Friday, November 19, 2010
To cancel import scanning when Picasa start
>Start your Picasa
>Go to File -> Add Folder to Picasa
>Folder manager will pop up and now you can select which folder to perform the scanning whenever picasa start.
>To cancel scan for a folder, just Highlight the folder name and click “Remove from Picasa” and u’ll see the folder will be mark by a red cross. and this folder will not be scan by picasa from now on.
Sunday, July 25, 2010
Saturday, July 24, 2010
DWNLOAD TORRENT FILE WITHOUT TORRENT CLIENT!
Jus pate t file in t url of the followin websites
>bitlet.org
>torrent2exe.com
LOCK UR CD-ROM
>run regedit
>type ctrl+f
>type "allocatecdrom" in t dialog box opened
>change t value 4m 1 to 0
(0 to 1 => 4 reset)
Thursday, July 8, 2010
HIDE UR CALL HISTORY:)
ONLY 4 S60 MOBILES:
>MENU
>OPEN THE LOG
>SETTINGS
>LOG DURATION
>select NO LOG
FINISH!!
Wanna remove thumb.db file???
>TOOLS
>FOLDER OPTIONS
>VIEW
FILES&FOLDERS
> DO NOT CACHE THUMBNAIL...
DONE!
Pendrive solutions:
Have probs in formatting pendrive???
follow these steps..
>rt click on my computer
>manage
>disk management
>rt click on pen drive
>remove letter
>remove(plug out &plug)
>format
win hack
U can hack programs during win xp installation.........
jus follow these:
>press shift+F10 when"installing devices" appears
>then do dos programs whatever u want..:)
Dump error???????
If ur pc shows t dump error jus try the followin n get it done
>last installed program has infected ur system.so,try removin it.
>softly remove ur ram n clean it
>last installed program has infected ur system.so,try removin it.
>softly remove ur ram n clean it
USEFUL ABBREVIATIONS!!
Some abbreviations that we hear, read, and use and we don't know their meanings or are too shy to ask….
GPRS
(General Packet Radio Service)
TCP/IP
(Transmission Control Protocol and Internet Protocol)
ISP
(Internet Service Provider)
VHF
(Very High Frequency)
UHF
(Ultra High Frequency)
MPEG
(Moving Pictures Experts Group)
MP3
(MPEG-1 Audio Layer 3)
DSL
(Digital Subscriber Line)
IPO
(Initial Public Offerings)
FBI
(Federal Bureau of Investigation)
CIA
(Central Intelligence Agency)
S.W.A.T
(Special Weapons and Tactics)
GMC
(General Motors Corporation)
BMW
(Bavarian Motor Works)
HP
(Hewlett-Packard)
WWW
(World Wide Web)
HTTP
(HyperText Transfer Protocol)
URL
(Uniform resource Locator)
HTML
(HyperText Markup Language)
WAP
(Wireless Application Protocol)
PDF
(Portable Document Format)
MIDI
(Musical Instruament Digital Interface)
3GP or 3GPP
(3rd Generation Partnership Project)
AMR
(Adaptive Multi-Rate)
USB
(Universal Serial Bus)
MSN
(MicroSoft Network)
CNN
(Cable News Network)
BBC
(British Broadcasting Corporation)
NBA
(National Basketball Association)
FIFA
(in french, Federation Internationale de Football Association)
(in english, International Federation of Association Football)
UEFA
(Union of European Football Association)
NASA
(National Aeronautics and Space Administration)
OPEC
(Organization of the Petroleum Exporting Countries)
LNB
(Low Noise Block converter)
GPRS
(General Packet Radio Service)
TCP/IP
(Transmission Control Protocol and Internet Protocol)
ISP
(Internet Service Provider)
VHF
(Very High Frequency)
UHF
(Ultra High Frequency)
MPEG
(Moving Pictures Experts Group)
MP3
(MPEG-1 Audio Layer 3)
DSL
(Digital Subscriber Line)
IPO
(Initial Public Offerings)
FBI
(Federal Bureau of Investigation)
CIA
(Central Intelligence Agency)
S.W.A.T
(Special Weapons and Tactics)
GMC
(General Motors Corporation)
BMW
(Bavarian Motor Works)
HP
(Hewlett-Packard)
WWW
(World Wide Web)
HTTP
(HyperText Transfer Protocol)
URL
(Uniform resource Locator)
HTML
(HyperText Markup Language)
WAP
(Wireless Application Protocol)
(Portable Document Format)
MIDI
(Musical Instruament Digital Interface)
3GP or 3GPP
(3rd Generation Partnership Project)
AMR
(Adaptive Multi-Rate)
USB
(Universal Serial Bus)
MSN
(MicroSoft Network)
CNN
(Cable News Network)
BBC
(British Broadcasting Corporation)
NBA
(National Basketball Association)
FIFA
(in french, Federation Internationale de Football Association)
(in english, International Federation of Association Football)
UEFA
(Union of European Football Association)
NASA
(National Aeronautics and Space Administration)
OPEC
(Organization of the Petroleum Exporting Countries)
