Saturday, March 27

Password protected folders with & with out SOFTWARE

HI... U r visiting this post as
website hit counter


folder lock with software

click here

http://www.esnips.com/doc/7f993235-e6dc-4ccc-b107-7ee46b69f793/pc-security(reg)


now just download it and make it full version by the side txt files key....
.................................................
folder lock without software
1
If you have a log in password for your account, this can be used to protect folders from other users. Your hard drive must be f

ormatted using NTFS (which it probably is unless you're dual booting with another operating system). Here's what to do...


Right-click the folder that you want to make private and choose "Properties"

(or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box.














Click Apply . If you do not have a password on your account, a box will pop up asking if you want to assign a password. This must be done if you want to make the folder private, so click Yes . You will need to use your password to log on to your computer from then on.
Type in a password then confirm it. Click the "Create Password" button then close the Password window.
Click OK in the Properties dialog box.
Now anyone else logged on to your computer can't access that file without knowing your password.
-----------------------------------------------------------------------------------

2
if ur folder is zipped then directly u can open the file in it and see .... ADD A PASSWORD

and confirm ur password and it ll b safe
-----------------------------------------------------------------------------------

Multiple G talk...

HI... U r visiting this post as


website hit counter
If you have multiple google talk ID's and wants to login with more than one google talk ID at the same time then don't worry, you can login with more than one google talk ID at the same time using this tip. There is no need to install any other google talk multi messenger version, you can easily covert your normal google talk messenger into multi messenger and enjoy your many ID's at the same time.  

1)Right click on the Google Talk shortcut.

2)click on Properties.

3)Go to Shortcut tab on Google Talk Properties window.

4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).

“c:\program files\google\google talk\googletalk.exe” /nomutex

5)Click on OK.


I didn't have to do anything after this and clicking on the shortcut multiple times just gave me different google talk window.


Alternative:-



To create a new shortcut for Google Talk:


1)Right-click on the desktop or anywhere you want to place the GTalk shortcut.

2)Select New on the right click context menu.

3)Then select Shortcut.

4)Copy and paste the following line to the text box when prompted to type the location of the item:

“c:\program files\google\google talk\googletalk.exe” /nomutex


5)Click on Next.

6)Give the shortcut a proper name such as Google Talk or Google

Talk Multiple or Google Talk Polygamy.
8)Click OK until you are done.

Speed up your computer by disabling the Thumbnail Previews

HI... U r visiting this post as


website hit counter






If you are suffering from a slower computer and would like to speed it up with some easy to do hacks, you can consider Turning off Windows Messenger and improve your PC Performance and speeding up your folder browsing. The buck however doesnt stop here, you can still improve the performance of your computer by disabling Thumbnail Previews for speedier computer browsing. 
It would be of interest to know that the process to show the thumbnail preview may slow down the file listing process when opening folder with large video files. Thumbnail previewing usually causes slower PC performance owing to the errors  which might happen because Windows needs a proper codec in order to correctly and validly create a thumbnail for video media. Without the presence of a codec, or in a situation where codec is broken or buggy, generating a thumbnail for the media file will have problem. 
This article describes a step by step process for disabling Thumbnail previews for faster computer browsing. Follow the steps below to disable thumbnail previews for a faster computer experience.
The below mentioned process makes use of a simple hack which effectively makes use of regsvr32. regsvr32 is a command-line utility in Microsoft Windows operating systems for registering and unregistering DLLs and ActiveX controls in the Windows Registry. Using the hack mentioned below, we de-register the associated DLLs which control the preview generation for the specific files. Once the DLLs are de-registered, the thumbnail preview generation process is not initialized.
Disable Thumbnail Preview of Video and Media Files
1.) Click on Start –> Run

Image: Disabling Thumbnail Preview Generation for Video Files
2.) Type in regsvr32 /u shmedia.dll for disabling thumbnail preview for video and media files. This will disable the thumbnail preview generation for video and other media files.
In order to restart the thumbnail preview generation process, type regsvr32 shmedia.dll at Run and re-open the folder.
Disable Thumbnail Preview of Images
1.) Click Start –> Run. 

