Wednesday, April 30, 2014

How to create New Partition without Formatting a Hard Disk















If your Hard-disk contain 3 partitions in your PC and you need
to create 1 more partition then what will you do? Most of
people are doing the following methods to create new partition
in Hard-disk.
Format the Hard-disk and create a new partition. Let’s see an
easier method to create a new partition without formatting a
Hard-disk.
To do this we don’t need any software and also no need to
copy the data to separate drives. By doing the following
methods we can create a New Partition from System Drive.


Right Click on My Computer
Click Manage
Now “ Computer Management” window will appear.
In that window Click Storage
Then select Disk Management.
In that window Hard-disk and other Storage Media detail will
be shown.
Now select a Disk drive to create a New Partition.
Right Click on particular Drive then Click Shrink Volume.
Now windows will show the free space in particular partition.
Type the disk size to create New Partition in Shrink Window.
Now click on “Shrink” , within few seconds a New Disk will be
created.
Still Accessible is not done in New Disk.
Now Right Click on Unallocated Drive . Select New Simple
Volume.
Click on Next. Now give a size to the New Partition. (you can
choice whole size right now)
Select a Drive letter and Click on Next.
Then select Format Setting ->
File System ->
NTFS. And keep others as default. (if you need you can change
this)
Put a tick on “Performances a Quick Format” and Click on Next.

Now the New Partition is created successfully.

How To Watch Youtube Video With Fast Buffering

1. Go to start

2. Type in CMD "Run as Administrator"

3. Paste this to the command box:
netsh advfirewall firewall add rule name="MITCHRIBARYTUBE" dir=in action=block

4. Hit Enter

After you done this go and test it by watching your favorite video on Youtube...

How to Customize 'Send to' Menu


The ‘Send to’ is a option that appear when we right click on a file or a folder in windows, send to be a very time consuming activity which help us to move files or folders from one location to another in just 1 or 2 clicks. By customizing Send to list we can easily add some other destinations which we use frequently.




  • To customize Send to menu, open explorer and type the following in address bar :

%APPDATA%\Microsoft\Windows\SendTo


  • You will now able to delete existing shortcuts or add new shortcuts to the list.



  • To add new program to the list, right click on blank area, choose new, shortcut and follow the wizard.



  • Choose the program file or we can also add shortcuts to drive or folders.



  • Complete the wizard and see the result.


How To Make Pendrive Bootable Using CMD





Yes the easiest and best method to make pendrive bootable for windows 7,windows 8 and windows XP so on is by CMD.

Follow Following Steps To make Pendrive Bootable:





Step 1:



1.Start Command Prompt by typing CMD in the start menu and must run it as administrator.

2.Type DISKPART

3.Type LIST DISK
Note down the disk number (###) of your USB drive.

4.Type SELECT DISK #
(replace#with the disk number e.g.SELECT DISK 1).

5.Type CLEAN

6.Type CREATE PARTITION PRIMARY

7.Type SELECT PARTITION 1

8.Type ACTIVE

9.Type FORMAT FS=NTFS

10.Type ASSIGN

11.Type EXIT




Step 2:



Now we will copy the bootsector from the original disk or file saved to ur hard-disk.
If you have an image you will need to mount it using a tool like Slysoft Virtual Clone Drive.

Now I am assuming that the drive letter for the installer disc is X. You need to open up CMD one again.

1.Type X:
2.Type CD BOOT
3.Type BOOTSECT.EXE/NT60 E:
where E is the USB drive letter.

Now that the DVD is setup all you need to do is copy the contents of the DVD to the USB Drive (or extract the ISO file).
Now All Done.
:-)


How To Boot Into Safe Mode On Windows 8 or 8.1














Old safe mode was enabled by pressing F8 key in windows 7 or Windows XP. But windows 8 and windows 8.1 does not supports it. In windows 8 or + you have to be trick to enable safe mode in Windows 8 or windows 8.1.

On your computer hold the Shift button and mash the F8 key, this will sometimes boot you into the new advanced “recovery mode”, where you can choose to see advanced repair options.

You will need to click on the Troubleshoot option.
Now select Advanced Options.

Now choose the Windows Startup Settings option, by the looks of things we were never meant to find Safe Mode.

Finally hit the Restart button.


Like magic, when your PC reboots you will be able to boot into Safe Mode from the familiar looking Advanced Boot Options screen.

Start Safe Mode When Windows 8 Start:
using this option you can start Safe Mode automatically whenever you will start windows 8 automatically. Press the Win+R key combination and type msconfig in run & hit enter.
Switch over to the boot tab, and click on the Safe Boot check box.
You can also choose the type of Safe Mode you want to boot into:
Minimal is normal safe mode.
Alternate Shell is safe mode with command prompt
Network is safe mode with networking.
The Active Directory option pertains to restoring a server that is a Domain Controller for your network. Once you have chosen your option click the ok button and restart your machine.
You PC will be booted into Safe Mode automatically.
If you restart you PC you will just keep getting booted into Safe Mode, to stop this open msconfig again and uncheck the Safe Boot option, then hit the ok button.
Finally Restart your Machine.

How to Bomb Email Account With PHP Script

1. Paste this code in notepad:

<?php
$mail = 1;
do {
mail ("Victim E-Mail", "subject",
"message", "From Email Can Be
Fake");
} while($mail < 50000);
?>


In the above script, replace "Victim
E-Mail" with the email of the person
you intend to wreak havoc on.

Replace "subject" with what you
want the subject of your mail to be.

With "message" replace this with
what you want your email message
to be (the actual content or body of
the email).

With "From Email
Can Be Fake", replace this with a
fictitious email of your choosing


2. Now save this file as index.php

3. Now the third step is to host this site on internet. Now a days there are many free web hosting sites my favorite is hostinger/000webhost

4. Now go to the hosted site Url until all the mails are sent. This hack will send 50000 email to the victims mail which Your script will run as long as it takes for your domain to be closed down.






The script basically runs on a do while loop. So you can send anything up to 50,000 emails to someone. The above information has it uses. I'll let you decide what you want to do
with it. A problem I've noticed inherent in bombing an email account, is that the majority of your emails will be sent into the victims junk box. You may now be thinking well what's the point then?. Trust me though, if you're trying to get a message across to someone, they'll notice the addition of 1000 emails a
day in their junk box. This isn't your ordinary load of junk mails. You can combine the php email bombing script along with other forms of attack too. I once had someone frozen out of all their IM (instant messenger accounts). While they were frozen out of their accounts, I
was repeatedly bombing the persons email accounts. I got my message across.