LNB
(Low Noise Block converter)
Sunday, June 13, 2010
Windows 7 Sins
The new version of Microsoft's Windows operating system, Windows 7, has the same problem that Vista, XP, and all previous versions have had -- it's proprietary software. Users are not permitted to share or modify the Windows software, or examine how it works inside.
The fact that Windows 7 is proprietary means that Microsoft asserts legal control over its users through a combination of copyrights, contracts, and patents. Microsoft uses this power to abuse computer users. At windows7sins.org, the Free Software Foundation lists seven examples of abuse committed by Microsoft.
1. Poisoning education: Today, most children whose education involves computers are being taught to use one company's product: Microsoft's. Microsoft spends large sums on lobbyists and marketing to corrupt educational departments. An education using the power of computers should be a means to freedom and empowerment, not an avenue for one corporation to instill its monopoly.
2. Invading privacy: Microsoft uses software with backward names like Windows Genuine Advantage to inspect the contents of users' hard drives. The licensing agreement users are required to accept before using Windows warns that Microsoft claims the right to do this without warning.
3. Monopoly behavior: Nearly every computer purchased has Windows pre-installed -- but not by choice. Microsoft dictates requirements to hardware vendors, who will not offer PCs without Windows installed on them, despite many people asking for them. Even computers available with other operating systems like GNU/Linux pre-installed often had Windows on them first.
4. Lock-in: Microsoft regularly attempts to force updates on its users, by removing support for older versions of Windows and Office, and by inflating hardware requirements. For many people, this means having to throw away working computers just because they don't meet the unnecessary requirements for the new Windows versions.
5. Abusing standards: Microsoft has attempted to block free standardization of document formats, because standards like OpenDocument Format would threaten the control they have now over users via proprietary Word formats. They have engaged in underhanded behavior, including bribing officials, in an attempt to stop such efforts.
6. Enforcing Digital Restrictions Management (DRM):With Windows Media Player, Microsoft works in collusion with the big media companies to build restrictions on copying and playing media into their operating system. For example, at the request of NBC, Microsoft was able to prevent Windows users from recording television shows that they have the legal right to record.
7. Threatening user security: Windows has a long history of security vulnerabilities, enabling the spread of viruses and allowing remote users to take over people's computers for use in spam-sending botnets. Because the software is secret, all users are dependent on Microsoft to fix these problems -- but Microsoft has its own security interests at heart, not those of its users.
hack
I found another hacking technique which is quite popular now a days that is USING VIDEO SITES, TROJANS are delivered to your pc. Yes, by visiting a video site, if you download the codec to view the video, you can install a server on your machine.
These technique uses a software called DOWNLOADER which is basically a small client which receives malware on your machine, if installed. Usually if some link is taking you to some page with VIDEO PLAYER but you are not able to view the video ( and you will not able to view the video for sure, because there is no video for you, just an outfit of a video player is there), website will ask you to download the CODEC ( small piece of software which enables the machine to play different types of media files). Actually this will not be a codec, but a trojan program which will be installed on your machine. Now the person who is having server for this DOWNLOADER, can send any kind of malware to your machine. It works like a door for HACKER. Now HACKER can not only retrieve your personal data but also can test his/her viruses on your machine. It helps HACKER to always update his VIRUS before your anti-virus start recognizing the virus.
