click here http://www.esnips.com/doc/7f993235-e6dc-4ccc-b107-7ee46b69f793/pc-security(reg) now just download it and make it full version by the side txt files key.... ................................................. folder lock without software 1 If you have a log in password for your account, this can be used to protect folders from other users. Your hard drive must be f ormatted using NTFS (which it probably is unless you're dual booting with another operating system). Here's what to do... Right-click the folder that you want to make private and choose "Properties" (or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box. Click Apply . If you do not have a password on your account, a box will pop up asking if you want to assign a password. This must be done if you want to make the folder private, so click Yes . You will need to use your password to log on to your computer from then on. Type in a password then confirm it. Click the "Create Password" button then close the Password window. Click OK in the Properties dialog box. Now anyone else logged on to your computer can't access that file without knowing your password. ----------------------------------------------------------------------------------- 2 if ur folder is zipped then directly u can open the file in it and see .... ADD A PASSWORD and confirm ur password and it ll b safe ----------------------------------------------------------------------------------- |
Saturday, March 27
Password protected folders with & with out SOFTWARE
Multiple G talk...
If you have multiple google talk ID's and wants to login with more than one google talk ID at the same time then don't worry, you can login with more than one google talk ID at the same time using this tip. There is no need to install any other google talk multi messenger version, you can easily covert your normal google talk messenger into multi messenger and enjoy your many ID's at the same time. 1)Right click on the Google Talk shortcut. 2)click on Properties. 3)Go to Shortcut tab on Google Talk Properties window. 4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original). “c:\program files\google\google talk\googletalk.exe” /nomutex 5)Click on OK. I didn't have to do anything after this and clicking on the shortcut multiple times just gave me different google talk window. Alternative:- To create a new shortcut for Google Talk: 1)Right-click on the desktop or anywhere you want to place the GTalk shortcut. 2)Select New on the right click context menu. 3)Then select Shortcut. 4)Copy and paste the following line to the text box when prompted to type the location of the item: “c:\program files\google\google talk\googletalk.exe” /nomutex 5)Click on Next. 6)Give the shortcut a proper name such as Google Talk or Google Talk Multiple or Google Talk Polygamy. 8)Click OK until you are done. |
Speed up your computer by disabling the Thumbnail Previews
If you are suffering from a slower computer and would like to speed it up with some easy to do hacks, you can consider Turning off Windows Messenger and improve your PC Performance and speeding up your folder browsing. The buck however doesnt stop here, you can still improve the performance of your computer by disabling Thumbnail Previews for speedier computer browsing. It would be of interest to know that the process to show the thumbnail preview may slow down the file listing process when opening folder with large video files. Thumbnail previewing usually causes slower PC performance owing to the errors which might happen because Windows needs a proper codec in order to correctly and validly create a thumbnail for video media. Without the presence of a codec, or in a situation where codec is broken or buggy, generating a thumbnail for the media file will have problem. This article describes a step by step process for disabling Thumbnail previews for faster computer browsing. Follow the steps below to disable thumbnail previews for a faster computer experience. The below mentioned process makes use of a simple hack which effectively makes use of regsvr32. regsvr32 is a command-line utility in Microsoft Windows operating systems for registering and unregistering DLLs and ActiveX controls in the Windows Registry. Using the hack mentioned below, we de-register the associated DLLs which control the preview generation for the specific files. Once the DLLs are de-registered, the thumbnail preview generation process is not initialized. Disable Thumbnail Preview of Video and Media Files 1.) Click on Start –> Run Image: Disabling Thumbnail Preview Generation for Video Files 2.) Type in regsvr32 /u shmedia.dll for disabling thumbnail preview for video and media files. This will disable the thumbnail preview generation for video and other media files. In order to restart the thumbnail preview generation process, type regsvr32 shmedia.dll at Run and re-open the folder. Disable Thumbnail Preview of Images 1.) Click Start –> Run. Image: De-registering DLL for disabling thumbnail preview generation for images. 2.) At Run type regsvr32 /u shimgvw.dll to disable thumbnail preview generation of images. In order to re-enable thumbnail preview generation of images, type regsvr32 shmedia.dll at Run and refresh or re-open the folder. This will again register the DLL shimgvw.dll with the registry and thus allowing for thumbnail generation for image type files. This above hack will help you definitely speed up your computer and also avoid it from getting crashed in case of a corrupted file/ missing codec which at times can even lead to 100% CPU utilization. |
Voice in MS OFFICE Word 2007
Use a Voice Command
You can use sound in Microsoft Office Word.
