Johnny Manziel Wins the Heisman Trophy

Johnny Manziel Wins The Heisman Trophy

Saturday night Texas A&M quarterback Johnny Manziel became the first freshman to win the Heisman Trophy, taking college football’s top individual prize after a record-breaking debut.

Notre Dame linebacker Manti Te'o gets  second and Kansas State quarterback Collin Klein is third in the voting. In a Heisman race with two nontraditional candidates, Manziel breaks through the class barrier and keeps Te'o from becoming the first purely defensive player to win the honor. Read more

How to Add Picture Alt Attribute Code Automatic in WordPress

How to add picture alt attribute code automatic in WordPress? We all know, the picture add alt attributes is conducive the search engine to find the picture.If the alt attribute is appropriate , perhaps the pictures can bring your website a lot of traffic.

However, we may find it is too much trouble to add the picture alt attribute one by one, especially the picture theme site.So is there a method of fully automatic adding to the site pictures alt attribute?
Read more

Solution of the Troubleshooting of Machine.config File not Found

Solution of the troubleshooting of machine.config File not found

Sometime we install the .Net framework 3.5 we will meet the error code 1603,a part of the error were caused by machine.config file not found or error.So we must download a machine.config file and copy to the path "C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\".This is the source code of this file ,you can copy the code and save as the machine.config. Read more

Solution of the Error Code 1603 for This Component Means “Fatal Error During Installation.”

When you install .Net framework 3.5/2.0 or Microsoft Visual Studio you may receive the message :Error code 1603 for this component means "Fatal error during installation." And it is easy to solve this error.

The error code 1603 is wide error,first,you should locate the cause of error code 1603 in a verbose MSI log file.In the current user's temp file folder,for example in Windows 7 it is "c:\Users\YOUR USERNAME\AppData\Local\Temp ".And if you can not find the folder,you may type "echo %temp%" in the CMD mode ,then you will get the path.

Find you log file like dd_NET_Framework35_MSIXXX.txt, open it and search "Return Value 3",above this row is the Read more

The DDOS Attacks Source Code in C Programming Language

Distributed Denial of Services (DDoS) is not a new concept and has been an effective way to get attention. DDoS is simple to orchestrate and rather difficult to defend against.

I came across the code which allegedly has been used by Anonymous to carry out some attacks on their targets.The code itself is straightforward, generating the desired effect at will without the need to control a large number of systems.This is the DDOS attack source code in c programming language: Read more

How to Activate Microsoft Office 2010 Using KMS Activator

 How to Activate Microsoft Office 2010 Using KMS Activator

There are 2 methods of how to activate Microsoft Office 2010. First way is using KMS Activator for Microsoft Office 2010.We use a working genuine crack. The second way is to activate Microsoft Office 2010 copy manually by the cd-key.We introduce the way on how to activate Microsoft Office 2010 by using  KMS Activator for Office 2010.

KMS Activator Office 2010 is an activator for activate microsoft office 2010. KMS Activator can crack or activate microsoft office 2010 all version (x86 & x64) such as office 2010 professional (x86 & x64), office 2010 technical preview (x86 & x64), etc. It is works 100% and make your microsoft office 2010 genuine. KMS Activator works on 32-bit and 64-bit edition of Office 2010.

How to use KMS activator to activate office 2010:

1. First download the KMS activator software for Microsoft office 2010 here:Activator KMS

Read more

Let Your Windows XP Display Week in the Lower-Right Corner of Desktop

Let your Windows XP display week in the lower-right corner of desktop
      What day is it today? I am afraid this is  a question all of us usually have to ask.But in the Windows XP system, in order to know what today is the day of the week you must double-click to open the clock program .Just simple mouse hover over the clock above can not see the day. In fact, Windows XP supports display the week, and only needed a simple setting will be able to achieve this feature.

Read more

The Causes and Solution of Can Not Format Flash Drive

The Causes and Solution of Can Not Format Flash Drive

Sometimes,we will meet the situation of the flash drive can not format .The attribute of the flash drive is displaying RAW file system ,the disk space and the available disk space all are 0 , and what are the causes of can not format flash drive ?  There are several reasons:

1.The mobile hard disk or USB flash disk can not format  because the data was damaged.