Image: De-registering DLL for disabling thumbnail preview generation for images.
2.) At Run type regsvr32 /u shimgvw.dll to disable thumbnail preview generation of images.
In order to re-enable thumbnail preview generation of images, type regsvr32 shmedia.dll at Run and refresh or re-open the folder. This will again register the DLL shimgvw.dll with the registry and thus allowing for thumbnail generation for image type files.
This above hack will help you definitely speed up your computer and also avoid it from getting crashed in case of a corrupted file/ missing codec which at times can even lead to 100% CPU utilization.

Voice in MS OFFICE Word 2007

HI... U r visiting this post as

website hit counter












Use a Voice Command
You can use sound in Microsoft Office Word.
1. In the Word document, place your cursor where you want your voice message to go.
2. Click Insert, and then in the Text section, click the Insert Object button.
3. In the Object dialog box, on the Create New tab, in the list of object types, select Wave Sound.
4. Click OK, and then record your own voice note.

Make your USB Disks perform Faster

HI... U r visiting this post as
website hit counter









This simple hack is particularly useful if you leave your USB Hard Disk permanently connected to your laptop or PC. If you are sure that the USB drive will always be connected, it can be configured to perform faster. 
Follow the steps below to configure your USB Drive to perform faster. 
1.) In Control Panel, click on System. Under System dialog, click on Hardware and then Device Manager. 
2.) Under Device Manager, expand the Disk Drives section.



Optimizing USB Disks for Performance
3.) Select your Drive and right click to open Properties.



Performance Tuning your USB Drive
4.) Under Policies, select Optimize for Performance. Click OK.
That is it. You are done. For a USB drie, when you enable Optimize for Performance, it is enabled for write caching which in turn leads to beter speed and therefore better performance.

Increasing net Speed



HI... U r visiting this post as
website hit counter


A nice little tweak for XP Pro. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)
Here's how to get it back:
Click Start-->Run-->type "gpedit.msc" without the "
This opens the group policy editor. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab. I am Quoting it for Reference:
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth,
 then set it to ZERO.


 This will allow the system to reserve nothing, rather than the default 20%.
works on XP Pro, and 2000


Automatic Screen Refresh Tips

HI...

When you are working on your local computer and want to refresh any changes in your system automatically. For example some times you are watching sports results, online Stock Exchange rates and any changes to your hard drive but these changes are not usually refreshed until you press the F5 key on your keyboard.

To refresh your screen automatically you should edit your system Registry. But the best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.

Follow the given steps to change the updates automatically.

First click on Start button then type Regedit in Run option.

In Registry Editor panel go to the path:

HKEY_LOCAL_MACHINE / System / CurrentControlSet /

Control / UpdateMode

Here in right hand side panel edit the DWORD value to be between 1 and 5.

Now restart your computer after any changes to go into effect.

MAKING WINDOWS XP GENUINE THE EASY WAY

HI...
download jellybean keyfinder from this website
http://www.magicaljellybean.com/keyfinder.shtml

Now open keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************

P.S: this works on windows xp sp2 only......

ppl u can try this out...
this might sound silly but it works perfectly...

TRY INSTALLING IE7 OR MEDIA PLAYER11.
HI...



website hit counter
Provided by website hit counters website.

Thursday, March 18

Traffic Program

module traffic(clk, rst, ls, ss, sw, sn, se, rs, red_s, ys, ps_r, ps_g);
input clk;
input rst;
output ls;
output ss;
output sw;
output sn;
output se;
output rs;
output red_s;
output ys;
output ps_r;
output ps_g;
reg ls;
reg ss,sw,sn,se;
reg rs;
reg red_s,red_e;
reg ys;
reg ps_r;
reg ps_g;
reg [3:0]ps,ns;
reg [31:0]div;
reg [3:0]cnt;
wire clk_s;