This is damn good way of spreading viruses and now a days FACEBOOK and GOOGLE are really fighting with this problem. According to CNET News , on your facebook, you will receive a message which will contain google link to view a video, when you click on link, it will take you to some non-google page and ask you to download codec to view the video. and in above mentioned way DOWNLOADER will be installed on your machine.
So, BEWARE ALL FACEBOOK USERS. IF YOU ARE RECEIVING SUCH MESSAGES , DON'T FOLLOW THEM.
ref::
http://news.cnet.com/8301-1009_3-10078353-83.html
These technique uses a software called DOWNLOADER which is basically a small client which receives malware on your machine, if installed. Usually if some link is taking you to some page with VIDEO PLAYER but you are not able to view the video ( and you will not able to view the video for sure, because there is no video for you, just an outfit of a video player is there), website will ask you to download the CODEC ( small piece of software which enables the machine to play different types of media files). Actually this will not be a codec, but a trojan program which will be installed on your machine. Now the person who is having server for this DOWNLOADER, can send any kind of malware to your machine. It works like a door for HACKER. Now HACKER can not only retrieve your personal data but also can test his/her viruses on your machine. It helps HACKER to always update his VIRUS before your anti-virus start recognizing the virus.
This is damn good way of spreading viruses and now a days FACEBOOK and GOOGLE are really fighting with this problem. According to CNET News , on your facebook, you will receive a message which will contain google link to view a video, when you click on link, it will take you to some non-google page and ask you to download codec to view the video. and in above mentioned way DOWNLOADER will be installed on your machine.
So, BEWARE ALL FACEBOOK USERS. IF YOU ARE RECEIVING SUCH MESSAGES , DON'T FOLLOW THEM.
ref::
http://news.cnet.com/8301-1009_3-10078353-83.html
Unthinkable Hacking Techniques !!!
Hi Guys ! I am posting this article for those who use pirated softwares. Because this is the time to stop using pirated softwares. You can't even imagine what your loss can be if you are using your PC for professional purposes.
Usually we download softwares from various forums/boards which provides cracks or keygens. These keygens are not only keygens but most of the time small server programs (hack tool) which transfers your sensitive data over internet to someone. If you are using Windows Firewall , it is quite easy to bypass the windows firewall. you won;t be able to know that your data is being sent over the internet. and Same thing goes for the CRACKS also. Spreading trojans is quite easy by providing game cracks or some full screen applications. Because user won't be able to know what is going on behind the fullscreen. So beware of using cracks and keygens. Your antivirus may or may not detect such malware. Now a days viruses are created more rapidly than detected.
Another MOST DANGEROUS HACKING TECHNIQUE is quite undetectable. You know what are you type in browser's address bar is resolved by your ISP's Domain Name Servers. What if your request goes to a hackers's machine first and then goes to ISP. Yes, this is possible a simple VBSCRIPT or WSH Script can do the trick. you won't be able to know that you are being watched or you are being traced. No firewall or no anti-hacking tool wil help you. Usually such scripts might be available as registration scripts for some kind of softwares.
Now About Windows XP users, this operating system's services are available through internet which can be very dangerous. Do you that by default you are all drives are ready to share data over network. Another thing is TERMINAL SERVICES which allows multiple users on a single machine. It means if you are working on your machine, if someone can log in to your machine remotely and you won't be alerted.
If you are downloading Operating Systems from Internet. Then take care that you download from trusted sources only. Cause it is very easy to embed some tracking code into your OS Images which can not be detected later on by any security software.
If you are using LINUX Operating Systems, it is highly recommeded that you use the softwares from trusted sources only otherwise you can be hacked or can cause damage to your machine.