MS Office Excel Shortcut Keys

Shortcut                  Description


F2                            Edit the selected cell.
F5                            Goto a specific cell.
F7                            Spell check selected text and/or document.
F11                          Create chart.
Ctrl + A                    Select all.
Ctrl + B                    Bold.
Ctrl + C                    Copy.
Ctrl + F                     Find(same as Shift + F5).
Ctrl + G                    Go To.
Ctrl + H                    Replace.
Ctrl + I                      Italic.
Ctrl + K                    Insert link.
Ctrl + N                    New Workbook.
Ctrl + O                    Open Workbook.
Ctrl + P                     Print dialog.
Ctrl + S                     Save.
Ctrl + U                     Underline.
Ctrl + V                     Paste.
Ctrl + Z                     Undo.
Ctrl + Y                     Redo.
Ctrl + X                     Cut.
Ctrl + 5                      Strike through text.
Ctrl + F3                    Define Name.
Ctrl + F4                    Exit Excel.
Ctrl + F6                    Switch between open workbooks.
Ctrl + F9                    Minimize current window.
Ctrl + F10                  Maximize current window.
Shift + F1                   Activate Help on Item.
Shift + F2                   Insert Comments.
Shift + F3                   Insert Function.
Ctrl + Shift + ;            Enter the current time.
Ctrl + ;                        Enter the current date.
Ctrl + Page down        Move to next worksheet.
Ctrl + Page up             Move to previous worksheet.
Ctrl + Shift + #            Number Format: Date
Ctrl + Shift + @          Number Format: Time.
Ctrl + Shift + !             Number Format: Commas.
Ctrl + Shift + $            Number Format: Currency
Ctrl + Shift + %           Number Format: Percentage.
Ctrl + Shift + ^            Number Format: Scientific.
Ctrl + Space                Select entire column.
Shift + Space               Select entire row.
Ctrl + (Arrowkey)        Move to next section.


USB/ADB Drivers

Asus Drivers - All Asus Devices

Motorola Drivers - All Motorola Phones

Google Drivers - Nexus S, Nexus 4, Nexus 7, and Nexus 10.

This driver will not work on the Galaxy Nexus.

Galaxy Nexus Drivers - Works with both GSM and CDMA(Verizon) Galaxy Nexus.

Samsung Drivers - Most Samsung Phones

If the above Samsung Drivers do not work, please try the
following:
2. Search for your phone using the search box.
3. Once you find your phone, click Support in the top right of the
phone's product page.
4. In the list of downloads, download and install the USB Driver.

1. Go to the Samsung Mobile site


HTC Drivers - Most HTC Phones

If the above HTC Drivers do not work, please try the
following:
1. Go to the HTC site
2. Search for your phone using the search box.
3. Once you find your phone, click Support in the bottom left of
the phone's product page.
4. In the support page, click the downloads tab.
5. Download the HTC Sync application.
6. After downloading HTC Sync, start the installation process.
You only need to install the USB driver and not the app itself.


Sony Drivers - Most Sony Phones


LG Electronics Drivers - Most LG Phones

If the above LG Electronics Drivers do not work, please try the
following:
1. Go to the LG Electronics site
2. Search for your phone using the search box.
3. Once you find your phone, click the Resources tab.
4. In the support page, click the downloads tab.
5. Download and install the USB driver.


Huawei Drivers - All Huawei Phones


ZTE Drivers - All ZTE Phones


How to "Delete Administrator Password" without any software

Method 1


Boot up with DOS and delete the sam.exe and sam.log files from
C:\Windows\system32\config
in your hard drive.

Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.






Method 2



Put your hard disk of your computer in any other pc.

Boot that computer and use your hard disk as a secondary hard disk (Don't boot as primary
hard disk ).

Then open that drive in which the victim’s window (or your window) is installed.

Go to location
C:\Windows\system32\config

Delete SAM.exe and SAM.log

Now remove hard disk and put in your computer.

Now boot your computer.


How to Easily Find SERIAL KEYS from Google

1) Go to google.com


2) Write the name of the software you want key and add 94FBR at the end.


eg :- if you want to find key of IDM then write "IDM 94FBR" (without quotes)


3) Search it and you will find many sites with serial keys of that software.






Note:  We can't guarantee 100% success with this trick, but it works for some softwares.



How to Take a Screenshot on Android

If You're Running Ice Cream Sandwich (4.0) and Above


If you have a shiny new phone with Ice Cream
Sandwich or above, screenshots are built right
into your phone! Just press the Volume Down
and Power buttons at the same time, hold them for a second, and your phone will take a
screenshot. It'll show up in your Gallery app for you to share with whomever you wish!



If You're Running Android 2.3 and Below


Unfortunately, Android 2.3 and below doesn't
have screenshotting built-in. However, some
devices (like many Samsung phones) do have
these features, but it varies from phone to
phone. for example, on many Samsung phones, you can press the Home and Power buttons at the same time to take a screenshot. Google around to see if your own phone has a built-in shortcut.

If your phone doesn't have a shortcut built-in,
you'll need to use an app like No Root Screenshot It . You'll need to install it on your phone and install its free companion app on your computer, which will enable screenshots. You'll have to plug your phone back into your computer every time you reboot it, but you'll be able to take screenshots directly from your phone which is great.



If You're Rooted and Running Android 2.3 or Below


If you've rooted your phone , you have a few
options. You can install an app like Screenshot UX , which will allow you to take screenshots through a variety of shortcuts, or you could flash a custom ROM that has screenshotting built-in (like CyanogenMod).


Set your Network Card’s IP address using Command Prompt

Most everybody can figure out how to change their IP address using Control Panel, but did you know you can set your network card’s IP address using a simple command from the command prompt?


Note:  The following commands require you to have an administrative command prompt open by right-clicking on the icon and choosing Run as Administrator.


1. Changing Your IP Address


netsh interface ip set address name=”Local Area Connection”
static 192.168.0.1 255.255.255.0 192.168.0.254


You want to statically assign an IP address of 192.168.0.1
You want to set a subnet mask of 255.255.255.0
You want to set a default gateway of 192.168.0.254



2. Set static IP address to getting an address from DHCP


netsh interface ip set address name=”Local Area Connection”
source=dhcp




3. Changing Your DNS Settings

netsh interface ip set dns name=”Local Area Connection” static
192.168.0.250




4. The name of the interface you want to change the primary


DNS setting for is Local Area Network
The IP address of the DNS Server is 192.168.0.250




5. To change the IP address of the secondary DNS server you will need to specify the index parameter:


netsh interface ip add dns name=”Local Area Connection”
8.8.8.8 index=2




6. Set your DNS settings to be assigned dynamically


netsh interface ip set dnsservers name=”Local Area Connection”
source=dhcp
for more cmd>netsh help


ZC Dream Photo Editor - Freeware


File Type : EXE

Size :  38.8 MB







Create Calendar

You can easily Insert calendar in your photo collages and then change the displying format of the calendar as your will. Please click menu "Design">"Calendar" to create your own photo calendar.


Insert WordArt

You can edit words with outline, shadow or even several kinds of Texture effects!

Support High Resolution

It support high resolution images. You can easy to use your high resolution photos to make a beautiful collage.

Flash Import Speed

You can import large images at flash speed! Without wait a long time, you can enjoy your drawing time!

Build-in Templates

With more professional drawn templates. Using simple click , you can design some professional photo collages immediately.

With both big frames and subframes

You can not only add the build-in frames to your collage but also to one of the photos in your collage.

Download


Avast 2014 Full Version Free With Serial Keys

File Type : EXE 

Size : 84.8 MB







Description 

Avast ! Free Antivirus can ensure the protection of your computers from viruses and spyware thanks to its powerful and advanced detection engines.