parameter[3:0]start=4'b0000;
parameter[3:0]south_g=4'b0001;
parameter[3:0]south_orange=4'b0010;
parameter[3:0]south_r=4'b0011;
parameter[3:0]west_g=4'b0100;
parameter[3:0]west_orange=4'b0101;
parameter[3:0]west_r=4'b0110;
parameter[3:0]east_g=4'b0111;
parameter[3:0]east_orange=4'b1000;
parameter[3:0]east_r=4'b1001;
parameter[3:0]north_g=4'b1010;
parameter[3:0]north_orange=4'b1011;
parameter[3:0]north_r=4'b1100;





always@(posedge clk or posedge rst)
begin
if(rst)
div<=2'b00;
else
div<=div+1;
end
assign clk_s=div[20];


always@(posedge clk_s or posedge rst)
begin
if(rst)
cnt<=4'b0;
else
cnt<=cnt+1;
end


always@(posedge clk_s or posedge rst)
begin
if(rst)
ps<=start;
else
ps<=ns;
end


always @(ps)
case(ps)
start:ns<=south_g;
south_g:begin
if(cnt==10)
ns<=south_orange;
else
ns<=south_g;
end


south_orange:begin
if(cnt==14)
ns<=south_r;
else
ns<=south_orange;
end


south_r:begin
if(cnt==15)
ns<=west_g;
else
ns<=south_r;
end
default:ns<=start;
endcase


always@(ps)
begin
red_s<=0;
rs<=0;
ss<=0;sw<=0;sn<=0;se<=0 ;
ls<=0;
ps_g<=0;
ys<=0;
ps_r<=0;


case(ps)
start:begin
red_s<=1;
end

south_g:begin
ls<=1;
rs<=1;
ss<=1;

ps_r<=1;
end

south_orange:begin
ls<=1;
ys<=1;
ps_r<=1;


end

south_r:begin
ls<=1;
red_e<=1;
ps_r<=1;
end

west_g:begin
ls<=1;


red_s<=1;
ps_r<=1;
end

west_orange:begin
ls<=1;

red_s<=1;
ps_r<=1;

end

west_r:begin

red_s<=1;
ps_r<=1;
end
north_g:begin
sn<=1;
red_s<=1;
ps_r<=1;
end
north_orange:begin

ps_g<=1;
red_s<=1;
end
north_r:begin
red_s<=1;
ps_r<=1;
end
east_g:begin
se<=1;
red_s<=1;
ps_r<=1;
end
east_orange:begin
red_s<=1;
ps_r<=1;
end
east_r:begin
red_s<=1;
ps_r<=1;
end
default:begin
red_s<=0;
rs<=0;
ss<=0;sw<=0;sn<=0;se<=0;
ls<=0;
ps_g<=0;
ys<=0;
ps_r<=0;
end
endcase
end

endmodule

Saturday, March 6

How Computer virus work?

How Computer virus work? and How To Protect from these Viruses? E-mail
A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the
owner
. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs
that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable
code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or
carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
Viruses can increase their chances of spreading to
other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses

A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.

E-Mail Viruses

An E-Mail virus could be a form of a macro virus that spreds itself to all the contact located in the hosts email address book, If any of the e-mail recipients open the attachment of the infected mail, It spreads to the new host's address book contacts, and then proceeds to send itself to all those contacts as well. These days, e-mail viruses van infect host even if the infected e-mail is previewed in a mail client. One of the most common and destructive e-mail viruses is the ILOVEYOU virus.

Boot Sector Viruses


A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating systems to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence.

A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect per-written data on a CD, which eventually stopped such viruses from spreading.

Though boot viruses still exist, they are rare compared to new age malicious software. Another reason why they're not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive.

Worms

A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

How protect from these viruses ?

You can protect yourself against viruses with a few simple steps:

* If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses (and unwanted human visitors) away from your hard disk.

* If you are using an unsecured operating system, then buying virus protection software is a nice safeguard.

* If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses. In addition, you should disable floppy disk booting -- most computers now allow you to do this, and that will eliminate the risk of a boot sector virus coming in from a floppy disk accidentally left in the drive.

* You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.....

Friday, March 5

Google Search

Here are some search syntax basics and advanced tricks for Google.com. You might know most of these, but if you spot a new one, it may come in handy in future searches.