2.The USB flash drive can not format because the USB disk infected with computer viruses , such as the autorun.exe virus.The viruses are not completely killing and the  viruses destroyed USB disk system files.

3.A non-conventional operation. (e.g., the not compatible read-write device). Read more

What Does Windows RT Mean? What Are the Differences between Windows RT and Windows 8 ?

What does Windows RT mean? What is the difference between Windows RT and Windows 8 ?

Windows RT is a new operating system based on Windows, the system is suitable for longer battery life and designed for use on the road of thin computers.All Versions of Windows 8 Feature Comparison. Read more

Six Ways to Solve WordPress Lost Password

Six ways to solve WordPress lost password

Sometimes,because this or that reasons,you could lost the WordPress password.If it happened,what can we do to  find the WordPress lost password? There are six methods to get the WordPress lost password.

1.Reinstall WordPress. We do not recommend this method, reinstall the WordPress you would download the WordPress code again and it is too much trouble. It is the worst method.

2.Use the WordPress forgot password feature. WordPress supports mail password recovery feature.If the administrator's e-mail account is valid, in the login interface, click the "forgot your password? " link, after you enter the correct email address, you can receive a password reset message.Then you can reset your WordPress lost password.

3.Delete the WP-config.php file under the WP directory, and then you visit the Web site, which will let you repeat the last installation step, so that you can set a new password of your WordPress.

4.Login phpMyAdmin, find the wp_users table of the WordPress database, here you can see the default user admin,password is encrypted. Now, we can modify this data, find the user_pass field, delete its long data, write down your new password, for example, 123456.Then, you will see a drop down box function, select MD5. This is to encrypt your password with MD5 algorithm, then save. In this way, you can login your WordPress by this password.

5.Use SQL statements to modify the WordPress lost password. Login phpMyAdmin into the WordPress database and execute the following SQL statement:
UPDATE wp_users SET user_pass = MD5('PASSWORD') WHERE wp_users.user_login ='admin' LIMIT 1;

6.Use PHP codes to retrieve the WordPress lost password. PHP method is also using the SQL query statement,but provides a user interface. Copy the following code and save it as password-Reset.php file, upload to your WordPress root directory, and then run this file, enter the password to reset you lost WordPress password.

//password reset
if (empty($_POST['emergency_pass'])) {
<form method="post">
set admin password: <input name="emergency_pass" type="password" />
<input type="submit" />
} else {
$sql = "UPDATE ".$wpdb->users." SET user_pass = '".md5($_POST['emergency_pass'])."' WHERE User_login = 'admin'";
$link = $wpdb->query($sql);

How to View the Private Twitter Tweets Profiles

How to View the Private Twitter Tweets Profiles
Twitter can a place for exchanging quick thoughts with the world, but some users prefer to your Twitter profiles updates private, so consider these protected tweets only those people, where they permission to follow them granted be. If a single user his tweets profiles is protected, you can not see the Tweets on the person, the Twitter account or other backdoor method. However, can a user protected tweets by you through the account of a successor.
To Twitter in your Web browser, and the name of the user of who its protected Twitter profiles updates you want to, follow. Click a pendant that can't find a private Twitter account on each icon of the user's follower list, until you. Record the name of the trailer. Read more

Fix Binkw32.dll is Missing

Fix Binkw32.dll is Missing

Software Size: 221KB
Software language: English
Software category: DLL file
Runtime Environment: Windows XP, Windows 2003, Windows 2000, Vista, Windows 7 32 and 64

 The missing binkw32.dll is due to running a program or game,especially the game series Call of duty.System pop-up error "can not find the binkw32.dll", or "not found binkw32.dll" When the missing binkw32.dll file in your system or the binkw32.dll file is not registered,you need to download binkw32.dll file to unzip it to the appropriate directory and register it.You can download the binkw32.dll here : Binkw32.dll download Read more

Solutions of the Several Errors about “to Interrupt Normal Startup Press Enter”

Solutions of the Several Errors about "to Interrupt Normal Startup Press Enter"

Sometimes you will meet the problem when you boot your computer the screen displayed the error "to interrupt normal startup press enter" .For this problem ,there are several situation:

Case 1 :Computer booting display "to interrupt normal post,press enter!" and it would pass in 5 minutes.