1. In the Word document, place your cursor where you want your voice message to go.
2. Click Insert, and then in the Text section, click the Insert Object button.
3. In the Object dialog box, on the Create New tab, in the list of object types, select Wave Sound.
4. Click OK, and then record your own voice note.
Make your USB Disks perform Faster
This simple hack is particularly useful if you leave your USB Hard Disk permanently connected to your laptop or PC. If you are sure that the USB drive will always be connected, it can be configured to perform faster. Follow the steps below to configure your USB Drive to perform faster. 1.) In Control Panel, click on System. Under System dialog, click on Hardware and then Device Manager. 2.) Under Device Manager, expand the Disk Drives section.Optimizing USB Disks for Performance 3.) Select your Drive and right click to open Properties. Performance Tuning your USB Drive 4.) Under Policies, select Optimize for Performance. Click OK. That is it. You are done. For a USB drie, when you enable Optimize for Performance, it is enabled for write caching which in turn leads to beter speed and therefore better performance. |
Increasing net Speed
HI... U r visiting this post as
A nice little tweak for XP Pro. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..) Here's how to get it back: Click Start-->Run-->type "gpedit.msc" without the " This opens the group policy editor. Then go to: Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab. I am Quoting it for Reference: "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default." So the trick is to ENABLE reservable bandwidth, then set it to ZERO. works on XP Pro, and 2000 |
Automatic Screen Refresh Tips
Follow the given steps to change the updates automatically.
First click on Start button then type Regedit in Run option.
In Registry Editor panel go to the path:
HKEY_LOCAL_MACHINE / System / CurrentControlSet /
Control / UpdateMode
Here in right hand side panel edit the DWORD value to be between 1 and 5.
Now restart your computer after any changes to go into effect.
MAKING WINDOWS XP GENUINE THE EASY WAY
download jellybean keyfinder from this website
http://www.magicaljellybean.com/keyfinder.shtml
Now open keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************
P.S: this works on windows xp sp2 only......
ppl u can try this out...
this might sound silly but it works perfectly...
TRY INSTALLING IE7 OR MEDIA PLAYER11.
Thursday, March 18
Traffic Program
input clk;
input rst;
output ls;
output ss;
output sw;
output sn;
output se;
output rs;
output red_s;
output ys;
output ps_r;
output ps_g;
reg ls;
reg ss,sw,sn,se;
reg rs;
reg red_s,red_e;
reg ys;
reg ps_r;
reg ps_g;
reg [3:0]ps,ns;
reg [31:0]div;
reg [3:0]cnt;
wire clk_s;
parameter[3:0]start=4'b0000;
parameter[3:0]south_g=4'b0001;
parameter[3:0]south_orange=4'b0010;
parameter[3:0]south_r=4'b0011;
parameter[3:0]west_g=4'b0100;
parameter[3:0]west_orange=4'b0101;
parameter[3:0]west_r=4'b0110;
parameter[3:0]east_g=4'b0111;
parameter[3:0]east_orange=4'b1000;
parameter[3:0]east_r=4'b1001;
parameter[3:0]north_g=4'b1010;
parameter[3:0]north_orange=4'b1011;
parameter[3:0]north_r=4'b1100;
always@(posedge clk or posedge rst)
begin
if(rst)
div<=2'b00;
else
div<=div+1;
end
assign clk_s=div[20];
always@(posedge clk_s or posedge rst)
begin
if(rst)
cnt<=4'b0;
else
cnt<=cnt+1;
end
always@(posedge clk_s or posedge rst)
begin
if(rst)
ps<=start;
else
ps<=ns;
end
always @(ps)
case(ps)
start:ns<=south_g;
south_g:begin
if(cnt==10)
ns<=south_orange;
else
ns<=south_g;
end
south_orange:begin
if(cnt==14)
ns<=south_r;
else
ns<=south_orange;
end
south_r:begin
if(cnt==15)
ns<=west_g;
else
ns<=south_r;
end
default:ns<=start;
endcase
always@(ps)
begin
red_s<=0;
rs<=0;
ss<=0;sw<=0;sn<=0;se<=0 ;
ls<=0;
ps_g<=0;
ys<=0;
ps_r<=0;
case(ps)
start:begin
red_s<=1;
end
south_g:begin
ls<=1;
rs<=1;
ss<=1;
ps_r<=1;
end
south_orange:begin
ls<=1;
ys<=1;
ps_r<=1;
end
south_r:begin
ls<=1;
red_e<=1;
ps_r<=1;
end
west_g:begin
ls<=1;
red_s<=1;
ps_r<=1;
end
west_orange:begin
ls<=1;
red_s<=1;
ps_r<=1;
end
west_r:begin
red_s<=1;
ps_r<=1;
end
north_g:begin
sn<=1;
red_s<=1;
ps_r<=1;
end
north_orange:begin
ps_g<=1;
red_s<=1;
end
north_r:begin
red_s<=1;
ps_r<=1;
end
east_g:begin
se<=1;
red_s<=1;
ps_r<=1;
end
east_orange:begin
red_s<=1;
ps_r<=1;
end
east_r:begin
red_s<=1;
ps_r<=1;
end
default:begin
red_s<=0;
rs<=0;
ss<=0;sw<=0;sn<=0;se<=0;
ls<=0;
ps_g<=0;
ys<=0;
ps_r<=0;
end
endcase
end
endmodule
Saturday, March 6
How Computer virus work?
