Express "I Love You" in Foreign speeches

English -     I love you
Nepali -     Ma Timilai Maya Garchhu
Chinese     Ngo oiy ney a
Mandarin Chinese -    Wo ai ni
French -     Je t'aime, Je t'adore
Irish -     Taim i' ngra leat
Italian -     Ti amo
Japanese - Aishiteru
Korean -     Sarang Heyo
Latin -     Te amo
Zimbabwe - Ndinokuda
Afrikans -Ek het jou lief
Dutch -     Ik hou van jou
Bulgarian - Obicham te
Russian -    Ya tebya liubliu
German -     Ich liebe dich
Greek -     S'agapo
Romanian - Te ubesc
Finnish -     Mina rakastan sinua
Polish -     Kocham Cie
Filipino -     Mahal kita
Taiwanese -     Wa ga ei li
Norwegian -     Jeg Elsker Deg

Technorati Tags: ,,,
Follow ittechs on Twitter


IObit Security 360 –Free antimalware with real-time protection

IObit the makers of utilitarian windows freewares and sharewares such as Advanced SystemCare, SmartDefrag and Game Booster,Iobit Uninstaller has a very good and light antispyware software and freeware called IObit Security 360.IObit Security 360 is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the unique "Dual-Core" engine and the heuristic malware detection, IObit Security 360 detects the most complex and deepest spyware and malware in a very fast and efficient way. IObit Security 360 has a real-time malware protection and frequent updating for prevention of zero-day security threats. Designed for Windows® 7, Vista™, XP and 2000 (32bit and 64bit), IObit Security 360 can work with your Antivirus for a superior PC security

Key Features and Benefits:As IObit Security 360 suggests it works with all antiviruses , I tested with Vipre AV suit ,it works seamless and also on another PC I tested with Avira AntiVir Personal with Comodo firewall at Proactive security , it works and gel with these settings .Antimalware, antispyware, anti-adware, anti-Trojan, anti-bots, and more. IObit Security 360 can assist  your Antivirus defend any tricky and complex threats.It is very fast and light and its updates is very good especially on its Pro version but I have heard from my colleagues its free version did sometimes gives some annoyances, but I have failed to do this as am using the Pro version.

What it makes the differences from other similar line of products is its complete annoyance free installation.Take a look at the case of Super antispyware, during the installation it will ask you  to guard the changes of Home page of Internet Explorer.With Mallwarebytes Antimalware its context menu installation option is boring.

IObit Security 360 using DOG (Digital Original Gene), a novel heuristic malware detection method, IObit Security 360 can find the most complex threats.Scan & Remove is free, and real-time protection is free too. You will love this small but powerful free anti-malware genius.Remember it is the only free antimalware which will give you the real time protection for free where as its competitor such as Super antispyware and also Mallwarebytes antimalware gives these only in their Pro version.

Technorati Tags: ,,
Follow ittechs on Twitter


Different countries' Independence day :- 5

SEPT. 21, 1991 - ARMENIA
MAY 24, 1993 - ERITREA

JUNE 5, 2006 - SERBIA

Technorati Tags: ,,,
Follow ittechs on Twitter


Delete WinXP individual system restore points with CCleaner

Individual or selective removal of WinXP System Restore Points has now become more easier.System Restore Service takes space in Windows XP in a span of 2 months almost 8 GB with over 50 individual restore points.Any system changes, including minor software additions or deletions,creates a restore points even multiple restore points in a day.You can minimize this more so if you are using laptop having space constraints. Please read on .

Download the latest version of CCleaner ;important: download the version 2.19.900 on or afterwards.It now has a tool to delete individual restore points. You may download it now from www.ccleaner.com. Open CCleaner click on 'Tools' on the left hand side then click on 'System Restore' and select any individual restore point and click on 'Remove'. It is only possible to remove one at a time. Automatically the latest system restore point cannot be deleted ,never disable system restore completely because it is essential to use it for minor mishaps.Please view Full Album for more illustration.CCleaner is the tool for cleaning your Windows PC. Keep your privacy online and offline, and make your computer faster and more secure. Easy to use and a small, fast download.

Technorati Tags: ,,,



TweetLater is a fantastic tool for managing and organising yours twitter account. You can post twitter updates with a  time-delay . This gives  yours guest  an illusion that you are always  on twitter. This can pull more people towards yours twitter account and resulting enhancing popularity yours twitting. If you are a great tool making and  showing yours twitter account active  always on . TweetLater account active always on. TweetLater is used in stealth mode.