Key features 


  • Interface: Its well-organized interface shows all the available features in the main window, which allows easy understanding and ease of use. 
  • Types of scan: Four scanning modes are available: quick scan, full system scan, removable media scan and select folder to scan. The last one is an in-depth scan of a specified location. If you are in a hurry, select "Quick scan" mode, it only lasts for a few minutes while "Full System" mode needs at least half an hour. 
  • Customizable installation: Even if you have already installed an anti-virus on your computer, you can install Avast as a second anti-virus software for more safety thanks to compatibility mode. When installing Avast, you can select the components that suit you really. 
  • Database updates: With this new version, no need to wait for a traditional database update, Avast Virus Lab cloud will send each virus signature to you in real-time. 

System requirements 


Hardware 


CPU : Pentium 3 
RAM : 128 MB 
Free hard disk space : 200 MB 

Software : 

Windows 2000 SP4, XP, Vista and 7 

Pros: 

Fast scanning process. 
Light footprint on hardware resources. 
Automatic updates. 

Cons: 

The boot time scanner is rather long.

Download


Serial Keys

C2080008R9941A0911-N9H4S8YM

(This key is valid until 2016)
1......Open Avast.
2......Click on maintenance tab.
3......Choose Insert License file
4......Paste the serial key here and click ok..
5......Congrats.. enjoy Avast registered version for free !


Lisence Keys:

W1208070R9900D1199-T549MYK0
C2080008R9941A0911-N9H4S8YM



Monday, April 28, 2014

Microsoft ActiveSync 4.5

File Type : MSi Package Installer

Size : 7.5 MB







Microsoft ActiveSync 4.5 is the latest sync software release
for Windows Mobile-powered devices. ActiveSync provides a
great synchronization experience with Windows®-powered PCs
and Microsoft Outlook right out of the box.
  1. Faster file transfer speed and photo sync via Outlook are only available for Windows Mobile 5.0 powered devices.
  2.  Remote PC Sync (via WiFi or LAN) has been removed due to Enterprise customer feedback around security issues.
  3. Customers using Microsoft Exchange 2003 Service Pack 2 with devices running the Messaging and Security Feature Pack for Windows Mobile 5.0 will benefit from the following feature enhancements included in ActiveSync 4.5: Direct Push Technology, local device wipe, and certificate powered authentication to Microsoft Exchange.
  4. Microsoft® Outlook® 2000 is not supported by ActiveSync4.5. It is highly recommended that users upgrade to Microsoft® Outlook® 2003 messaging and collaboration client.
  5. Conversion of database files for use on a mobile device is not supported by ActiveSync 4.5. On previous versions, this feature was limited to devices running Windows Mobile software for Pocket PC 2003 and earlier.
  6. Conversion of font files for use on a mobile device is not supported by ActiveSync 4.5. On previous versions, this feature was limited to devices running Windows Mobile software for Pocket PC 2003 and earlier.
**Connectivity and synchronization may require separately
purchased equipment and/or wireless products (e.g., WiFi
card, network software, server hardware, and/or redirector
software). Service plans are required for Internet, WiFi and
phone access. Features and performance may vary by service
provider and are subject to network limitations. See device
manufacturer, service provider and/or corporate IT department
for details.

Note: Microsoft ActiveSync works only with Windows XP SP2
or earlier. If you have Windows Vista, your synchronization
settings will be managed through the Windows Mobile Device
Center. Windows Mobile Device Center is available through the
Windows Mobile Device Center page.


Download

Hide Data Behind Images

Steganography is the art and science of hiding messages, Images, Data etc. in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data- security through obscurity. By using this small and neat trick you can hide whatever data you want behind any image of your choice without reducing its quality, In the following tutorial I will show you how you can hide data behind images without using any exotic software.
(Good old Winrar or Winzip is required)


  •  Create a folder in your C drive and name it as "hide"(Using Root Directory will make this a bit easier). 



  • Now you can put anything and everything you want to hide in this folder. Text files, images, executables (ANYTHING)  .Also, put the image behind which you want to hide the files in the same directory, say "image.jpg". 



  • After putting everything you want to hide in the "hide" folder, Right click on it, and click "Add to Hide.rar" or "Add to archive". Our goal is to create a .rar file of the "Hide" folder. 



  • Now you should see the "hide.rar"created in the same directory along with the folder. 



  • Now we need to open up command prompt and change the working root directory to your current directory and type the following commands.(First change directory then create the output file).(Remember "C" is capital in "C:\") 







  1.    cd C:\ 


     2.     Copy /b image.jpg + hide.rar output.jpg








Here "image.jpg" is the image behind which you want to hide the rar file.
"hide.rar" is the file containing the files to be hidden.
"output.jpg" is the output file that we want. It contains the hidden files, but looks like an image.


After executing the following command, we will see an extra image called "output.jpg" created in the same directory.(Note that it's size is size of image.jpg +size of hide.rar)

Now you can delete all the files except "output.jpg". If you double click the file, it opens a normal image. But you can see the hidden files by opening the file with winrar (Right Click->Open With->Choose WinRar.)

That's It !Now you can send this image to anyone, what others will see is just a regular image but if the recipient knows, s/he will be able to access any secret information privately.This can be used for any type of files like mp3,wmv,txt etc. since anything can be put into a Rar file. Although you may want to keep the files to be hidden as small as possible since it wouldn't be very subtle if you try hiding a 15 Gb setup file for the game,'Crysis 3' behind a 5Kb smiley picture.



Smart Install Maker With Serial Key

File Type : RAR

Size : 1.44 MB





At last! There is now a much smoother and faster way to create setup files for easy installation of applications. As a developer, you will no longer be bogged down learning complex installation programs or yet another awkward scripting language. This guarantees hassle-free programming, quicker market delivery and ultimately a faster turnaround with more satisfied users. Smart Install Maker enables the creation of a professional-looking, custom-made setup file in just a few mouse clicks. The simplicity of Smart Install Maker means:

  • No Scripts
  • No brain twisters
  • No unreasonable charges

Scripting for GUI now takes minutes – not weeks!


Creating professional setup files used to require script-powered installers, which meant learning new scripting languages and mastering complex installer maker solutions. Now there is an easier way to create great setup files.

It used to take weeks learning extremely difficult scripting language or mastering a complex setup builder, which on top of everything else was very expensive. Now it is possible to take advantage of the wizard-driven Smart Install Maker, which takes just a few minutes and a few mouse clicks to create a professional installation package. These packages are perfect for distributing over the internet, via disc or other media.

Download

How to Play Youtube Videos in VLC Media Player

Step 1: Open VLC media player, Press CTRL+N Keys to open up Network URL Dialog box...

Step 2: Open Youtube, Navigate to Whatever Video you want to Play in VLC, Copy the Url of that video and Paste it in the Dialogue Box and Click on Play....

Enjoy Your Video...




How To Access Router Without knowing Username and Password

In some cases we want to change settings of our router but suddenly we realized that we don’t know the username and password of router.Well, there is a trick , which can easy made you to login to the router with super user rights.



Just follow these steps so as to access your router without knowing username and password.