Another good hacking tool is sniffer which is used by network administrator. It scans the network traffic and can filter sensitive information like passwords, credit card numbers etc. So if you are using credit cards at cafes so beware. you can be victim.
Usually we download softwares from various forums/boards which provides cracks or keygens. These keygens are not only keygens but most of the time small server programs (hack tool) which transfers your sensitive data over internet to someone. If you are using Windows Firewall , it is quite easy to bypass the windows firewall. you won;t be able to know that your data is being sent over the internet. and Same thing goes for the CRACKS also. Spreading trojans is quite easy by providing game cracks or some full screen applications. Because user won't be able to know what is going on behind the fullscreen. So beware of using cracks and keygens. Your antivirus may or may not detect such malware. Now a days viruses are created more rapidly than detected.
Another MOST DANGEROUS HACKING TECHNIQUE is quite undetectable. You know what are you type in browser's address bar is resolved by your ISP's Domain Name Servers. What if your request goes to a hackers's machine first and then goes to ISP. Yes, this is possible a simple VBSCRIPT or WSH Script can do the trick. you won't be able to know that you are being watched or you are being traced. No firewall or no anti-hacking tool wil help you. Usually such scripts might be available as registration scripts for some kind of softwares.
Now About Windows XP users, this operating system's services are available through internet which can be very dangerous. Do you that by default you are all drives are ready to share data over network. Another thing is TERMINAL SERVICES which allows multiple users on a single machine. It means if you are working on your machine, if someone can log in to your machine remotely and you won't be alerted.
If you are downloading Operating Systems from Internet. Then take care that you download from trusted sources only. Cause it is very easy to embed some tracking code into your OS Images which can not be detected later on by any security software.
If you are using LINUX Operating Systems, it is highly recommeded that you use the softwares from trusted sources only otherwise you can be hacked or can cause damage to your machine.
Another good hacking tool is sniffer which is used by network administrator. It scans the network traffic and can filter sensitive information like passwords, credit card numbers etc. So if you are using credit cards at cafes so beware. you can be victim.
Thursday, June 10, 2010
To run old s/w of xp in win 7
DOWNLOAD winxp mode 4 win7:
http://microsoft.com/uk/windows/virtual-pc/download.aspx
http://microsoft.com/uk/windows/virtual-pc/download.aspx
Friday, May 21, 2010
backup the entire windows 7 registry
>press windows key + r
>type regedit
>on file->export
>give name and location
google cheats
>search within range of numbers
eg:
>type mobile phone Rs.10000...Rs.15000 in google
>it wil show phones in tat range
Free virus scan online
www.kaspersky.com/virusscanner
www.bitdefender.com
www.eset.com/onlinescan
www.f-secure.com
Command prompt blocked?/ need a shortcut ?
>open notepad
>type command.com
>save as cmd.bat
>click to open cmd promt
Open programs automatically
>rt click start->programs->double click start up
>drag ur fav apps
>they wil open automatically on start up
4 t musiq freaks
Ever found yourself listening to a great song in a movie or TV show but don't know the name? Audiggle is the brand new audio recognition software which can instantly tell you the song and artist name of anything playing on your PC.
Download audiggle 4m www.audiggle.com
Saturday, February 27, 2010
Changing Startup and Log-off screens
Startup Screen
1. Create a 320x400 bitmap in the root directory and name it LOGO.SYS
2. You can use LOGOW.SYS file in the Windows directory as a starter
Logoff Screens
1. There are many system file that constitutes Lofoff screen.
2. They are actually bitmaps 320x400 that just have a different extension
3. The hidden file in the root directory LOGO.SYS is the startup logo.
4. There are two files in the Windows directory.
5. LOGOW.SYS is the Wait while Shutting down ... screen.
6. LOGOS.SYS is the You may now shut-off or Reboot screen.
7. Make two new image files of your chice in Paint and name it as LOGOW.SYS and LOGOS.SYS and replce the actual windows file by this two.