How do I add a Twitter account and then automate it?

Login to TweetLater.com.Click the "Accounts" menu tab in the top menu that's below the site logo.Click the "Add Account" sub-menu tab.Click the Continue button on the next page.That will open a page where you need to enter your twitter  username and password.Scroll down and click to check the selection boxes of the automation options you want. Scroll all the way down and click the Save button.

API Key:This API Key is the authentication mechanism that gives access to your TweetLater account to any third-party application that uses the TweetLater API. You never need to provide your TweetLater username or password to any application. If anybody asks for your username and password, then it's a scam.If you suspect that your API Key has been compromised, you can generate a new key with TweetLater.

The first thing you need to understand is, your new followers will never be processed immediately when they follow you. It is simply impossible for TweetLater to do that.When you add your Twitter account and set its automation options,TweetLater grab a copy of your follower list from Twitter and  save it in their system.After waiting several hours ,TweetLater use this new list and compare it with the previous one they grabbed.Then make the comparison and update the status of the followers.

Every time you edit your Twitter account entry and change any of the automation options, TweetLater completely reset your schedule, and  take a new snapshot of your follower list.In other words, any unprocessed new followers that followed you before you clicked the Save button will not be recognized as new followers and will not be processed. Only new followers who follow you after you've clicked the Save button will be picked up and processed the next time the bus reaches your stop.

Go here for TweetLater :Productivity tools for busy Tweeple.

Technorati Tags: ,


Manually download the latest definition updates for Windows Defender

Even all of these security measures in place ,there is still a chance for things to take an ugly turn for the worst. Windows Defender will help to protect against malware infection,malicious downloads,popups,slow performances and a variety of other internet-borne threats. To help avoid virus and malware infection, it is important to take care with all the online activities.Spyware as we all know is a program that is installed on a PC without the  users agreement and is directed at collecting personal/sensitive classified information about a user or the computer. So an anti spyware is a program that blocks malicious programs from fulfilling their intensions and Windows Defender is an anti spyware and is more capable. Many people use anti-spyware in combination so as to add multiple layers of security. But should a conflict resides, it is recommended to use only one solution at a time.

Unwanted software can be installed by websites, downloaded programs, or a program you might install from a CD, DVD, external hard disk, or a device. Spyware is most commonly installed through free software, such as file sharing, screen savers, or search toolbars ,some spyware can be installed from a website through an embedded script, or program in a webpage. Some unwanted software requires your help to install through web pop-ups or free software that require you to accept a downloadable file. However, if you keep Windows up to date and don't reduce your security settings, you can minimize the chances of a spyware infection. Some websites will repeatedly display pop-ups asking you to install a toolbar or change your home page. When this happens, try closing the browser window. If the pop-ups still appear, right-click the Internet Explorer button in the taskbar at the bottom of your screen, and then click Close Group. As a last resort, close any other programs you have open, and then restart your computer. When you visit websites, do not automatically agree to download anything the site offers. If you download free software, such as file sharing programs or screen savers, read the license agreement carefully. Look for clauses where you must accept advertising and pop-ups from the company, or that the software will send certain information back to the software publisher.

This article describes how to manually download the latest definition updates for Microsoft Windows Defender.To manually download the Windows Defender definitions for your computer, follow the steps for your operating system type, 32-bit version or 64-bit version.

After you click this link, click Run to install the definition file immediately, or click Save to save the definition file to the computer. If you click Save, remember the folder where you save the file. To install the saved definition update file, click Start, click Run, locate the folder where you saved the definition file, double-click the Mpas-fe.exe file, and then click OK. Note To install the file on a Windows Vista-based computer, right-click the file, and then click Run As Administrator to install it. When the definition file runs, a file extraction dialog box appears. The dialog box indicates that the definition update is installing. After the file extraction dialog box closes, you can verify that the Windows Defender definitions have been updated. To do this, open Windows Defender, and then check the definition version that is listed in the box at the bottom of the Windows Defender Home dialog box.