How Computer virus work? and How To Protect from these Viruses? | |
owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs
that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable
code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or
carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to
other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses
A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
E-Mail Viruses
An E-Mail virus could be a form of a macro virus that spreds itself to all the contact located in the hosts email address book, If any of the e-mail recipients open the attachment of the infected mail, It spreads to the new host's address book contacts, and then proceeds to send itself to all those contacts as well. These days, e-mail viruses van infect host even if the infected e-mail is previewed in a mail client. One of the most common and destructive e-mail viruses is the ILOVEYOU virus.
Boot Sector Viruses
A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating systems to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence.
A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect per-written data on a CD, which eventually stopped such viruses from spreading.
Though boot viruses still exist, they are rare compared to new age malicious software. Another reason why they're not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive.
Worms
A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
How protect from these viruses ?
You can protect yourself against viruses with a few simple steps:
* If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses (and unwanted human visitors) away from your hard disk.
* If you are using an unsecured operating system, then buying virus protection software is a nice safeguard.
* If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses. In addition, you should disable floppy disk booting -- most computers now allow you to do this, and that will eliminate the risk of a boot sector virus coming in from a floppy disk accidentally left in the drive.
* You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.....
Friday, March 5
Google Search
Here are some search syntax basics and advanced tricks for Google.com. You might know most of these, but if you spot a new one, it may come in handy in future searches. |
• A quote/ phrase search can be written with both quotations ["like this"] as well as a minus in-between words, [like-this].
• Google didn’t always understand certain special characters like [#], but now they do; a search for [C#], for example, yields meaningful results (a few years ago, it didn’t). This doesn’t mean you can use just any character; e.g. entering [t.] and [t-] and [t^] will always return the same results.
• Google allows 32 words within the search query (some years ago, only up to 10 were used, and Google ignored subsequent words). You rarely will need so many words in a single query – [just thinking of such a long query is a hard thing to do, as this query with twenty words shows] – however, it can come in handy for advanced searching... especially as a developer using the Google API.
• You can find synonyms of words. E.g. when you search for [house] but you want to find “home” too, search for [~house]. To get to know which synonyms the Google database stores for individual words, simply use the minus operator to exclude synonym after synonym (they will always show as bold in the SERPs, the search engine result pages). Like this: [~house -house -home -housing -floor].
• To see a really large page-count (possibly, the Google index size, though one can only speculate about that), search for [* *].
• Google has a lesser known “numrange” operator which can be helpful. Using e.g. [2000..2005] (that’s two dots inbetween two numbers) will find 2000, 2001, 2002 and so on until 2005.
• Google’s define-operator allows you to look up word definitions. For example, [define:css] yields “Short for Cascading Style Sheets” and many more explanations. You can trigger a somewhat “softer” version of the define-operator by entering “what is something”, e.g. [what is css].
• Google has some exciting back-end AI to allow you to find just the facts upong entering simple questions or phrases like [when was Einstein born?] or [einstein birthday] (the answer to both of these queries is “Albert Einstein – Date of Birth: 14 March 1879”). This feature was introduced April this year and is called Google Q&A. (See some of the various working Q&A sample queries to get a feeling for what’s possible.)
• Google allows you to find backlinks by using the link-operator, e.g. [link:blog.outer-court.com] for this blog. The new Google Blog Search supports this operator as well. In fact, when Google’s predecessor started out as Larry Page’s “BackRub” in the 1990s, finding backlinks was its only aim! However, not all backlinks are shown in Google today, at least not in web search. (It’s argued that Google does this on purpose to prevent reverse-engineering of its PageRank algorithm.)