Stop at "to interrupt normal post,press enter!",it means the operating system was not problem. Maybe the hard disk ,display card or memory loose.If you have checked them and the problem was still,most likely the hard disk has bad tracks or sector.The best you carry the computer to maintenance organizations.

Case 2 :Boot appears "to interrupt normal startup, press enter", but does not  press Enter, keyboard does not respond to, and keyboard light is not bright.The computer can not boot at all. Read more

Nintendo New Console WII U Has Lanched on Sunday

Nintendo New Console WII U Has launched on Sunday
June 8, 2011, Nintendo E3 games show introduced a new generation of Wii U game console with touch screen handle,and today,the Wii U, began selling at midnight on Sunday morning in the United States.
The Wii U has new Tablet controller GamePad high-definition graphics and an innovative, called. The GamePad can asynchronous content from the console as second screen, either mirroring or displaying. The GamePad can work even without the TV also switched on.

wii u

Video game console sales have been falling, largely because it's been so long since a new system has launched. Most people who wanted an Xbox 360, PlayStation 3 or a Wii already have one. Another reason: People in the broad 5-to-95 age range have shifted their attention to games on Facebook, tablet computers and mobile phones. Read more

Oracle Date Functions Usage and Examples

Oracle Date Functions Usage and Examples

All the Oracle date functions list is the following:

Oracle date function 1.Add_Months

The syntax for the add_months function is:
    Add_Months(date,months)    Get a date added or minused the months.
          select add_months(date,1) from dual
          select add_months(date,-1) from dual

Oracle date function 2.Current_date

Read more

Google & LG’s Nexus 4 Cellphone Sells Out Within Hours Of Going On Sale

Google & LG's Nexus 4 Cellphone Sells Out Within Hours Of Going On Sale

Nexus 4 is a smart phone manufactured by Google company and LG company working together.On Nexus 4 body can see a lot of shadow of Optimus G, it  absorbed many of the advantages of the Optimus G.Yesterday, the United States, the United Kingdom, Canada, Germany, France, Spain, and Australia seven countries start to sale Nexus 4, the local users rush to buy the first arrival Nexus 4.

U.S. media reported earlier today, Nexus 4 was suffer the mad rushing to buy by the users.The fastest sales speed in Britain 16GB version Nexus 4 sold out for just 10 minutes (8GB version is less than half an hour), while Australia's 16GB version Nexus 4 were sold out within 22 minutes (8GB version is only one hour).

Read more

Call of Duty: Black Ops 2 Release on November 13 2012

Call of Duty: Black Ops 2 Release on November 13 2012

Call of Duty: Black Ops 2 is the latest product of Activision Blizzard's "Call of Duty" series of games.And "Black Ops 2" continues to be produced by Treyarch.  Activision Blizzard announced that "Call of Duty: Black Ops 2" will use the new iw engine 6.0, just supports DX11.So it does not support Windows XP system, only running in Windows 7 or vista sp2 .

call of duty 9 black ops 2

call of duty black ops 2

Different to previous generations, the game story will arrange in 2025 after the Black Ops story,in the story ,China and the United States are involved in this 21st century Cold War, staged unprecedented future wars. "Zombie mode"  will return in this version. On November 13, 2012,Call of Duty: Black Ops 2 will be landing Xbox360, PS3 and PC platforms. Read more

37 Years old Jill Kelley led to David H. Petraeus’s resignation who was the Former Director of the C.I.A

37 Years old Jill Kelley led to David H. Petraeus's resignation who was the Former Director of the CIA

Jill Kelley,a wedded mother of three children from the Gulf Coast city,37,social contactor to MacDill Air Force Base, is “a very famous person of influence in the Tampa community,” active in community organizations that support military causes. Jill Kelly grew in Philadelphia, where her family settled in the mid 1970s and started  a Middle Eastern restaurant after immigrating from Lebanon. Her father, John Khawam, was a famous organist in Lebanon.

