| Script Name | Target | Stop Loss | Term | Recommended by: |
01 | | | | | |
02 | | | | | |
03 | | | | | |
04 | | | | | |
| Source: Published over the net, differnet media channel and brokerage houses. | ||||
| Disclaimer: All information provided is on "as is" basis and for information purposes only. Kindly consult your financial advisor or stock broker to verify the accuracy. | ||||
| Risk associated: Completly owned by Investor |
Sunday, August 10, 2008
8-August-2008
Thursday, August 7, 2008
7-August-2008
| Script Name | Target | Stop Loss | Term | Recommended by: |
01 | | | | | |
02 | | | | | |
03 | | | | | |
04 | | | | | |
05 | | | | | |
06 | | | | | |
07 | | | | | KR choksey |
08 | | | | | |
| Source: Published over the net, differnet media channel and brokerage houses. | ||||
| Disclaimer: All information provided is on "as is" basis and for information purposes only. Kindly consult your financial advisor or stock broker to verify the accuracy. | ||||
| Risk associated: Completly owned by Investor |
Wednesday, August 6, 2008
6-August-2008
| Script Name | Target | Stop Loss | Term | Recommended by: |
01 | | | | | |
02 | | | | | |
03 | | | | | |
04 | | | | | |
05 | | | | | |
06 | | | | | |
07 | | | | | |
08 | | | | | |
09 | | | | | |
10 | | 64 | 38 | | Power your Trade |
11 | cipla | 278 | | | ICICI Direct |
| Source: Published over the net, differnet media channel and brokerage houses. | ||||
| Disclaimer: All information provided is on "as is" basis and for information purposes only. Kindly consult your financial advisor or stock broker to verify the accuracy. | ||||
| Risk associated: Completly owned by Investor |
Tuesday, August 5, 2008
5-August-2008
| Script Name | Target | Stop Loss | Term | Recommended by: |
01 | | | | | |
02 | | | | | |
03 | | | | | |
04 | | | | | |
05 | | | | | |
06 | | | | | |
07 | | | | | |
08 | | | | | |
09 | | | | | |
10 | Garware offsource | 254 | | | |
11 | Alembic | 60 | | | Karvy |
12 | 3i Infotec | 147 | | | Karvy |
13 | Visa Steel | 70 | 54 | | Power your Trade |
14 | | | | | |
| Source: Published over the net, differnet media channel and brokerage houses. | ||||
| Disclaimer: All information provided is on "as is" basis and for information purposes only. Kindly consult your financial advisor or stock broker to verify the accuracy. | ||||
| Risk associated: Completly owned by Investor |
Proetect PC from Virus and spyware
What is antivirus?
Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software. The term "antivirus" is used because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, trojan horses and other malware. Antivirus software typically uses two different approaches to accomplish this:
Examining (scanning) files to look for known viruses matching definitions in a virus dictionary, and
identifying suspicious behavior from any computer program which might indicate infection.
The second approach is called heuristic analysis. Such analysis may include data captures, port monitoring and other methods.
Most commercial antivirus software uses both of these approaches, with an emphasis on the virus dictionary approach.
Some of very good rated free Antivirus Application
AntiVir version 8.1.00.295 Classic
AntiVir version 8.1.00.331 Premium
BitDefender 2008 version 11.0.16
AVG version 8.0.100 Free
Avast! Home Edition
What is Adware?
Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.
Some of very good rated free Adware detection Application
Ad-Aware
Spybot - Search & Destroy
Link: http://en.wikipedia.org/wiki/Adware
What is Spyware?
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.
Link: http://en.wikipedia.org/wiki/Spyware
Some of very good rated free Spyware detection Application
Spybot - Search & Destroy
GIANT AntiSpyware
Windows Defender
Good Link….
AntiVirus http://en.wikipedia.org/wiki/Antivirus_software
List of antivirus software http://en.wikipedia.org/wiki/List_of_antivirus_software
List of computer viruses http://en.wikipedia.org/wiki/List_of_computer_viruses
List of trojan horses http://en.wikipedia.org/wiki/List_of_trojan_horses
Linux malware http://en.wikipedia.org/wiki/Linux_malware
Timeline of notable computer viruses and worms http://en.wikipedia.org/wiki/Timeline_of_notable_computer_viruses_and_worms
Virus hoax http://en.wikipedia.org/wiki/Virus_hoax
Lists of freeware antivirus http://wiki.castlecops.com/Lists_of_freeware_antivirus
Setting Up Microsoft Outlook Express with Godaddy
Setting Up Microsoft Outlook Express with Godaddy
You can set up and use Microsoft Outlook Express with your Webmail account, but before you set up your account in Outlook Express, you need to set your SMTP Relay options in your email account.
To Set Your SMTP Relay Options
1. Log in to your Account Manager.
2. In the My Products section, click Email.
3. On the Manage Email page, in the Email Account list, click Manage Account next to the account you want to use.
4. From the Relays per Day dropdown list, select the number of relays per day you want to use for the account.
5. Click OK.
To Set Up Outlook Express with Your Email Account
1. In Microsoft Outlook Express, select Tools > Accounts.
2. On the Internet Accounts window, click the Mail tab, and then click Add.
3. On the Internet Connect Wizard, in the Display name field, type your full name and click Next.
4. In the E-mail address field, type your email address and click Next.
5. On the E-mail Server Names window, from the My incoming mail server is a list, select POP3.
6. In the Incoming mail (POP3, IMAP or HTTP) server field, enter pop.secureserver.net.
7. In the Outgoing mail (SMTP) server field, type smtpout.secureserver.net, and then click Next.
8. In the Account name and Password fields, type your email address and password, and then click Next.
9. Click Finish.
10. On the Internet Accounts wizard, select the mail account you just created and click Properties.
11. In the Properties window, click the Servers tab.
12. Select My server requires authentication.
13. Click the Advanced tab.
14. In the Outgoing mail (SMTP) field, change the port number to 80, and then click OK.
NOTE: If port 80 does not work, try port 25.