• Often when you enter a question mark at the end of the query, like when you type [why?], Google will advertise its pay-for-answer service Google Answers.
• There a “sport” called Google Hacking. Basically, curious people try to find unsecure sites by entering specific, revealing phrases. A special web site called the Google Hacking Database is dedicated to listing these special queries.
• Google searches for all of your words, whether or not you write a “+” before them (I often see people write queries [+like +this], but it’s not necessary). Unless, of course, you use Google’s or-operator. It’s an upper-case [OR] (lower-case won’t work and is simply searching for occurrences of the word “or”), and you can also use parentheses and the “|” character. [Hamlet (pizza | coke)] will find pages containing the word (or being linked to with the word) “Hamlet” and additionally containing at least one of the two other words, “pizza” or “coke”.
• Not all Google services support the same syntax. Some services don’t allow everything Google web search allows you to enter (or at least, it won’t have any effect), and sometimes, you can even enter more than in web search (e.g. [insubject:test] in Google Groups). The easiest thing to find out about these operators is to simply use the advanced search and then check what ends up being written in the input box.
• Sometimes, Google seems to understand “natural language” queries and shows you so-called “onebox” results. This happens for example when you enter [goog], [weather new york, ny], [new york ny] or [war of the worlds] (for this one, movie times, move rating and other information will show).
- Not all Googles are the same! Depending on your location, Google will forward you to a different country-specific version of Google with potentially different results to the same query. A search for [site:stormfront.org] from the US will yield hundreds of thousands of results, whereas the same search from Germany (at least if you don’t change the default redirect to Google.de) returns... zilch. Yes, Google does at times agree to country-specific censorship, like in Germany, France (Google web search), or China (Google News).
• For some search queries, Google uses its own ads to offer jobs. Try entering [work at Google] and take a look at the right-hand advertisement titled e.g. “Work at Google Europe” (it turns out, at the moment, Google Switzerland is hiring).
• For some of the more popular “Googlebombed” results, like when you enter [failure] and the first hit is the biography of George W. Bush, Google displays explanatory ads titled “Why these results?”.
• While Google doesn’t do real Natural Language Processing yet, this is the ultimate goal for them and other search engines. A little What-If Video [WMV] illustrates how this could be useful in the future.
• Some say that whoever turns up first for the search query [president of the internet] is, well, the President of the internet. (I’m applying as well, and you can feel free to support me with this logo.)
• Google doesn’t have “stop words” anymore. Stop words traditionally are words like [the], [or] and similar which search engines tended to ignore. Sometimes, when you enter e.g. [to be or not to be], Google even decides to show some phrase search results in the middle of the page (separated by a line and information that these are phrase search results).
• There once was an easter-egg in the Google Calculator that made Google show “42” when you entered [The Answer to Life, the Universe, and Everything]. As I’ve been alerted in the forum, the easter egg only works lower-case.
• You can use the wildcard operator in phrases. This is helpful for finding song texts – let’s say you forgot a word or two, but you remember the gist, as in ["love you twice as much * oh love * *"] – and similar tasks.
• You can use the wildcard character without searching for anything specific at all, as in this phrase search: ["* * * * * * *"].
• Even though www.googl.com is nothing but a “typosquatter” (someone reserving a domain name containing a popular misspelling) and search queries return very different results than Google, the site is still getting paid by Google – because it uses Google AdSense.
• If you feel like restricting your search to university servers, you can write e.g. [c-tutorial site:.edu] to only search on the “edu” domain (you can also use Google Scholar). This works for country-domains like “de” or “it” as well.
How to Crack a Windows XP Administrator Password
Password Protect Folders in XP
Password Protect Folders in XP | |
There are two ways to password protect a folder built into Windows XP (for other Windows flavors, there are some freeware/shareware programs out there).
Method 1:- If you have a log in password for your account, this can be used to protect folders from other users. Your hard drive must be formatted using NTFS (which it probably is unless you're dual booting with another operating system). Here's what to do...
Right-click the folder that you want to make private and choose "Properties" (or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box.
Click Apply . If you do not have a password on your account, a box will pop up asking if you want to assign a password. This must be done if you want to make the folder private, so click Yes . You will need to use your password to log on to your computer from then on.
Type in a password then confirm it. Click the "Create Password" button then close the Password window.
Click OK in the Properties dialog box.
Now anyone else logged on to your computer can't access that file without knowing your password.
Method 2:- If the Folder is Zipped you can give it a unique password.
Just double-click the zipped folder. In the top menu select File then click "Add a Password".