Jill Kelley did not talk publicly about the scandal. She with her husband,Scott Kelley, were busy Sunday entertaining guests at a birthday party for their daughter at their colonial-style mansion overlooking Tampa's Hillsborough Bay. Read more

Google Glass : New Technologies For future

Google Glass : New technologies for future

Google Co-Founder Sergey Brin affords WSJ's Spencer Ante an exclusive look at Google's new Internet-enabled glasses. Google Glass proposes to create a hands-free user experience for most smart phone and computer functions.
Google plans to release a beginning version early next year for the hardcore fans who shelled out $1,500 on pre-order, merely Google Glass will continue a novelty item as long as the price tag stays that high.

Google will figure all that out, I'm sure, as it has a track record for showing continuing improvements to many of its products. The company has even hired several of the investigators who worked with Steve Mann, who's considered the godfather of wearable computing, to assist develop the glass technology. Read more

The Five Unique Skills for Writing Your Twitter

The Five Unique Skills for Writing Your Twitter
A lot of young people are learning to use Twitter, but how to make good use of  Twitter ? The beginning of a lot of people using the Twitter will have more or less confused. For example ,the others' Twitter flourished as a venue.but  myself do not know what to write better. Wrote a lot,but is unable to attract the attention of others.Using Twitter a long time,but the number of fans maybe is 0.It is too depressed.

In fact, writing good on Twitter  is not difficult.I think, first we must understand Twitter platform features,then we will use or play the Twitter better.
Here, I summarize  several unique skills to make good use of  Twitter, hoping to be useful to young friends.
Read more

Share Some Hackers’ Google Search Skills

Share Some Hackers' Google Search Skills

Everyone knows that no doubt Google is  the most powerful search engine in the world today. But it is also a secret weapon in the hands of hackers.It can search some information unexpected by you. Computerites blog make a simple conclusion does not hope to use it  to attack someone else's website. I hope everyone to use these computer skills to find useful information for you in the vast network information.

If you are a webmaster, you quickly look at if your site is well done at precautionary measures below hacker detection . If not quickly come to a remedy the situation.If you are a hacker, I believe you seen a similar method as early as in the other hacker sites.You can save valuable time to do more meaningful things.You could not read this article, go somewhere else.But if you are an ordinary Internet user, you can use hacker techniques to expand your horizons and improve your retrieval efficiency.

Now let us study the skills: Read more

The Huge Front Cover of Pornographic Magazines on Google Maps

The Huge Front Cover of Pornographic Magazines on Google Maps

In April this year,to celebrate the magazine publishing the 100 issues, the soft porn magazine Maxim decided to construct  a 110 feet long giant magazine cover  in the Nevada desert in United States , its size to be able clearly visible on the satellite .And it can be used by Google Earth and other softwares. Of course, the Google Earth map update will take some time.And the Las Vegas desert map was not so high-resolution, so Maxim decided to publish a kml file in order for people  to be able to preview first. Read more

The Computer Skill to Completely Clear the Windows 7 Computer Using Traces (using record)

1.Close or Clear traces of browsing files

Even though the snoopers can not directly browse the contents of the document,but they also can view your recently used files to know your work through the File menu in Word or Excel.Even the temporary list listed  the files deleted by you.So it is best to turn off the feature.

For example , in Office 2012 Word or Excel, select the "File" menu, then select "Help" - "Options" item, and then enter the "Advanced" tab to modify"display this number of Recent Documents "selection box figures to 0 in the "show".Now it will not show the most recently used files.  Read more

So Funny!Ten Unexpected Invention Products(2)

Ten Unexpected Invention Products

6.Microwave oven

first Microwave oven

In 1945, an engineer working for Raytheon Company found that,when he was working next to a military radar equipment  his candy melted in his  pocket. He realized that the radiation may roast of the candy. So the inventor Percy Spencer invented the microwave first .Then the microwave oven height is almost only five feet. Read more

So Funny!Ten Unexpected Invention Products(1)

Ten Unexpected Invention Products

Sometimes, the accident is not necessarily a bad thing, all the ten products below are not deliberately produced, just because some coincidence. They are invented out and become the important things in our lives.We take a look at what kind of these products.