8. But make sure they should be of the same size
1. Create a 320x400 bitmap in the root directory and name it LOGO.SYS
2. You can use LOGOW.SYS file in the Windows directory as a starter
Logoff Screens
1. There are many system file that constitutes Lofoff screen.
2. They are actually bitmaps 320x400 that just have a different extension
3. The hidden file in the root directory LOGO.SYS is the startup logo.
4. There are two files in the Windows directory.
5. LOGOW.SYS is the Wait while Shutting down ... screen.
6. LOGOS.SYS is the You may now shut-off or Reboot screen.
7. Make two new image files of your chice in Paint and name it as LOGOW.SYS and LOGOS.SYS and replce the actual windows file by this two.
8. But make sure they should be of the same size
To view t max window possible!
When a window is active, press the F11 key of the keyboard to get the biggest window possible and press F11 again to restore it.
To speed up your windows or to increase RAM virtually,
Right click on My Computer
>> Properties
>> Advanced
>> Performance - Settings
>> Advanced
>> Virtual Memory - Change
Keep the initial size same as recommended and maximum size double of it then restart your system.
It will improve speed of windows and you can play some games which require higher RAM.
Sunday, January 17, 2010
VERY EASY WAY TO CREATE CON FOLDER
XP
1)Jus rename any folder and type con and press & hold ALT tab & type 0160
2)con folder is ready
Saturday, January 16, 2010
Need a lighting effects in ur keyboard? TRY THIS
1)open a notepad
2)type the followin command
Set Wshshell=Wscript.Createobject("Wscript.Shell")
Do
Wscript.Sleep 100
Wshshell.Sendkeys"{capslock}"
Wshshell.Sendkeys"{Numlock}"
Wshshell.Sendkeys"{Scrolllock}"
Loop
3)save it wit .vbs extensio.(eg:zahir.vbs)
4)double click it n enjoy
2)type the followin command
Set Wshshell=Wscript.Createobject("Wscript.Shell")
Do
Wscript.Sleep 100
Wshshell.Sendkeys"{capslock}"
Wshshell.Sendkeys"{Numlock}"
Wshshell.Sendkeys"{Scrolllock}"
Loop
3)save it wit .vbs extensio.(eg:zahir.vbs)
4)double click it n enjoy
TOP 10 SUPERCOMPUTERS
1)Bluegen/LDD2 Beta system
2)Columbia
3)Earth Simulator
4)MareNostrum
5)Thunder
6)ASCIQ
7)System X
8)Bluegene/LDD1Prototype
9)Server pSeries 655 cluster
10)Tungsten
2)Columbia
3)Earth Simulator
4)MareNostrum
5)Thunder
6)ASCIQ
7)System X
8)Bluegene/LDD1Prototype
9)Server pSeries 655 cluster
10)Tungsten
HOW TO CREATE A CON FOLDER (other than XP)
1)Goto run dialog
2)Type cmd
(command promt gets opened)
3)goto root directory like c:\ or d:\
4)type md\\.\\c:\\con
5)check in the respective folder 4 its done!
6)to delete rmdir \\.\c:\con
2)Type cmd
(command promt gets opened)
3)goto root directory like c:\ or d:\
4)type md\\.\\c:\\con
5)check in the respective folder 4 its done!
6)to delete rmdir \\.\c:\con
Friday, January 15, 2010
Linux Foundation: Linux job market has grown 80 percent
The Linux Foundation says that the market for Linux-related jobs has grown 80 percent over the past five years. In response to this trend, the foundation is launching a Linux job board to help connect employers with potential candidates for Linux-related jobs.
The Linux Foundation, an advocacy and standardization group, obtained the Linux.com domain name from GeekNet last year. The website hosts a variety of content and services for Linux users and programmers, including blogs and community-driven technical support. The job board, which will be powered by th JobThread Network, is the latest addition to the website.
"Linux' increasing use across industries is building high demand for Linux jobs despite national unemployment stats," said Linux Foundation executive director Jim Zemlin in a statement. "Linux.com reaches millions of Linux professionals from all over the world. By providing a Jobs Board feature on the popular community site, we can bring together employers, recruiters and job seekers to lay the intellectual foundation for tomorrow's IT industry."