A quote/ phrase search can be written with both quotations ["like this"] as well as a minus in-between words, [like-this].
Google didn’t always understand certain special characters like [#], but now they do; a search for [C#], for example, yields meaningful results (a few years ago, it didn’t). This doesn’t mean you can use just any character; e.g. entering [t.] and [t-] and [t^] will always return the same results.
Google allows 32 words within the search query (some years ago, only up to 10 were used, and Google ignored subsequent words). You rarely will need so many words in a single query – [just thinking of such a long query is a hard thing to do, as this query with twenty words shows] – however, it can come in handy for advanced searching... especially as a developer using the Google API.
You can find synonyms of words. E.g. when you search for [house] but you want to find “home” too, search for [~house]. To get to know which synonyms the Google database stores for individual words, simply use the minus operator to exclude synonym after synonym (they will always show as bold in the SERPs, the search engine result pages). Like this: [~house -house -home -housing -floor].
To see a really large page-count (possibly, the Google index size, though one can only speculate about that), search for [* *].
Google has a lesser known “numrange” operator which can be helpful. Using e.g. [2000..2005] (that’s two dots inbetween two numbers) will find 2000, 2001, 2002 and so on until 2005.

Google’s define-operator allows you to look up word definitions. For example, [define:css] yields “Short for Cascading Style Sheets” and many more explanations. You can trigger a somewhat “softer” version of the define-operator by entering “what is something”, e.g. [what is css].
Google has some exciting back-end AI to allow you to find just the facts upong entering simple questions or phrases like [when was Einstein born?] or [einstein birthday] (the answer to both of these queries is “Albert Einstein – Date of Birth: 14 March 1879”). This feature was introduced April this year and is called Google Q&A. (See some of the various working Q&A sample queries to get a feeling for what’s possible.)
Google allows you to find backlinks by using the link-operator, e.g. [link:blog.outer-court.com] for this blog. The new Google Blog Search supports this operator as well. In fact, when Google’s predecessor started out as Larry Page’s “BackRub” in the 1990s, finding backlinks was its only aim! However, not all backlinks are shown in Google today, at least not in web search. (It’s argued that Google does this on purpose to prevent reverse-engineering of its PageRank algorithm.)
Often when you enter a question mark at the end of the query, like when you type [why?], Google will advertise its pay-for-answer service Google Answers.
There a “sport” called Google Hacking. Basically, curious people try to find unsecure sites by entering specific, revealing phrases. A special web site called the Google Hacking Database is dedicated to listing these special queries.
Google searches for all of your words, whether or not you write a “+” before them (I often see people write queries [+like +this], but it’s not necessary). Unless, of course, you use Google’s or-operator. It’s an upper-case [OR] (lower-case won’t work and is simply searching for occurrences of the word “or”), and you can also use parentheses and the “|” character. [Hamlet (pizza | coke)] will find pages containing the word (or being linked to with the word) “Hamlet” and additionally containing at least one of the two other words, “pizza” or “coke”.
Not all Google services support the same syntax. Some services don’t allow everything Google web search allows you to enter (or at least, it won’t have any effect), and sometimes, you can even enter more than in web search (e.g. [insubject:test] in Google Groups). The easiest thing to find out about these operators is to simply use the advanced search and then check what ends up being written in the input box.
Sometimes, Google seems to understand “natural language” queries and shows you so-called “onebox” results. This happens for example when you enter [goog], [weather new york, ny], [new york ny] or [war of the worlds] (for this one, movie times, move rating and other information will show).