Command-line installations:

The Windows Defender definition update file (Mpas-fe.exe) can use the -q command-line execution switch. This switch installs the definition update in quiet mode. Quiet mode suppresses the definition file extraction dialog box. For example, type the following command:

    • Mpas-fe.exe –q

64-bit versions of Windows :
If you run a 64-bit version of Windows, download the Windows Defender Update Definition file by clicking one of the following links.
Note You must be running a 64-bit version of Windows to run a 64-bit version of Windows Defender. 64-bit versions of Windows include x64-based versions and Itanium-based versions. To download the Windows Defender definition update file for x64-based versions of Windows, click the following link: http://go.microsoft.com/fwlink/?linkid=70632


  1. To download the Windows Defender definition update file for 32-bit (x86-based) versions of Windows, click the following link:
  2. To download the Windows Defender definition update file for x64-based versions of Windows, click the following link: http://go.microsoft.com/fwlink/?linkid=70632
  3. Windows Defender Latest Definition Updates from softpedia:                                                    http://www.softpedia.com/progDownload/Windows-Defender-Latest-Definition-Updates-Download-104685.html

Courtesy:  http://go.microsoft.com/fwlink/?LinkID=87588&clcid=0x409 ,(KB923159)

Technorati Tags: ,,,


jetable.org :yours antispam address

To avoid spam, jetable.org provides you with a temporary email address. As soon as it is created, all the emails sent to this address are forwarded to your actual email address. Your antispam address will be deactivated after the lifespan you selected comes to its end.

jetable.org IS NOT an anonymous email service: email headers are not modified , jetable.org keeps the logs of this service.

It is simple,,put yours email address,give it a lifespan (one hour,one day,one week or one month) then click on the “Create your disposable email address”.

Apart from English language version,it is available in some other languages also. So go here and avoid spam.About jetable.org

Technorati Tags: ,


VIPfollowers- increase yours twitter followers count

If you are using lately Twitter then desire for yours augmented number of followers then VIPFollowers.com may have been yours quality alternative  to increase yours followers count. To say the least I tried it with its Regular members and got almost 50 to 60 members as my followers within a week. You can follow me at my twitter account also.

You will have to feed yours twitter account username and password in order to log in in to this so better read the privacy statement and other information before using this site. vipfollowers.com in no way affiliated with or endorsed by Twitter.com .Login, follow all the vip/regular users, then you will automatically join train.To make sure your using the right twitter account to get followers.By opting out, This will take you out of vipfollowers.com system, And you will no longer receive followers.

As this website assures

“if you are in fact, trying to gain more followers on Twitter!  Our software will guarantee that you get the maximum number of followers possible for your business, website, or fan page! ”

Privacy Policy as suggested at vipfollowers.com
Any twitter contact information is kept absolutely private. Neither your account nor anything about your account is sold or shared with any other company or agency. Occasionally, we may tweet on your account for promotion purposes. However, we do respect your right to privacy and will not send tweets if you opt out of our service.

Follow me on twitter

Technorati Tags: ,


Delete unwanted Messages of Gmail account automatically

Spam messages in yours inbox from annoying friends or family members ,ex-workers or from various vendors, making yours inbox full and wild. You are deleting ,unsubscribing these too also been one or two minutes procedure for each spams or unwanted mails.

While browsing though mine one of the favorite blog Techie Buzz just discovered one article which has good recommendations To set up automatic deletion for emails coming from a particular source in yours Gmail which simply says to you set up a filter or set up rules for Gmail to identify the particular trend and then Gmail can identify that source and will take action for you.

Credit: Techie Buzz

Open one of these unwanted emails.
Click on the drop down arrow next to Reply and select Filter messages like this.
Enter additional criteria if you want like subject and certain words that can identify these messages.
Click on Test Search to make sure gmail is identifying the right messages.
Click on Next Step.
Check the boxes Mark As Read and Delete It.
Click on Create Filter.

The messages will now be deleted from yours Gmail account automatically the sooner it reaches to yours account the sooner it will be eliminated from yours account.


Technorati Tags: ,,


My Tweet Followers- grow yours twitter network

 MyTweetFollowers. is the best place for you to grow your twitter network and gain a ton of followers.Go there,it's free and will help you get the followers you need.If you want to enhance the followers number then it its the right place you have arrived.You login and then follow people to be added to free section where people will follow you in return. MyTweetFollowersis in no way affiliated with twitter ,it is been said by this website. As this website suggests it is the best way to get tons of followers on Twitter.

