove Message. When you edit a message, Skype will note that the message was edited — and if you delete a message, Skype will display "This message has been removed."

Of course, if your recipient already saw the original message you sent, there's no way to edit it out of their mind.

skype-edit-or-delete-message

Record Skype Calls

Skype doesn't include a built-in call recording feature, but you may find yourself wanting to record a call at some point. Perhaps you're interviewing someone remotely and you want to create a record of the interview that you can refer to later, perhaps you're recording a podcast, or perhaps you're having a business discussion and want a record of any agreements you make. There are plenty of good reasons you may want to record a call — aside from the obvious creepy ones.

As Skype doesn't include a built-in call-recording feature, you'll need to use a third-party application that will do the recording for you. There are several options out there — in the past, MP3 Skype Recorder was recommended to us by a reader and we found that it worked well.

Use Screen Sharing

Skype's screen-sharing feature allows you to share your desktop with a Skype contact. You can use this feature to quickly troubleshoot someone's PC without making them install additional remote access software. Or, you can us this feature to give a presentation and or show anything else remotely. You could also choose to share a single window instead of your entire desktop, giving yourself some privacy.

While on a Skype call, just click the + button and select Share screens. You could also just click the + button and select Share screens to initiate screen-sharing while not already on a call.

skype-share-screens

RELATED ARTICLE
The Best Tools to Easily Perform Remote Tech Support
"Help, my computer is broken!" comes the phone call yet again. If you're stuck playing tech support for family or... [Read Article]

Bear in mind that, unlike traditional remote-access software, there's no way to give someone else control over your screen. You'd have to walk the other person through any changes you make to their computer if you were acting as remote tech support via Skype screen-sharing.

Master Text-Based Chat Commands

If you're a geek, there's a good chance you've used IRC before. IRC offers a wide variety of chat features that are available as text-based commands, and Skype offers many comparable features.

In a Skype chat room, you can use the /add command to add a Skype user to the chat, use the /topic command to set a topic for that chat room, use the /setpassword command to set a password for that chat room, use the /setrole command to assign permissions to users in the chat, use the /kick command to kick a user from the chat, or use the /kickban command to kick a user and ban them from rejoining.

These are just a few of the chat commands Skype offers — check the What are chat commands and roles? page on the Skype website for a comprehensive list. You could also just use the /help command from within Skype to access a list of chat commands, although you'll only see the full list if you're in a chat room with more than two people.

skype-chat-commands

Easily Send a File to Multiple People

While you're in a Skype chat with multiple people, you can easily send a file to them all by dragging and dropping the file into the chat room or conference call. Skype will give a copy of the file to everyone, allowing you to quickly share files without the hassle of sending them as an email attachment, sharing them via Dropbox, or even using Skype's Send File feature to send it to them one at a time.

You could also create a group in your contacts, and then right-click the group and select Send File to send a file to every contact in that group at once. It's an easy way to distribute files to several people at once.

skype-send-file


Skype may have become popular because it offered dead-simple voice and video calls over the Internet that "Just Worked" without any firewall configuration, but it's more than a basic program. It offers quite a few power-user features that geeks will appreciate.

via [howtogeek]

Get Thousands of Visitors for Your Website

autosurf

Get Free Dot Tk Domain

Earn Money by Just Shortening URL