1. Open Command Prompt followed by typing cmd in run box.

To open Command Prompt

  • Press window + r  and type cmd


2. In command prompt (cmd) type ipconfig and hit enter.

3. As a result there will be a Default Gateway. Copy that address.

4. Go to your web browser and paste/type that IP of gateway (example:192.168.2O.1) and hit enter.

5. After that It will ask your for username and password.

6. Now you have to go to your modem (physically) and on bottom of the modem their will be Modem Access Code.

7. Move back to your browser and type username:admin or user and then type that modem access code in the password field.

8. Congrats....you are In.


If you know about networking then you can easily reset the router username and password with the help of hyper-terminal.
Steps are:

1. Go to the router physically and restart It.

2. Move to your PC and open hyper-terminal and press ctrl+pause/Break

3. In hyper-terminal window will be Roman>.Here you have to type confreg 0x2142 (2142 is a default register value of a router)

Now type Reload

After that type copy-- startup-config running-config

This method is used by professionals, hence not known to the most of network administrators but after reading this article you will be able to access the router without knowing the actual username and password.
This cisco trick is a type of backdoor for recovery purpose.

How to Disable USB Port

Step 1:  Goto run...
Step 2:  Type 'regedit' without quotes...
Step 3:  Click on HKEY_LOCAL_MACHINE...
Step 4:  Go to SYSTEM...
Step 5:  Click on CurrentControlSet...
Step 6:  Click on services...
Step 7:  Go to USBSTOR...
Step 8:  Double click on 'Start' where value is 3...
Step 9:  Now change the value data with 4...
Step10: Now press ok

Refresh your desktop your USB port is disabled, to enable the usb port replace the value 4 with 3...


Saturday, April 26, 2014

Eastern NC tornadoes damage homes, injure a dozen

MOREHEAD CITY, N.C. (AP) — Residents, meteorologists and emergency officials in eastern North Carolina were surveying the damage Saturday from multiple tornadoes that damaged more than 200 homes the previous day and sent more than a dozen people to the emergency room.

Meteorologists said Saturday that tornadoes with winds of more than 111 mph touched down in Pitt and Beaufort counties on Friday, and they were continuing to investigate storm damage.


Elsewhere, Texas, Oklahoma and other states in the Plains and Midwest were bracing for severe storms expected to start Saturday and continue overnight. There, the main threat will be large hail and damaging wind gusts.

In North Carolina, Beaufort County Emergency Management Director John Pack said 16 people were taken to the emergency room when the storms passed through around 7:25 p.m. Friday.

Pack said 200 homes were either heavily damaged or destroyed. Pictures on news websites showed residents salvaging items from crushed mobile homes, along with snapped trees and a mangled utility pole in eastern North Carolina.

"You can track the tornado by the damage." Pack said. "It left a lot damage behind in its approximately five to 10 minutes on the ground."
View gallery
A man goes throws a pile of clothing Saturday, April&nbsp;&hellip;
A man goes throws a pile of clothing Saturday, April 26, 2014, from the debris after a tornado touch …

Pack said the storm appeared to be about 300 yards wide and was on the ground for 10 miles. He said the line of damage started in the west-northwest portion of the county and traveled to the northeast.

At one point, Pack said, 8,000 people were without power, but most had been restored by Saturday.

Pack also said two major farming operations in the county sustained damages, but he didn't have further details.

In Halifax County, Antonio Richardson said the roof was blown off his home on Friday afternoon. He said he and a friend took shelter under his mobile home.

"It peeled back my roof, just like you would a banana," Richardson told WRAL-TV in Raleigh.

Friday, April 25, 2014

Cheat Book 2012


File Type : ZIP
Size : 58.60MB




Cheat Book is dedicated to helping you find the best Cheats you want for free. Cheat Book present you with all the latest cheats and hints for your games. If you are looking for Cheats, Cheat codes, Hints, tips for games or news, then this is the best cheat book you gonna need. Cheats book contains game cheats cheat codes tips and hints and game walkthroughs. Cheats Book is your best cheat code central on the planet for cheats and game FAQs for PC, PlayStation 3, Xbox 360, Nintendo Wii, PlayStation 2, Xbox, GameCube, Nintendo DS, PSP, and more..

CheatBook DataBase 2010



Freeware cheat code tracker Games utility that puts hints, Tips and cheats for (PC, Gamecube, Wii, XBox 360, PSP, Playstation, Walkthroughs, Playstation, Nintendo 64) easily accessible from one central location. Covering more than 19.000 Games.

CheatBook-DataBase 2010 is a freeware cheats code tracker that makes hints, Tricks, Tips and cheats (for PC, Walkthroughs, Playstation, Playstation 2, Playstation 3, Sega, Nintendo 64, Nintendo DS, DVD, Gameboy Advance, Gameboy Color, N-Gage, Nintendo DS, XBox, XBox 360, iPhone, Gamecube, Dreamcast, Super Nintendo, Wii, Sony PSP) easily accessible from one central location.

If you’re an avid gamer and want a few extra weapons or lives to survive until the next level, this freeware cheat database can come to the rescue. Covering more than 19.000 Games Cheats, this database represents all genres and focuses on recent releases. Games are listed alphabetically in the left-hand window. When you click on a game name, the relevant cheat is displayed in a editor window, with convenient buttons that let you print the selection or save any changes you’ve made. In the latest past many users of the CheatBook- DataBase and readers of the monthly being published magazine have sent to us small error messages and suggestions for improvement again and again. First of all we say “Thank you very much!” to all of you! Due to this assistance and the permanent sending in of new and revised cheats the CheatBook is ever increasing and becoming more and more voluminous.

Download

Project IGI: I'm Going In With Trainer And Unlocked Levels


File Type : RAR

Size : 229MB

Minimum Requirements

Win 95/98
PII 300
64MB RAM
3D accelerated card w/ 8MB RAM
4x CD-ROM
500MB hard drive space

Supported Functions

Number Of Players: 1
Memory Card


Features :

Strong underlying storyline running alongside the action; unique gaming environment allowing vast panoramic landscapes and unlimited zoom capability; interact with a variety of moving vehicles including tanks and apc's cable cars, jets and helicopters; accurate military equipment and software 12 special ops weapons and in game spy satellite access through your field pda; all weapons based on field research conducted with ex sas soldiers; real world physics and interactive environment bullets rip through wooden floors but ricochet off metal staircases.


Download

Passwword For RAR Archive

sharoonqadeer.blogspot.com


Saturday, April 19, 2014

Looming, creeping landslide splits home in Wyoming

JACKSON, Wyo. (AP) — A slow-motion disaster is unfolding in the Wyoming resort town of Jackson as a creeping landslide that split a hillside home in half inches toward more houses and businesses below.
The ground beneath the 100-foot hillside has been giving way an inch at a time since the movement was discovered on April 4.Assistant Town Administrator Roxanne Robinson said by Friday, the rate of movement was doubling every day.Officials say the hillside is unlikely to suddenly collapse like the March 22 landslide in Oso, Wash., that killed 39 people. But the threat is real and authorities are enforcing an evacuation order in hopes of avoiding injuries.

The area has been graded for roads and businesses in recent years, possibly weakening the hillside and setting the stage for the landslide.