During the Linux Collaboration Summit last year, Zemlin declared Linux the "fastest growing platform" and touted an IDC study which contended that the open source operating system would endure the economic recession better than its competitors. Although it's still unclear if IDC's speculation will prove true, the need for cost-cutting in the current economic climate has certainly helped to boost Linux adoption, a trend that is potentially contributing further to the growth of the Linux job market.
The Linux Foundation, an advocacy and standardization group, obtained the Linux.com domain name from GeekNet last year. The website hosts a variety of content and services for Linux users and programmers, including blogs and community-driven technical support. The job board, which will be powered by th JobThread Network, is the latest addition to the website.
"Linux' increasing use across industries is building high demand for Linux jobs despite national unemployment stats," said Linux Foundation executive director Jim Zemlin in a statement. "Linux.com reaches millions of Linux professionals from all over the world. By providing a Jobs Board feature on the popular community site, we can bring together employers, recruiters and job seekers to lay the intellectual foundation for tomorrow's IT industry."
During the Linux Collaboration Summit last year, Zemlin declared Linux the "fastest growing platform" and touted an IDC study which contended that the open source operating system would endure the economic recession better than its competitors. Although it's still unclear if IDC's speculation will prove true, the need for cost-cutting in the current economic climate has certainly helped to boost Linux adoption, a trend that is potentially contributing further to the growth of the Linux job market.
Thursday, January 14, 2010
50 COMMON INTERVIEW QUESTIONS AND ANSWERS
Very Important Please Dont Miss it.
Review these typical interview questions and think about how you would answer them. Read the questions listed; you will also find some strategy suggestions with it.
1. Tell me about yourself?
Ans : The most often asked question in interviews. You need to have a short statement prepared in your mind. Be careful that it does not sound rehearsed. Limit it to work-related items unless instructed otherwise. Talk about things you have done and jobs you have held that relate to the position you are interviewing for. Start with the item farthest back and work up to the present.
2. Why did you leave your last job?
Ans: Stay positive regardless of the circumstances. Never refer to a majorproblem with management and never speak ill of supervisors, co-workers or the organization. If you do, you will be the one looking bad. Keep smiling and talk about leaving for a positive reason such as an opportunity, a chance to do something special or other forward-looking reasons.
3. What experience do you have in this field?
Ans: Speak about specifics that relate to the position you are applying for. If you do not have specific experience, get as close as you can.
4. Do you consider yourself successful?
Ans:You should always answer yes and briefly explain why. A good explanation is that you have set goals, and you have met some and are on track to achieve the others.
5. What do co-workers say about you?
Ans: Be prepared with a quote or two from co-workers. Either a specific statement or a paraphrase will work. Jill Clark, a co-worker at Smith Company, always said I was the hardest workers she had ever known. It is as powerful as Jill having said it at the interview herself.
6. What do you know about this organization?
This question is one reason to do some research on the organization before the interview. Find out where they have been and where they are going. What are the current issues and who are the major players?
7.. What have you done to improve your knowledge in the last year?
Try to include improvement activities that relate to the job. A wide variety of activities can be mentioned as positive self-improvement. Have some good ones handy to mention.
8. Are you applying for other jobs?
Be honest but do not spend a lot of time in this area. Keep the focuson this job and what you can do for this organization. Anything else is a distraction.
9. Why do you want to work for this organization?
This may take some thought and certainly, should be based on the research you have done on the organization. Sincerity is extremely important here and will easily be sensed. Relate it to your long-term career goals.
10. Do you know anyone who works for us?
Be aware of the policy on relatives working for the organization. This can affect your answer even though they asked about friends not relatives. Be careful to mention a friend only if they are well thought of.
11. What is your Expected Salary?
A loaded question. A nasty little game that you will probably lose if you answer first. So, do not answer it. Instead, say something like, That's a tough question. Can you tell me the range for this position? In most cases, the interviewer, taken off guard, will tell you. If not, say that it can depend on the details of the job. Then give a wide range.