You will be Log in using yours twitter  Username and Twitter Password to use MyTweetFollowers

After it you will enter into a page where you will see both the vip followers means the paid one and the regular followers , if you wish  you can go for paid vip followers but am talking about the regular followers means the free ones .This service is free until you opt for thier paid service the vip followers as the website said.After following the persons then a pop up window will come up and will say now you can join and go to the below of website then click the plus sign and you are done. "Thank you for taking the time to join MyTweetFollowers.com" this means that the process completed and thus by going through this process again and again you can increase yours followers outstandingly.

MyTweetFollowers says

MyTweetFollowers.com is the best way to find a ton of people that want to follow you on twitter! It's pretty easy to use if you just follow the simple instructions:

1. Click the follow button below the users picture to follow them.
2. You have to follow all of the VIP riders.
3. You have to follow at least 20 of the regular riders.

You can always deactivate this by going to opt out.

Website:  MyTweetFollowers


Technorati Tags: ,


Chitika New Mobile Ads Mean More Revenue For You !

Chitka begin rolling out their new Mobile Ads program across your website(s) from 18 th August!  Now, in addition to your regular Chitika ad revenue, you will earn even more from these new ads targeted to visitors viewing your website on a mobile device.Chitika mobile ads are currently displayed on the iPhone and Android only.  Other devices will be added soon.Chitka 's mobile ads are designed specifically for mobile users, and should result in more clicks and more revenue from your mobile traffic stream.  The ads are designed to be noticeable on mobile devices without hurting the experience of your site.Chitka is rolling these ads out slowly starting with a small portion of traffic, and then it will slowly increase this until mobile ads are live across the entire Chitka network.Click here for a large preview of what the mobile ads looks like on an iPhone.Mobile ads will be displayed similar to how  Select ads are displayed: only when there is a high chance the ad will result in revenue for you.  So in other words, they will not be displayed 100% of the time. Mobile earnings will depend on your mobile traffic and will work very similar to the way you earn revenue from our regular desktop ads.  There will be separate, custom reporting for mobile ads available very soon. If you have already a Chitka affilate account then  mobile ads will display automatically without any action needed on your part since  you already have Chitka's ad code running.You can easily disable mobile ads by logging in, and going to 'My Account'.  You can also re-enable then later if you change your mind or you'd like to test them out.If you have any doubts remain then please go this link to know more knowledge.Join Chitka  and generate more revenue.

Technorati Tags: ,,,


CCleaner v2.35

Whether you're passageway body part to swim this Sept, have warm memories of tercet- ring-binders and new  production, or would  neglect about your fine-tune natural events,also keep an eye on yours favorite clean crap cleaner and its update.A new version of CCleaner is available for download (25 August 2010 ).This is a big update because added a lot of new cleaning abilities, supported software, and user interface improvements.CCleaner keep your privacy online and offline, and make your computer faster and more secure. Easy to use and a small, fast download.You may download now from piriform.com/ccleaner

Full change log:

Added support to search Uninstall Tool items by Publisher.
Improved Custom Files and Folders accuracy to avoid duplicate reporting.
Improved Include/Exclude Options.
Improved Startup Tool functionality.
Improved Registry detection algorithm for Missing Shared Dlls.
Improved exception handling when cleaning W7 jumplist.
Updated URL references to use piriform.com.
Minor GUI tweaks and usability improvements.

Added Session Cleaning for Firefox and Google Chrome.
Added support for Google Chrome Canary Build.
Added support for SRWare Iron browser via Google Chrome rule.
Added support to clean custom Chromium based browsers. e.g. CustomLocation1=CHROME|C:\Chromium\IronPortable\Profile\Default CustomLocation2=CHROME|C:\ChromePlus\ChromePlusUserData\Default
Added application support for Adobe Photoshop CS5, Adobe Illustrator CS5, Adobe ImageReady CS, Nero Burning ROM 10, Google Calendar Sync and Google Talk.
Improved application support for Adobe Photoshop CS3, Google Earth, Adobe Flash Player.


Technorati Tags: ,,,,


Get 10% off on PowerDVD & Power Director

To kick off the end of summer and beginning of autumn two of CyberLink’s flagship products: PowerDVD 10 and PowerDirector 8. Both products are 10% off from August 27th until October 3rd 2010.