  • Not all Googles are the same! Depending on your location, Google will forward you to a different country-specific version of Google with potentially different results to the same query. A search for [site:stormfront.org] from the US will yield hundreds of thousands of results, whereas the same search from Germany (at least if you don’t change the default redirect to Google.de) returns... zilch. Yes, Google does at times agree to country-specific censorship, like in Germany, France (Google web search), or China (Google News).
• Sometimes, Google warns you about its results, especially when they might seem like promoting hate sites (of course, only someone misunderstanding how Google works could think it’s them promoting hate sites). Enter [jew], and you will see a Google-sponsored link titled “Offensive Search Results” leading to this explanation.
• For some search queries, Google uses its own ads to offer jobs. Try entering [work at Google] and take a look at the right-hand advertisement titled e.g. “Work at Google Europe” (it turns out, at the moment, Google Switzerland is hiring).
• For some of the more popular “Googlebombed” results, like when you enter [failure] and the first hit is the biography of George W. Bush, Google displays explanatory ads titled “Why these results?”.
• While Google doesn’t do real Natural Language Processing yet, this is the ultimate goal for them and other search engines. A little What-If Video [WMV] illustrates how this could be useful in the future.
• Some say that whoever turns up first for the search query [president of the internet] is, well, the President of the internet. (I’m applying as well, and you can feel free to support me with this logo.)
• Google doesn’t have “stop words” anymore. Stop words traditionally are words like [the], [or] and similar which search engines tended to ignore. Sometimes, when you enter e.g. [to be or not to be], Google even decides to show some phrase search results in the middle of the page (separated by a line and information that these are phrase search results).
• There once was an easter-egg in the Google Calculator that made Google show “42” when you entered [The Answer to Life, the Universe, and Everything]. As I’ve been alerted in the forum, the easter egg only works lower-case.
• You can use the wildcard operator in phrases. This is helpful for finding song texts – let’s say you forgot a word or two, but you remember the gist, as in ["love you twice as much * oh love * *"] – and similar tasks.
• You can use the wildcard character without searching for anything specific at all, as in this phrase search: ["* * * * * * *"].
• Even though www.googl.com is nothing but a “typosquatter” (someone reserving a domain name containing a popular misspelling) and search queries return very different results than Google, the site is still getting paid by Google – because it uses Google AdSense.
• If you feel like restricting your search to university servers, you can write e.g. [c-tutorial site:.edu] to only search on the “edu” domain (you can also use Google Scholar). This works for country-domains like “de” or “it” as well.

How to Crack a Windows XP Administrator Password

How to Crack a Windows XP Administrator Password E-mail
# Go to Start-->Run and type "cmd" to open the command prompt
# Type "net user" and press enter to see all the accounts name
# Type "net user (account name) *"
# Type the password you want and then confirm it!!

Password Protect Folders in XP

Password Protect Folders in XP E-mail

There are two ways to password protect a folder built into Windows XP (for other Windows flavors, there are some freeware/shareware programs out there).

Method 1:- If you have a log in password for your account, this can be used to protect folders from other users. Your hard drive must be formatted using NTFS (which it probably is unless you're dual booting with another operating system). Here's what to do...

Right-click the folder that you want to make private and choose "Properties" (or Alt+Double-click). Go to the "Sharing" tab and check the "Make this folder private" box.

Click Apply . If you do not have a password on your account, a box will pop up asking if you want to assign a password. This must be done if you want to make the folder private, so click Yes . You will need to use your password to log on to your computer from then on.

Type in a password then confirm it. Click the "Create Password" button then close the Password window.

Click OK in the Properties dialog box.

Now anyone else logged on to your computer can't access that file without knowing your password.

Method 2:- If the Folder is Zipped you can give it a unique password.

Just double-click the zipped folder. In the top menu select File then click "Add a Password".

Type a password into the Password box. Then again in the "Confirm Password" box.

Now, you are the only person who can access files in this folder. The folder can be opened allowing the files to be seen, but you are the only one who can access them.

How to enlarge your notebook batteries life

How to enlarge your notebook batteries life E-mail

How to enlarge your notebook batteries life



Most of our time, the capacity of our notebook battery is not enough for our work and life. If you don’t have money for Apple Macbook , Dell and HP that have acclaimed battery life of 8 hours, this few tips will help to enlarge your notebook battery life a little longer:



1. Use only the power cord that came with your notebook or other authorized replacement.

2. When you don’t use it, follow the correct maintenance for your notebook.

3. Don't leave it in direct sunlight, areas where it will be exposed to extreme temperatures such as car trunks.

4. If your notebook has power management features, use it, so the system will run at lower processor speeds when enabling power management features and it will go into "sleep" mode faster when inactive.