12. Are you a team player?
You are, of course, a team player. Be sure to have examples ready. Specifics that show you often perform for the good of the team rather than for yourself are good evidence of your team attitude. Do not brag, just say it in a matter-of-fact tone. This is a key point..
13. How long would you expect to work for us if hired?
Specifics here are not good. Something like this should work: I'd like it to be a long time. Or As long as we both feel I'm doing a good job.
14. Have you ever had to fire anyone?
How did you feel about that? This is serious. Do not make light of it or in any way seem like you like to fire people. At the same time, you will do it when it is the right thing to do. When it comes to the organization versus the individual who has created a harmful situation, you will protect the organization. Remember firing is not the same as layoff or reduction in force.
15. What is your philosophy towards work?
The interviewer is not looking for a long or flowery dissertation here. Do you have strong feelings that the job gets done? Yes. That's the type of answer that works best here. Short and positive, showing a benefit to the organization.
16. If you had enough money to retire right now, would you?
Answer yes if you would. But since you need to work, this is the type of work you prefer. Do not say yes if you do not mean it.
17. Have you ever been asked to leave a position?
If you have not, say no. If you have, be honest, brief and avoid saying negative things about the people or organization involved.
18. Explain how you would be an asset to this organization ?
You should be anxious for this question. It gives you a chance to highlight your best points as they relate to the position being discussed. Give a little advance thought to this relationship. .
19. Why should we hire you?
Point out how your assets meet what the organization needs. Do not mention any other candidates to make a comparison..
20. Tell me about a suggestion you have made ?
Have a good one ready. Be sure and use a suggestion that was accepted and was then considered successful. One related to the type of work applied for is a real plus.
21. What irritates you about co-workers?
This is a trap question. Think real hard but fail to come up with anything that irritates you. A short statement that you seem to get along with folks is great.
22. What is your greatest strength?
Numerous answers are good, just stay positive. A few good examples: Your ability to prioritize, Your problem-solving skills, Your ability to work under pressure, Your ability to focus on projects, Your professional expertise, Your leadership skills, Your positive attitude
23. Tell me about your dream job ?
Stay away from a specific job. You cannot win. If you say the job you are contending for is it, you strain credibility. If you say another job is it, you plant the suspicion that you will be dissatisfied with this position if hired. The best is to stay genetic and say something like: A job where I love the work, like the people, can contribute andcan't wait to get to work.
24. Why do you think you would do well at this job?
Give several reasons and include skills, experience and interest.
25. What are you looking for in a job?
See answer # 23
26. What kind of person would you refuse to work with?
Do not be trivial. It would take disloyalty to the organization, violence or lawbreaking to get you to object. Minor objections will label you as a whiner.
27. What is more important to you: the money or the work?
Money is always important, but the work is the most important. There is no better answer.
28. What would your previous supervisor say your strongest point is?
There are numerous good possibilities: Loyalty, Energy, Positive attitude, Leadership, Team player, Expertise,Initiativ e, Patience, Hard work, Creativity, Problem solver
29. Tell me about a problem you had with a supervisor?
Biggest trap of all. This is a test to see if you will speak ill of your boss. If you fall for it and tell about a problem with a former boss, you may well below the interview right there. Stay positive and develop a poor memory about any trouble with a supervisor.
30. What has disappointed you about a job?
Don't get trivial or negative. Safe areas are few but can include: Not enough of a challenge. You were laid off in a reduction Company did not win a contract, which would have given you more responsibility.
31. Tell me about your ability to work under pressure.
You may say that you thrive under certain types of pressure. Give an example that relates to the type of position applied for.
32. Do your skills match this job or another job more closely?
Probably this one. Do not give fuel to the suspicion that you may want another job more than this one.
33. What motivates you to do your best on the job?
This is a personal trait that only you can say, but good examples are: Challenge, Achievement, Recognition
34. Are you willing to work overtime? Nights? Weekends?
This is up to you. Be totally honest.