PowerDVD 10 Mark II takes full advantage of the latest 3D technologies enabling users to watch movies in 3D on their PCs. PowerDVD Mark II has a wealth of amazing features including: Blu-ray 3D movie playback,2D-to-3D video file playback,Enhanced TrueTheater 3D to convert 2D-to-3D for DVDs and video files.PowerDVD 10 also supports the latest music library features of Windows 7, and utilizes TrueTheater™ Surround technology to optimize performance for home theater and PC hardware.

PowerDirector 8 offers powerful video editing, with unlimited possibilities, at a fraction of the prices of other competitors’ software. Users have a range of tools and effects available to create memorable and professional videos, which they can then upload to video sharing sites such as YouTube. Registered users also have access to DirectorZone where they can download effects created by other users, and upload their own. PowerDirector 8 also offers 5x faster video rendering with increased GPU/CPU acceleration and a 16 track timeline, particle effects designer and the chance to upscale videos to HD quality.

10% off on **PowerDVD 10** (expires on October 3rd )

PowerDVD 10 Deluxe , PowerDVD 10 Standard , PowerDVD 10 Ultra

10% off on **PowerDirector 8** (expires on October 3rd )

Power Director 8 Deluxe , Power Director 8 Ultra

Technorati Tags:


Advanced System Care-3 A- Comprehensive System Utility

Having bought a PC the first thing, the principal concern of security is the second most important matter for you , in order to yours PC from countless crashes and formats. After prolonged PC usage, it becomes a tad slower, asking for PC cleaning up. Advance system care 3 (Free Pro version available) is a all rounder in system utility for protecting, cleaning, repairing and speeding up your windows PC. It involves in tasks such as deleting temporary files, internet files, recycle bin (noton recommended option, manually chosen),redundant registry entries (in the pro version deep registry cleaning available) and many others tasks that keep the system well maintained is also available.Advanced SystemCare Free (formerly Advanced WindowsCare Personal) has a one-click approach to help protect, repair, clean, and optimize your PC. Designed for Windows® 7, Vista™, XP and 2000 (32bit and 64bit)

The Interface :Four large buttons available namely: Home, Maintain, diagnose, Utility.

Home: You can get version, statistic, date and time of lest system care. The date and time  of last System care can be known by simply putting the mouse on the system bar near to the time icon. When you click on “view” under statistic , the details of the last scan, number of problem fixed , and the defragment detail can be seen.

Diagnose: Click on the “Maintain Windows” button A-SC-3. Click the scan button to start scanning yours system. This checks for spyware, privacy issues, registry problems, privacy issues and junk files. After the scan is over it will give you the number of problems discovered in each sections. Click on the each area individually to see the detection or else Click on the repair button to fix all issues at once.



ASC Pro: http://www.iobit.com/advancedwindowscarepro.html

FAQ: http://www.iobit.com/faq.html

Compare Products: http://www.iobit.com/productscompare.html

Technorati Tags: ,,


Customize Ubuntu’s user interface

Screenshot of Ubuntu 9.10 "Karmic Koala"

Image via Wikipedia

In WordWeb interface is defined as “a program that controls a display for the user (usually on a computer monitor) and that allows the user to interact with the system”. One more definition is The overlap where two theories or phenomena affect each other or have links with each other.As, we already noticed Ubuntu desktop is a simple game that is easy and not involved any complications.The bottom panel is like Windows taskbar. On the right side of the panel is the list of virtual desktops.

The one on the right can be used later and the one one the left of the virtual desktops is currently active.The trash bin is present and it is just like Windows recycle bin.Several menus visible on the desktop.The application menu comprise of all the installed applications. The place menu can be used to approach  the drives and drives of network computers. The system menus as the name suggesting deals with all the system settings,preferences,customizations, in short it can be used to tailor made yours Ubuntu desktop.The other menus are shortcuts in a way can be equated with Windows quick  launch.

How to alter menus and listings:

Right-click on any menu and then click on edit then you will be shown menus and sub menus, there you can add any items or disable any items by using the corresponding check boxes.Drag and drop the menus or items to change the arrangement of the menus.

The network activity icon,current user login icon and the clock are exhibited next to these. As Ubuntu runs on Gnome so there is much similarity of interfaces as many distros are running on it.The right most icon is for log in and log out with system rebooting and shut down commands attached to it.

How to change the log in window theme:

On the right panel , go to user name and right click on it then click set up log in screen ,click local tab,then the list of themes of log in screen displayed also included with it different ways to show log in usernames and customize it as per yours wish.


Enhanced by Zemanta