In Cardy shepherd legend an Ethiopia shepherd discovered his goats performance excited after  have eaten some red berrieshe. So he did some tests on himself, and verify that the changes of mood. he bring these berries to a local imam and gradually developed the method of eating that prior baking, and then added in batches in the boiling water .Then coffee was invented. Read more CEO :Windows 8 would be “the end” of the line for Microsoft’s PC OS

Marc Benioff, the well-known  as the CEO of, has never been shy about explaining his views about how cloud-based software is going to replace the traditional enterprise software model .... someday. Today, he let loose with a bold prediction about Windows 8.

Windows 8 is a catalyst or "gambit" for CIOs, forcing them to say "am I going to Windows 8, or am I going to something else," Benioff said during a question-and-answer session at's Cloudforce event in New York, which was webcast.

Benioff admitted, "Now, we're not completely there. Everything is not heterogenous client, everything is not LTE, everything is not cloud." But he also claims that some large businesses want to get rid of PCs in favor of employees using portable devices that they may buy and bring to work on their own, in the "bring your own device" approach. Read more

Apple: How to Be the Patent Cavalry

Apple:  How to Be the Patent CavalryI do not know when, designed to protect the interests of the innovator's patent became barbs between the technology giants weights. Stanford University report shows the past two years of global corporate amount spent on patent litigation and patent acquisition totaled $ 20 billion, equivalent to 8 Mars probe project expenses.

  $ 100 000 000 lesson

The patent war on the battlefield Apple as a cavalry charge at the frontline. Nearly two years, Apple in the mobile space frequently waving patented big stick turns defaming competitors Android camp.The greatest impact is none other than the recent patent case with Samsung, which is ultimately to Apple Payout approximately $ 1.049 billion in compensation. According to the statistics Business Insider in March this year, the number of Apple patents up to 4600 items.
Read more

How to Set the Server with Windows 2000 as a Ntp Server

NTP (Network Time Protocol) is used to synchronize your system's time with an online server.
NTP can also be used to serve time for a network.

All Microsoft Windows versions since Windows 2000 include the Windows Time Service, which has the ability to sync the computer clock to an NTP server. However, the version in Windows 2000 only implements Simple NTP, and violates several aspects of the NTP version 3 standard.

First we study how to set the Windows 2000 time service as a NTP time-server. It shows how to modify registry entries to set the Microsoft Windows Time Service. The Windows Time service allows the network to provide synchronisation of all machines within one domain.

Configure Windows 2000 Time Service

Windows 2000 has an integrated time synchronisation service, installed by default, which can synchronise to a NTP Server. So, by manipulating registry settings, the service can do as both an SNTP client and SNTP server to synchronise other network clients.

Before modifying registry entries it is good to backup the registry settings. The registry can then be restored in the event of problems being encountered. Read more

Take a Look at How Many Garbage Files Waste Your Computer Memory

See how many garbage files waste of memory in your computer

Many friends said exaggerated, can only reduce the dozens of M, in fact, it is because your system was relatively clean, if you use some time to install some software, upgrade, and long browsing pictures, some time after you clean up and then try it can reach more than 1G, no exaggeration, just for different people.

Do not want to make it as a Bat file to upload, let everyone write their own, will feel more secure, assured that security think we can protect.

Teach you to write your own program.

This program is to clean up the garbage in the computer automatically without breaking the system and better than many software.
Open [Start] - [All Programs] - [Accessories] - [Notepad]
Then copy the following content Read more

Windows 7 Installation Failure Causes and Solutions

Windows 7 installation failure causes and solutions:

1. the hard disk is insufficient reserve space

Although Win7 known affinity of great demand for hardware platforms, but as the latest operating system for hardware performance still has certain requirements, disk space. According to the the Win7 install Microsoft's official announcement of the minimum hardware resources, not less than 25GB of system disk space. If you have enough disk space when installed, Win7 will clear an error type, and automatically exit the installation.

Install Win7 C drive best guarantee 50G.

Win7 install error user for system disk space is not enough, you can consider using software such as PQ10.0, ADDS extend C drive space more appropriate Xiaobian recommended more than 50G of space reserved for the system disk to install Win7. Of course, if you still use less than 80G hard drive, then buy a piece of the new high-capacity hard disk is the best solution. Read more