Friday, April 18, 2014

Styllish And Elegant Frocks Designs

Frocks have been integrated into eastern clothing to a great extent. No function or party is considered completed unless frocks are used as dresses. Asian frocks are very popular world wide for their diversity
and culture. Hundreds of frocks designs are available according to every occasion. Bridal frocks are heavy and full of work. Party frocks have usually light work. Zari, kora dabka, motifs,  stones and embroidery are used. These works make the look of frocks beautiful and attractive. Most commonly design used for frock is Anarkali style. Other styles are also popular including Air line, Umbrella etc. Dress designers keep bringing in new styles of frocks with time. Following are some beautiful and attractive frock designs. You can follow these designs to create a stylish dress for yourself.


Learn the secret codes to shopping success

NEW YORK, April 16 (Reuters) - As superstore pricing mysteries go, it's not the equivalent of "The Da Vinci Code," but there's still something deliciously elusive about the so-called "Costco Code" that has set the tongues of shopping mavens wagging for the past several months.
At least the plot line is direct enough: If you can interpret what the various sequences of digits and asterisks mean on Costco Wholesale Club price signs, you're on your way to scoring serious bargains.

Here's how it works, according to Costco shoppers spreading the word online: If a price at Costco ends in .99, you're paying full price. But if it ends in, say, a .97, it represents a deal with a special price decided by the manager. And if you happen to see an asterisk in the upper right corner of the sign, then the item is on its way out of the store-and probably at the lowest price you're going to see.

"That asterisk, that's the holy grail," says Kyle James, who runs the shopping blog Rather-Be-Shopping.com (http://www.rather-be-shopping.com/). He has shopped at Costco for 20 years now, and the Redding, California resident has studied the matter of the Costco Code well. By his count, he and his wife have saved at least $300 using the Costco Code over the last seven months.

For the record, he doesn't claim to have discovered it; he says there's been Internet chatter about Costco and its pricing system going back about five years before he took up the topic on his blog.

So is the Costco Code really so much of a pricing potboiler as it seems? No one would know as well as Costco's Richard Galanti, who's the company's executive vice president and chief financial officer.

Indeed he confirms that the codes do exist, though "It's more for efficiency, for the employees," Galanti says. "It's not any sort of secret agent stuff. But you see it on a blog and people think it's a secret. It's just a way of moving some merchandise, to help the fork lift operators and the stocking clerks."

Galanti says that "when a price ends in a '7,' usually it's a buyer designated markdown." And as for those asterisks, "That's what we call a pending delete. Sometimes an item's not selling well and we want to move it out, or it could be the end of the season. Let's say we've got three TV models and the latest and greatest comes out; we might want to bring the newest one in."

But Galanti cautions against reading too much into the price codes, as Costco's margins are low enough (in the 10-11 percent range) that a shopper might have more advantage buying a newer item at the ".99" full price. "The question is, do you want something at the end of its season or at the beginning of a new season?" he asks.

Retail experts say that such pricing codes and systems are common. At his website, James lists price tag codes that he's found for retailers under the juicy heading "Retailer's Big Secret: Crack the Price Tag Code."

Paula Rosenblum, managing partner of RSR Research, a retail technology research and advisory firm says Home Depot indicator is a green tag, while at Office Depot, anything with a price other than 00, 50 or 99 is a markdown.

As for why, chalk it up to something not quite as old as the human desire to crack secret codes, though it does predate computers and the digital age.

"It all goes back to the retail method of accounting, and it's a very old story," Rosenblum says. "Before the days of price scanners, and when there was no technology in the store at all, a seven at the end of a price let associates know where they were with the item. If they couldn't move it in three weeks, it was gone."

Still, she can't help throwing in an observation for consumers who choose to make note of the code, and where asterisks are most likely to appear: "Costco's non-food items don't always move fast enough, so those might be good items to add to the treasure hunt."

Much of James' information from comes from chatting up employees (many of whom have requested anonymity). At Target , for example, he says that the discounting system on clearance items, as told to him by a sales associate, goes like this: "They mark something down every 10 to 15 days. And the upper right hand corner of the clearance tag, which is red and white, has the numbers 15, 30, 50, 75 or 90 on it. And that number indicates the percentage off the original price."

Target would not confirm it uses such a mechanism. "It is not possible to determine the final markdown or timing of the price change from the item's current price," Target spokesman Evan Lapiska said.

But Lewis says his key advice for fellow shoppers on the hunt for price tag secrets is this: "Talk to the employees on the floor. I've found they're pretty open about it."

In a cloning first, scientists create stem cells from adults

 NEW YORK (Reuters) - Scientists have moved a step closer to the goal of creating stem cells perfectly matched to a patient's DNA in order to treat diseases, they announced on Thursday, creating patient-specific cell lines out of the skin cells of two adult men.

The advance, described online in the journal Cell Stem Cell, is the first time researchers have achieved "therapeutic cloning" of adults. Technically called somatic-cell nuclear transfer, therapeutic cloning means producing embryonic cells genetically identical to a donor, usually for the purpose of using those cells to treat disease.


But nuclear transfer is also the first step in reproductive cloning, or producing a genetic duplicate of someone - a technique that has sparked controversy since the 1997 announcement that it was used to create Dolly, the clone of a ewe. In 2005, the United Nations called on countries to ban it, and the United States prohibits the use of federal funds for either reproductive or therapeutic cloning.

The new study was funded by a foundation and the South Korean government.

If confirmed by other labs, it could prove significant because many illnesses that might one day be treated with stem cells, such as heart failure and vision loss, primarily affect adults. Patient-specific stem cells would have to be created from older cells, not infant or fetal ones. That now looks possible, though far from easy: Out of 39 tries, the scientists created stem cells only once for each donor.

Outside experts had different views of the study, which was led by Young Gie Chung of the Research Institute for Stem Cell Research at CHA Health Systems in Los Angeles.

Stem cell biologist George Daley of the Harvard Stem Cell Institute called it "an incremental advance" and "not earth-shattering."

Reproductive biologist Shoukhrat Mitalipov of Oregon Health and Science University, who developed the technique the CHA team adapted, was more positive. "The advance here is showing that (nuclear transfer) looks like it will work with people of all ages," he said in an interview.

A year ago, Mitalipov led the team that used nuclear transfer of fetal and infant DNA to produce stem cells, the first time that had been accomplished in humans of any age.

ELECTRIC JOLT

In therapeutic cloning, scientists use a zap of electricity to fuse a grown cell, usually a skin cell, with an ovum whose own DNA has been removed. The egg divides and multiplies, and within five or six days it develops into an embryo shaped like a hollow sphere.

The interior cells are "pluripotent" stem cells, which have the potential to develop into any kind of human cell.

If the embryo were implanted in a uterus, it could develop into a clone of the DNA donor, which is how Dolly was created. "Without regulations in place, such embryos could also be used for human reproductive cloning, although this would be unsafe and grossly unethical," said Dr Robert Lanza, chief scientist of Massachusetts-based biotech Advanced Cell Technology and a co-author of the new study.

The goal is to grow these embryonic stem cells in lab dishes and coax them to turn into specialized cells for therapeutic use against an illness the DNA donor has, such as Parkinson's disease, heart disease, multiple sclerosis or type-1 diabetes. Because the cells are genetically identical to the donor's, they would not be rejected by the immune system.

Despite more than 15 years of trying, scientists' single success at producing human stem cells through this cloning technique came a year ago. Mitalipov's team at Oregon had fused fetal and infant cells with donated eggs whose DNA had been removed and got them to develop into about 150-cell embryos.