5. Buy notebooks with internal Li-Ion batteries. Non Li-Ion batteries must be fully discharged and recharged every 2-3 weeks.

6. If you don't use your notebook for a period of time, you must fully discharge then recharge it, so the battery will last longer.

Difference between "http" & "https"

Difference between "http" & "https"

Print PDF
AddThis Social Bookmark Button

Difference between http & https
FIRST, MANY PEOPLE ARE UNAWARE OF: **The main difference between http:// and https:// is. It's all about keeping you secure**

HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.



The important thing is the letter S which makes the difference between HTTP and HTTPS.

The S (big surprise) stands for "Secure". If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.

This means that the website is talking to your browser using the regular 'unsecure' language.

In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website.

If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever enter your credit card number in an http website!

But, if the web address begins with https:// , that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.

You understand why this is so important, right?

If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https:// .

If it doesn't, there's no way you're going to enter sensitive information like a credit card number.

Alternatives to Adobe Reader

7 FREE Alternatives to Adobe Reader

Print PDF
Like we all know full version of Adobe Reader is way too sluggish with the unnecessary plugins. Not to mention, it also takes huge chunk of system memory.

Granted, there is Adobe Reader Lite, a lighter version of Adobe Reader. However when it is compared to other free alternatives, its performance is still lagging with the space consumption is relatively large.


Anyway here is a list of great alternatives to Adobe Reader and the best thing about these applications is they are all FREE.

1. Foxit Reader

Foxit Reader is small in size (approximately 3.5 MB) but features almost everything Adobe Acrobat Reader has. This FREE PDF viewer allows users to view and print out their PDF documents. PDF documents can be opened at lightning speed and users can convert PDF document to its original document. It works well with Windows Me/2000/XP/2003/Vista.

Note: I have been using this software for a long time.

Download Foxit Reader

2. Cool PDF Reader

I bet this is the smallest PDF reader with only 600 KB++ in size and it is reflected on its simple installation. Cool PDF Reader can do common PDF reader job; view, print ect. Interestingly it can also convert PDF files to other extension such as TXT, JPG, BMP, GIF, WMF, PNG and EPS. It works in 68 different languages and supports all version of PDF files.

Download Cool PDF Reader

3. PDFescape

No installation required. Seriously, all you need is only a browser. PDFescape is a new way to open PDF files and escape from the typical software requirements for using the de facto document file format. With PDFescape, you can fill in PDF forms, add text and graphics, add links, and even add new form fields to a PDF file.

Download PDFescape

4. PDF Hammer

PDF Hammer is another Free online PDF application. It functions as a reader and also allows users to edit PDF documents. Users can combine or merge PDF documents together, reorder, rearrange and delete pages. You can also lock your PDF files with password-based security and edit or add document information fields including author, subject, title and keywords.

5. Perfect PDF Reader

Perfect PDF Reader is a free download and it runs on both 32and 64 bits Windows platforms. The Visual C++ 2008 runtimes are required for it to function properly and it can be downloaded during installation. Basically there are three views to choose from - reading view, standard and a full screen reading. With Perfect PDF extraction of images and text is made easy. Either type of element can be copied, selected and pasted elsewhere.

Download Perfect PDF Reader

6. Sumatra PDF

Sumatra has a minimalistic design. It is small and launches itself very fast. It is great for portable use because it is just a one file with no external dependencies. You should include this in your USB pen drive.

Download Sumatra PDF

7. PDF-XChange Viewer

This PDF viewer is is smaller, faster and more feature-rich than other available readers. You might be surprised just how quickly your large PDF files open and pages smoothly refresh as they are scrolled.

* Add comments and annotations to any PDF file
* Type directly on any PDF page
* Markup pages with text and objects
* Export PDF pages or entire files to BMP, JPEG, TIFF, PNG and more
* Make your navigation of large PDF files both simple and enjoyable with the Loupe and Pan tools
* Extract text from a PDF page or file

Download PDF XChange Viewer