35. How would you know you were successful on this job?
Several ways are good measures: You set high standards for yourself and meet them. Your outcomes are a success. Your boss tell you that you are successful
36. Would you be willing to relocate if required?
You should be clear on this with your family prior to the interview if you think there is a chance it may come up. Do not say yes just to get the job if the real answer is no. This can create a lot of problems later on in your career. Be honest at this point and save yourself future grief.
37. Are you willing to put the interests of the organization ahead of your own?
This is a straight loyalty and dedication question. Do not worry about the deep ethical and philosophical implications. Just say yes.
38. Describe your management style ?
Try to avoid labels. Some of the more common labels, like progressive, salesman or consensus, can have several meanings or descriptions depending on which management expert you listen to. The situational style is safe, because it says you will manage according to the situation, instead of one size fits all.
39. What have you learned from mistakes on the job?
Here you have to come up with something or you strain credibility. Make it small, well intentioned mistake with a positive lesson learned. An example would be working too far ahead of colleagues on a project and thus throwing coordination off.
40. Do you have any blind spots?
Trick question. If you know about blind spots, they are no longer blind spots. Do not reveal any personal areas of concern here. Let them do their own discovery on your bad points. Do not hand it to them.
41. If you were hiring a person for this job, what would you look for?
Be careful to mention traits that are needed and that you have.
42. Do you think you are overqualified for this position?
Regardless of your qualifications, state that you are very well qualified for the position.
43. How do you propose to compensate for your lack of experience?
First, if you have experience that the interviewer does not know about, bring that up: Then, point out (if true) that you are a hard working quick learner.
44. What qualities do you look for in a boss?
Be generic and positive. Safe qualities are knowledgeable, a sense of humor, fair, loyal to subordinates and holder of high standards. All bosses think they have these traits.
45. Tell me about a time when you helped resolve a dispute ?
between others. Pick a specific incident. Concentrate on your problem solving technique and not the dispute you settled.
46. What position do you prefer on a team working on a project?
Be honest. If you are comfortable in different roles, point that out.
47. Describe your work ethic ?
Emphasize benefits to the organization. Things like, determination to get the job done and work hard but enjoy your work are good.
48. What has been your biggest professional disappointment?
Be sure that you refer to something that was beyond your control. Show acceptance and no negative feelings.
49. Tell me about the most fun you have had on the job.
Talk about having fun by accomplishing something for the organization.
50. Do you have any questions for me?
Always have some questions prepared. Questions prepared where you will be an asset to the organization are good. How soon will I be able to be productive? and What type of projects will I be able to assist on? are examples.
And Finally Best of Luck Hope you will be succussful in the interview you are going to face in coming days.
"Never take some one for granted,Hold every person Close to your Heart because you might wake up one day and realise that you have lost a diamond while you were too busy collecting stones." Remember this always in life.
Web Design Information
Good web Design and register domain more Topics Tips Available
Visit here : http://webdesigningreviews.com/index.html
Visit here : http://webdesigningreviews.com/index.html
uSe gOOglE 2 fiNd crAcKs n paTChiNg exes
now 4 searching cracks on google just follow these steps….
these r d steps as instructed below:
1) Go to google
2) type this syntax in search bar ” 94FBR”
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it
For example>>> go to www.google.com
type> NERO 94FBR
nd search. U gets of keygens for nero{burning rom app}. ..
Now you receive Many pages which contains Serial no, Crack, Patches….
nJoY. . .
these r d steps as instructed below:
1) Go to google
2) type this syntax in search bar ” 94FBR”
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it
For example>>> go to www.google.com
type> NERO 94FBR
nd search. U gets of keygens for nero{burning rom app}. ..
Now you receive Many pages which contains Serial no, Crack, Patches….
nJoY. . .
Increase Sound of ur s60 mobile
How to Increase Sound of ur s60 mobile?
Just Go To:
>Tools
>Settings
>Enhancement settings
>Change enhancement from Headset to Loopset.
>Tools
>Settings
>Enhancement settings
>Change enhancement from Headset to Loopset.
Subscribe to:
Posts (Atom)