One key to Mitalipov's success was letting the engineered eggs rest for 30 minutes before zapping them to start dividing.

Chung and his colleagues waited two hours before triggering the egg to start dividing, which Lanza believes was a key to their success: "It gives you time for the massive amount of genetic reprogramming required" to turn back the calendar on adult DNA so that it can direct the development of an embryo, he said in an interview.

It worked: They generated two healthy embryos, one from each adult donor, aged 35 and 75.

If each stem-cell line has to be created from scratch for each patient, the low success and expected high costs means that "only a few wealthy old men could do it," said Lanza. A big barrier to producing patient-specific stem-cell lines for tens of millions of people this way is that few women want to donate eggs, a sometimes painful process.

But it may not be necessary to make a unique cell line for each patient. Many people have genetically similar immune systems, Lanza said, so just "100 human embryonic stem cell lines would generate a complete match for over half the (U.S.) population," he said.

Captain not at helm of capsized Korean ferry

Jindo (South Korea) (AFP) - The captain was not at the helm of the South Korean ferry that capsized two days ago, investigators said Friday, as anger spread over stalled rescue efforts for hundreds of missing passengers trapped by the submerged vessel.
Related Stories

    S. Korea ferry rescue stalls as anger spreads AFP
    South Korea investigates capsized ferry crew as rescue hampered by tides Reuters
    Survivors still alive on South Korean ferry: father Reuters

    Divers struggle in search for South Korean ferry survivors Reuters
    Divers search for hundreds missing after Korean ferry accident Reuters

More than 48 hours after the 6,825-tonne Sewol suddenly listed and then sank, a small of army of more than 500 exhausted divers -- battling powerful currents in almost zero visibility -- have yet to obtain any access to the ferry's interior.

The confirmed death toll rose overnight to 25, but the focus of concern remained the 271 people still unaccounted for -- hundreds of them children on a high school outing to the southern resort island of Jeju.

The newly recovered bodies were all floating in the water, coastguard officials said, as the dive teams worked in shifts to find a way inside the submerged vessel in the increasingly slim hope of finding survivors trapped in air pockets.

Unable to secure an entry point for now, they bored holes in the keel -- a small section of which was still visible above the water -- for oxygen lines.

"Two divers are currently injecting oxygen into the ship," a coastguard official told AFP.
View gallery
South Korea ferry accident
Graphic on the South Korean ferry accident, including details of the final course of the ship (AFP P …

The weather conditions were extremely challenging, with rain, fog and strong sea swells

Of the 452 people on board the Sewol when it capsized Wednesday morning, 179 were rescued, but no new survivors have been found since Wednesday.

Three giant, floating cranes had arrived at the disaster site, but coastguard officials said they could not begin lifting the multi-layered ferry until they were sure there were no survivors inside.

Among the relatives of the missing, especially parents of the 352 students who were on board , there was growing resentment over what they see as the inadequacy of the rescue response.

- 'The government lied' -
View gallery
South Korean divers prepare to go the location where&nbsp;&hellip;
South Korean divers prepare to go the location where a ferry capsized two days ago, at a harbor in J …

In an appeal broadcast live on television Friday morning, a self-appointed spokesman for the relatives accused the authorities of indifference and deception.

"The government lied yesterday," he said, speaking at a podium in a gymnasium on Jindo island where hundreds of blanket-wrapped relatives have been sleeping on the floor since the tragedy unfolded.

Disputing the official figures of hundreds of divers, vessels and aircraft being deployed, he said he and other relatives had visited the rescue site and seen only a dozen ships and helicopters.

"Everyone, is this the reality of South Korea? We plead once more, please save our children," he said.

The initial public backlash has centred on the captain, Lee Joon-Seok, and his 28 crew, most of whom survived the disaster.
View gallery
Students at Danwon High School hold a vigil for the&nbsp;&hellip;
Students at Danwon High School hold a vigil for the missing passengers of a South Korean capsized fe …

State prosecutors said preliminary investigations showed the third officer was at the helm of the ferry.

"The captain was not in command when the accident took place," prosecutor Park Jae-Eok told a press briefing.

The captain was "in the back" he added, without elaborating.

The captain apologised Thursday to the victims and their relatives, but offered no clear explanation for what caused the Sewol to capsize.

"I feel really sorry for the passengers, victims and families," Lee said. "I feel ashamed."
View gallery
Coast Guard and Navy divers search for the missing&nbsp;&hellip;
Coast Guard and Navy divers search for the missing passengers from a capsized ferry at sea some 20 k …

Tracking data from the Maritime Ministry showed that the ferry made a sharp turn just before sending its first distress signal.

Some experts believe such a tight turn could have dislodged the heavy cargo manifest -- including more than 150 vehicles -- and destabilised the vessel, causing it to list heavily and then capsize.

But others suggested the turn might have been caused by a collision with a rock or other submerged object.

"Whether or not they took a drastic turnaround ... is under investigation," prosecutor Park said, adding that they were also looking at the possibility of steering or other mechanical failure.

As well the cause of the disaster, investigators will be looking at why passengers were ordered to stay in their cabins and seats for up to 40 minutes after the ferry ran into trouble.

- 'I believe they are alive' -

Furious relatives believe many more people would have escaped if they had reached evacuation points before the ship listed sharply and water started flooding in.

Lee Yong-Gi, whose son Lee Ho-Jin was among the missing students, said he and other parents felt bitterly let down by the rescue operation.

"It's been two days but no one has been brought out alive," Lee told AFP.

"I firmly believe that the kids are alive. We need to rescue them as soon as possible. But officials are dragging their feet," he said.

Newspaper editorials were equally scathing with the Dong-A Ilbo daily calling the rescue response "ludicrous".

"We have the world's finest shipbuilding industry in the 21st century, but our mindset is in the 19th century," the newspaper said.

In a tense meeting with parents in the Jindo gymnasium on Thursday, President Park Geun-Hye was repeatedly interrupted by angry shouts from the crowd.

"What are you doing when people are dying? Time is running out!" one woman screamed.

School Apologizes for Sending the Wrong Message About Bullying

A Nebraska school is facing criticism for what many are calling an ill-intentioned effort to deal with bullying. Fifth-grade students at Zeman Elementary School in Lincoln were recently given pamphlets containing what may be considered tone-deaf advice, shaming the victim and sending the wrong message to bullies.

More on Yahoo: Bullying Injuries in Schools Dip, but
Still ProblematicThe pamphlet, which was posted to sites such as Reddit and Jezebel, features nine "rules" for students dealing with bullies.  One rule states: "Do not tell on bullies.""The number one reason bullies hate their victims, is because the victims tell on them," the flyer reasons. "Telling makes the bully want to retaliate. Tell an adult only when a real injury or crime (theft of something valuable) has occurred. Would we keep our friends if we tattled on them?"This goes against most antibullying advice, which encourages young people to get a trusted adult involved in the situation before it escalates.More on Yahoo Shine: Parents Slap Daughter's Cyberbullies With Rare Lawsuit

Other rules in the Zeman Elementary guide included "Learn to laugh at yourself," "Do not verbally defend yourself," and "Treat the person who is being mean as if they are trying to help you."

After the pamphlet was sent home with kids, numerous parents complained to the school.  Some parents claimed that the tips weren't so much advice as they were ways to keep the school from having to discipline students.