Type a password into the Password box. Then again in the "Confirm Password" box.
Now, you are the only person who can access files in this folder. The folder can be opened allowing the files to be seen, but you are the only one who can access them.
How to enlarge your notebook batteries life
How to enlarge your notebook batteries life | |
Most of our time, the capacity of our notebook battery is not enough for our work and life. If you don’t have money for Apple Macbook , Dell and HP that have acclaimed battery life of 8 hours, this few tips will help to enlarge your notebook battery life a little longer:
1. Use only the power cord that came with your notebook or other authorized replacement.
2. When you don’t use it, follow the correct maintenance for your notebook.
3. Don't leave it in direct sunlight, areas where it will be exposed to extreme temperatures such as car trunks.
4. If your notebook has power management features, use it, so the system will run at lower processor speeds when enabling power management features and it will go into "sleep" mode faster when inactive.
5. Buy notebooks with internal Li-Ion batteries. Non Li-Ion batteries must be fully discharged and recharged every 2-3 weeks.
6. If you don't use your notebook for a period of time, you must fully discharge then recharge it, so the battery will last longer.
Difference between "http" & "https"
FIRST, MANY PEOPLE ARE UNAWARE OF: **The main difference between http:// and https:// is. It's all about keeping you secure**
HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.
The important thing is the letter S which makes the difference between HTTP and HTTPS.
The S (big surprise) stands for "Secure". If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.
This means that the website is talking to your browser using the regular 'unsecure' language.
In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website.
If you fill out a form on the website, someone might see the information you send to that site.
This is why you never ever enter your credit card number in an http website!
But, if the web address begins with https://
You understand why this is so important, right?
If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://
If it doesn't, there's no way you're going to enter sensitive information like a credit card number.
Alternatives to Adobe Reader
Granted, there is Adobe Reader Lite, a lighter version of Adobe Reader. However when it is compared to other free alternatives, its performance is still lagging with the space consumption is relatively large.
Anyway here is a list of great alternatives to Adobe Reader and the best thing about these applications is they are all FREE.
1. Foxit Reader
Foxit Reader is small in size (approximately 3.5 MB) but features almost everything Adobe Acrobat Reader has. This FREE PDF viewer allows users to view and print out their PDF documents. PDF documents can be opened at lightning speed and users can convert PDF document to its original document. It works well with Windows Me/2000/XP/2003/Vista.
Note: I have been using this software for a long time.
Download Foxit Reader
2. Cool PDF Reader
I bet this is the smallest PDF reader with only 600 KB++ in size and it is reflected on its simple installation. Cool PDF Reader can do common PDF reader job; view, print ect. Interestingly it can also convert PDF files to other extension such as TXT, JPG, BMP, GIF, WMF, PNG and EPS. It works in 68 different languages and supports all version of PDF files.
Download Cool PDF Reader
3. PDFescape
No installation required. Seriously, all you need is only a browser. PDFescape is a new way to open PDF files and escape from the typical software requirements for using the de facto document file format. With PDFescape, you can fill in PDF forms, add text and graphics, add links, and even add new form fields to a PDF file.
Download PDFescape
4. PDF Hammer
PDF Hammer is another Free online PDF application. It functions as a reader and also allows users to edit PDF documents. Users can combine or merge PDF documents together, reorder, rearrange and delete pages. You can also lock your PDF files with password-based security and edit or add document information fields including author, subject, title and keywords.
5. Perfect PDF Reader
Perfect PDF Reader is a free download and it runs on both 32and 64 bits Windows platforms. The Visual C++ 2008 runtimes are required for it to function properly and it can be downloaded during installation. Basically there are three views to choose from - reading view, standard and a full screen reading. With Perfect PDF extraction of images and text is made easy. Either type of element can be copied, selected and pasted elsewhere.
Download Perfect PDF Reader
6. Sumatra PDF
Sumatra has a minimalistic design. It is small and launches itself very fast. It is great for portable use because it is just a one file with no external dependencies. You should include this in your USB pen drive.
Download Sumatra PDF
7. PDF-XChange Viewer
This PDF viewer is is smaller, faster and more feature-rich than other available readers. You might be surprised just how quickly your large PDF files open and pages smoothly refresh as they are scrolled.
* Add comments and annotations to any PDF file
* Type directly on any PDF page
* Markup pages with text and objects
* Export PDF pages or entire files to BMP, JPEG, TIFF, PNG and more
* Make your navigation of large PDF files both simple and enjoyable with the Loupe and Pan tools
* Extract text from a PDF page or file
Download PDF XChange Viewer