Not long after the backlash, school officials at Zeman Elementary went on Facebook to issue an apology. (The school itself does not have an official Facebook page, so the post was sent via the Lincoln Public Schools, or LPS, page.) "Our educators at Zeman Elementary School work hard to provide accurate and appropriate lessons and education for our students in how to handle bullying situations," reads the statement. "The flyer was sent home with good intentions, unfortunately, it contained advice that did not accurately reflect LPS best practices regarding response to bullying incidents. We encourage all students and parents to continue to communicate with our staff if you have any questions or concerns about bullying situations."

But according to the LPS communications director, Mary Kay Roth, the flyers weren't supposed to be sent home with kids at all.  In a statement to the Lincoln Journal-Star, Roth referred to the flyer being distributed as a "staff issue" and added that "we're taking care of the staffing error."

Still, not everyone is buying the apology. "Whoever wrote this or was in charge of passing it out should step down or be fired immediately. You're pretty much saying you don't care about bullying and you're not going to deal with it unless the child incurs serious bodily harm," one outraged parent wrote on Facebook.

Another commenter wondered how the fallout would affect the students. "What have the students who were given bad information been told? Have they all been instructed that this was bad information and been given good information? Or is that being left to the parents?"

According to the student services director, Russ Uhing, who spoke with the Journal-Star, the school's fifth-graders are learning about bullying prevention in class, and the advice they're getting is "very different" from the "rules" they were initially given. Meanwhile, the school's Facebook apology included some more reasonable tools for dealing with bullying via a PDF link to a different flyer. Those updated tips, aimed at parents and kids alike, included “Do not minimize or make excuses for bullying behaviors,” “Promote a strong sense of self and confidence in your child,” and “Teach your child to take action when they see others being bullied.” Those tips are bound to be more helpful to kids than rules such as “Do not verbally defend yourself.”

Thursday, April 17, 2014

Are we facing another housing bubble?

In a housing or real estate bubble, home prices inflate because of overly optimistic speculation that they'll keep rising. When people can't afford to keep up, the bubble bursts. Demand for homes decreases, while supply goes up and home prices drastically drop.Today, certain markets across America are seeing home prices go up so quickly that people are starting to worry about another bubble. So where do we stand?From 2000 to 2006, home prices were skyrocketing. Why? It was fueled by overly-optimistic speculation on real estate, careless lending standards and very low mortgage rates. At the height of the bubble, homes were overvalued by 39%.

Also see: Shark Tank Secrets of Success -- Building an Untouchable Career

Built on that shaky foundation, when prices cooled millions of people defaulted on their mortgages and the bubble didn’t just burst, it exploded, creating the biggest real estate and credit crisis in modern history.

Fast-forward to the present day, and we’re still in recovery mode. With tighter lending standards it’s harder to buy a home, but in the past two years certain markets have seen prices rise rapidly again, leading some to wonder if history will soon repeat itself.

One area that’s heating up is California — the most overvalued market in the nation. Prices there have increased about 17% year-over-year, with Orange County being the hottest metro area. The increases in California are more generally due in part to investors taking up the tight supply and tech millionaires willing to pay premium prices. The other overvalued metros, like Honolulu, Austin and Miami, are also dealing with high demand and tight supply.

911 calls capture chaos after truck-on-bus crash

ORLAND, Calif. (AP) — With shrieks in the background, a shocked passenger struggled to recount to an emergency dispatcher how a FedEx tractor-trailer smashed into a tour bus carrying high school students. In other 911 calls released Thursday, other witnesses described explosions after the fiery wreck that left 10 people dead.
Related Stories

    NTSB: No evidence of pre-impact fire in CA crash Associated Press
 Drivers in California crash had clean records Associated Press
    Investigators probe deadly FedEx crash with bus MarketWatch
    California fatal bus crash: Was FedEx truck cargo involved? Christian Science Monitor
    Investigators focus on wreckage in deadly California crash Reuters

The California Highway Patrol released the recordings as investigators returned to the scene about 100 miles north of Sacramento to reconstruct aspects of the crash.

Dozens of injured students escaped through windows before the bus exploded into towering flames just before 6 p.m. April 10.

One student who escaped held back sobs in describing on a 911 call how the FedEx truck barreled across the median of Interstate 5 and smashed into the bus.

A dispatcher assured the student that medical help was coming and told the student to "go as far away as you can safely get" when he learned that the bus was still engulfed in flames.

Later, the dispatcher asked, "What did the bus hit?" and the student started to explain that the truck smashed into its left side. The dispatcher tried to refocus the student: "Just with one or two words, tell me what the bus hit."

"The bus hit a FedEx truck," the student replied. "The FedEx truck came into us."
View gallery
File - In this April 10, 2014, file photo, massive&nbsp;&hellip;
File - In this April 10, 2014, file photo, massive flames engulf a tractor-trailer and a tour bus ju …

"Was it head on?"

"Yes, head on."

It was not clear whether the student was a boy or girl. None of the 911 callers were identified.

Other calls came from witnesses and nearby residents.

"A bus just exploded," said one woman.

"It just exploded," said one man. "Whatever's on the freeway is on fire."
View gallery
In This Photo Provided By The University Of La Verne,&nbsp;&hellip;
In This Photo Provided By The University Of La Verne, Trish Arzola, the mother of Arthur "Tury& …

The bus was carrying 44 high school students from the Los Angeles area for a visit to Humboldt State University on California's far north coast. Many stood to be the first in their family to attend college.

Five students and three adult chaperones died, along with the truck and bus drivers.

As the CHP released the recordings, the agency's investigators were reconstructing how the bus driver might have reacted to the sight of the big rig, which burst out of vegetation on the freeway's median into oncoming traffic, sideswiping a car before hitting the bus.

The CHP briefly closed the stretch of Interstate 5 where the crash happened and drove the same model Serta 2014 bus northbound at about 70 mph. The driver braked so investigators could gauge how its speed would have dropped.

On the southbound side, a driver in the same model 2007 Volvo truck released the accelerator, in a similar effort to understand how its speed might have changed.

Video cameras on both vehicles recorded what each driver could have seen before the crash.

The reconstruction did not include any collision. Investigators will use what they learned to calculate how fast each vehicle was traveling before the wreck.

The truck's data recorder was destroyed in the explosion and fire, but investigators said they may be able to recover some data about its speed and maneuvering by other forensic analysis.

Investigators are working through a 3-inch-thick stack of records including the truck's maintenance history and its driver's recent shifts, CHP Capt. Todd Morrison said. The FedEx driver had no prior moving violations, according to the California Department of Motor Vehicles.

It is too early to say whether mechanical failure or driver error caused the truck to careen out of control, Morrison said. That determination by the CHP, and by a parallel investigation by the National Transportation Safety Board, will take months.

The driver of the car struck first by the truck told investigators the truck was in flames before the crash, but Morrison said the CHP has found no evidence to corroborate that account. NTSB investigators also found no physical evidence of a pre-impact fire or other witnesses relating the same story.

Glenn County Coroner Larry Jones said all but two victims have been identified. He said that initially, his office was looking for one student believed to be among the dead, but it turned out the student had never boarded the bus in the first place.

App Claims It Can Help Couples Conceive Girls

From artificial insemination to in vitro fertilization, there's no shortage of ways that technology is helping couples who want to have children. But a new iPhone and Android app called StorkDiet/Girl claims that it can people have a baby girl for a fee of just $9.99.

Alain Hanash, who created the app, used data from a study conducted by two British universities that tracked the eating habits of 740 women who were pregnant for the first time. The study found that 56 percent of the women who followed a low-sodium, low-calcium diet had baby girls. The app, following that approach, tailors a nine-week diet for women who are hoping to get pregnant with a girl.  “It is a natural and scientific based guide that includes a specific maternal diet and conception timing program," according to the app's description.

More on Yahoo Shine: 7 crazy myths for predicting your baby's gender But Dr. Gilbert Webb, a maternal fetal medicine specialist at the Mercy Hospital in St. Louis, is wary of putting too much stock in at-home methods of gender selection. “It may offer some slight edge but not a whole lot,” Webb tells Yahoo Shine.  He warns prospective parents not to think that this app – or anything else – is 100 percent guaranteed. Although the creators of StorkDiet claim that they have an 81 percent success rate, the evidence is inconclusive, according to some medical experts.

More on Yahoo: Couple keeps baby's gender under wraps A Maastricht University study had participants eat plenty of spinach, tofu, and nuts like almonds and cashews, while strictly avoiding high-sodium foods like olives, cured meats, and potatoes in order to produce female offspring. The study boasted a 77 percent success rate in producing girls, but once that number was broken down to account for women who didn’t follow the diet closely enough or who didn’t follow the strategic rules for when to have sex, the data began to fall apart.

Dr. Webb adds that there’s nothing wrong with hoping for a baby of a particular sex, but he cautions against being too attached to one or the other. “If someone is realistic about these techniques, and says 'we'd prefer a girl, but we'd be OK with a boy,' that’s fine. But if they have a strong feeling and latch on to these things with strong wording, they can become neurotic,” he says

When ‘Liking’ a Brand Online Voids the Right to Sue

Might downloading a 50-cent coupon for Cheerios cost you legal rights?

General Mills, the maker of cereals like Cheerios and Chex as well as brands like Bisquick and Betty Crocker, has quietly added language to its website to alert consumers that they give up their right to sue the company if they download coupons, “join” it in online communities like Facebook, enter a company-sponsored sweepstakes or contest or interact with it in a variety of other ways.Instead,
anyone who has received anything that could be construed as a benefit and who then has a dispute with the company over its products will have to use informal negotiation via email or go through arbitration to seek relief, according to the new terms posted on its site.In language added on Tuesday after The New York Times contacted it about the changes, General Mills seemed to go even further, suggesting that buying its products would bind consumers to those terms.“We’ve updated our Privacy Policy,” the company wrote in a thin, gray bar across the top of its home page. “Please note we also have new Legal Terms which require all disputes related to the purchase or use of any General Mills product or service to be resolved through binding arbitration.”

The change in legal terms, which occurred shortly after a judge refused to dismiss a case brought against the company by consumers in California, made General Mills one of the first, if not the first, major food companies to seek to impose what legal experts call “forced arbitration” on consumers.

“Although this is the first case I’ve seen of a food company moving in this direction, others will follow — why wouldn’t you?” said Julia Duncan, director of federal programs and an arbitration expert at the American Association for Justice, a trade group representing plaintiff trial lawyers. “It’s essentially trying to protect the company from all accountability, even when it lies, or say, an employee deliberately adds broken glass to a product.”

General Mills declined to make anyone available for an interview about the changes. “While it rarely happens, arbitration is an efficient way to resolve disputes — and many companies take a similar approach,” the company said in a statement. “We even cover the cost of arbitration in most cases. So this is just a policy update, and we’ve tried to communicate it in a clear and visible way.”

A growing number of companies have adopted similar policies over the years, especially after a 2011 Supreme Court decision, AT&T Mobility v. Concepcion, that paved the way for businesses to bar consumers claiming fraud from joining together in a single arbitration. The decision allowed companies to forbid class-action lawsuits with the use of a standard-form contract requiring that disputes be resolved through the informal mechanism of one-on-one arbitration.

Credit card and mobile phone companies have included such limitations on consumers in their contracts, and in 2008, the magazine Mother Jones published an article about a Whataburger fast-food restaurant that hung a sign on its door warning customers that simply by entering the premises, they agreed to settle disputes through arbitration.

Companies have continued to push for expanded protection against litigation, but legal experts said that a food company trying to limit its customers’ ability to litigate against it raised the stakes in a new way.

What if a child allergic to peanuts ate a product that contained trace amounts of nuts but mistakenly did not include that information on its packaging? Food recalls for mislabeling, including failures to identify nuts in products, are not uncommon.

“When you’re talking about food, you’re also talking about things that can kill people,” said Scott L. Nelson, a lawyer at Public Citizen, a nonprofit advocacy group. “There is a huge difference in the stakes, between the benefit you’re getting from this supposed contract you’re entering into by, say, using the company’s website to download a coupon, and the rights they’re saying you’re giving up. That makes this agreement a lot broader than others out there.”

Big food companies are concerned about the growing number of consumers filing class-action lawsuits against them over labeling, ingredients and claims of health threats. Almost every major gathering of industry executives has at least one session on fighting litigation.

Last year, General Mills paid $8.5 million to settle lawsuits over positive health claims made on the packaging of its Yoplait Yoplus yogurt, saying it did not agree with the plaintiff’s accusations but wanted to end the litigation. In December 2012, it agreed to settle another suit by taking the word “strawberry” off the packaging label for Strawberry Fruit Roll-Ups, which did not contain strawberries.

General Mills amended its legal terms after a judge in California on March 26 ruled against its motion to dismiss a case brought by two mothers who contended that the company deceptively marketed its Nature Valley products as “natural” when they contained processed and genetically engineered ingredients.

“The front of the Nature Valley products’ packaging prominently displays the term ‘100% Natural’ that could lead a reasonable consumer to believe the products contain only natural ingredients,” wrote the district judge, William H. Orrick.

He wrote that the packaging claim “appears to be false” because the products contain processed ingredients like high-fructose corn syrup and maltodextrin.

Arbitration experts said courts would probably require General Mills to prove that a customer was aware of its new policy before issuing decisions denying legal action against the company.

The policy is so broadly written, lawyers say, that it is likely to raise interesting legal questions.

For instance, on Tuesday an order was placed through the company’s online store for a Cheerios bowl, before General Mills posted the notice about the change to its legal terms on its home page.

At no point did the order system suggest changes had been made to the legal terms governing the buyer. It offered a link to the company’s privacy policy, and two opt-out boxes for receiving promotional materials through email.

Whether a court would rule that, under the new policy, the buyer of the bowl could not sue General Mills was unclear, since the General Mills home page now included a message about the changes it had made to its legal terms.

“A transaction has taken place that, according to General Mills, includes an agreement to submit to informal negotiation or arbitration in the event of a dispute,” Mr. Nelson said.

He said he did not think a court would agree to enforce the policy if a consumer merely visited a General Mills website, “but we really don’t know.”

“You can bet,” he said, “there will be some subpoenas for computer hard drives in the future.”