exclusively from

(clik on images to enlarge it )


actually i got this doftware from one of my senior ,this really works
(clik on images to enlarge it )

clik here to download that software(team viewer)
uses of team viewer

i will tell u the procedure how to work with that

1)first ask ur friend to download that software from
2)then ask him to install
3)after that ask him open that
4)ask him to give his id and password of team viewer

clik here to download load that software

(clik on images to enlarge it )

5) jus enter the id and password
6)now clik on connect to partner

ur pc are linked and enjoy the share

clik here to download that software(team viewer)

jntu online bits for all branches

for jntu online bits clik on below links(updated)

for mid 2 2008 clik here

for 4-1 ece online bits click here

for cse online bits click below links

for 2-1 online bits
click here

for ECE 3-1 online bits clik here

for 3-1 online bits
click here( cse)

for 3-1
EEE online bits click on below links

for 3-1 IT online bits click here

for unix online bits click here

other online bits









client server computing pdf








software project management 150 bits html


Optical fiber communications html


Data Warehousing and Data Mining html




Electrical Measurements












client server computing pdf








software project management 150 bits html


Optical fiber communications html


Data Warehousing and Data Mining html




Electrical Measurements


[directions to downlaod ]
1) clik on ur bits
2)clik on free user
3)extract the rar file
4)if u dont hav winrar software look down u can see link to downlaod free winrar softwre

online bits are compressed so downlaod this software(winrar) to open thm :clik here

Next-Generation Intel PC Chips to Carry Intel Core Name

SANTA CLARA, Calif., Aug 10, 2008 (BUSINESS WIRE) -- Intel Corporation announced today that desktop processors based on the company's upcoming new microarchitecture (codenamed "Nehalem") will be formally branded "Intel(R) Core(TM) processor." The first products in this new family of processors, including an "Extreme Edition" version, will carry an "i7" identifier and will be formally branded as "Intel(R) Core(TM) i7 processor." This is the first of several new identifiers to come as different products launch over the next year.
Products based on the new microarchitecture will deliver high performance and energy efficiency. This "best of both worlds" approach is expected to extend Intel's processor leadership in future mobile, desktop and server market segments.
"The Core name is and will be our flagship PC processor brand going forward," said Sean Maloney, Intel Corporation executive vice president and general manager, Sales and Marketing Group. "Expect Intel to focus even more marketing resources around that name and the Core i7 products starting now."
The Intel Core processor brand name has gained broad awareness, preference, and market momentum over the past several years. The Intel Core name remains the logical choice for Intel's latest family of processors. The Intel Core i7 processor brand logo will be available for high-performance desktop PCs with a separate black logo for Intel's highest-end "Extreme Edition." Intel will include processor model numbers to differentiate each chip.
Initial products based on this microarchitecture are expected to be in production in the fourth quarter of this year. These processors will feature Intel(R) Hyper-Threading Technology, also known as simultaneous multi-threading, and are capable of handling eight software "threads" on four processor cores.
For more information and downloadable new Core i7 logos, please visit the Intel pressroom at the link included below.

Intel Introduces 1.25GHz XScale Processor

Intel Introduces 1.25GHz XScale Processor

Wednesday August 24, 2005

Today, Intel introduced the "Monahans" line of PDA Processor. According to the Register:
Describing the chip as "another step ahead in performance", Maloney demo'd a pre-production Monahans running at 1.25GHz. The chip was being used to decode and play back HD video on a PDA screen. The chip may not debut at that speed, Maloney admitted: "We don't know whether we'll introduce [Monahans] at 1GHz or above, but there's enormous headroom there." So even if it doesn't launch at that kind of clock speed, Intel will be able to push it up to that level in due course.
I must say, the thought of a PDA with over a GHz is pretty exciting. Just like a home computer though, faster PDA processors speeds seem to be a little overkill for the average user. The nice thing is that in the last few years it seems the faster a PDA gets, the lower the price.

Intel® Centrino® Atom™ Processor Technology

Intel® Centrino® Atom™ Processor Technology

For Mobile Internet Devices

Intel® Centrino® Atom™ processor technology

Amazing mobility, pocket-sized
Intel® Centrino® Atom™ processor technology brings incredible levels of performance to a wide range of Mobile Internet Devices (MIDs). Get an amazing Internet experience on-the-go, coupled with long battery life and built-in wireless to connect when and where you want.

Mark Owens
Mark Owens
Mark Owens
Intel® processors

Keywords: Environmental Portraiture, Personality Portraits, Celebrity Portraits, Landscape, Live Performance

Mark Owens uses a system powered by

Intel® Centrino® 2 Processor Technology

Intel® Centrino® 2 Processor Technology

For Mobile Computing

The best notebooks have Intel® Centrino® 2 processor technology insideΔ1

Intel’s NEWEST and BEST performing notebook technology includes:
• Up to 50% faster performance when multitasking‡1
• Up to 2X greater range and up to 5X better wireless performanceΔ2
• Designed for the longest possible battery lifeΔ3
• Up to 90% faster performance on intensive multimedia applications like HD video encoding‡2

Intel® Centrino® processor technology
What the Experts are Saying

"Faster processors and chipsets. Great-looking video and graphics. Stronger and faster wireless signals. Better security and manageability. Designed for energy efficiency to enable great battery life. An option to turbo-speed boot time and software application loading"

Intel® Core™2 Extreme Mobile Processor

For Mobile Gaming & Multimedia

Intel® Core™2 Extreme Mobile Processor

Extreme Mobile Gaming & Multimedia

Get extreme processing power for mobile gaming and multimedia with the Intel® Core™2 Extreme mobile processor, the world’s highest performing quad-core‡1 and dual-core‡2 mobile processors.

Learn about gaming with Intel® Core™2 Extreme

Game to destroy

Gaming elite, meet your processor. With the untouchable performance of next-gen quad-core‡1, the Intel® Core™2 Extreme processor gives you a jaw-dropping 12MB of shared L2 Cache for a 50 percent increase in performance‡1, a blisteringly fast 1333 MHz Front Side Bus (FSB) for massive data throughput, and four cores of pure dominating performance so you can game to destroy on the latest multi-threaded games.

multiple logins with yahoo messenger

How many yahoo account do you have? Or How many friends do you have? How many contacts on your yahoo messenger?

You love to express yourself personally or professonally and that why you use two yahoo ID ? Right? Or you have some problem on your old yahoo ID?

But, till now you want to use your old YAHOO ID and new YAHOO ID from one PC. Normally, Yahoo Messenger didn’t support it. You can login with multiple id’s on the same Yahoo! messenger without any download or patch.


Here, Short Instruction for you to use multi yahoo messenger.
Follow these steps
1. Go to Start —- Run . Type regedit, then enter .

2.Navigate to HKEY_CURRENT_USER ——– Software — Yahoo! —–pager—-Test

3.On the right pane , right-click and choose new Dword value .

4.Rename it as Plural.

5.Double click and assign a decimal value of 1.

That’s it.

Now close registry and restart Yahoo! Messenger.

For signing in with new YAHOO ID open another messenger open as many messengers you need.

Can my account be reinstated after being disabled for invalid click activity

Can my account be reinstated after being disabled for invalid click activity?

We're always willing to work with you to resolve any issues you may have. If you feel that this decision was made in error, and if you can maintain in good faith that the invalid activity was not due to the actions or negligence of you or those for whom you are responsible, you may appeal the disabling of your account.

To do so, please contact us only through our online appeal form

Once we receive your appeal, we'll do our best to inform you quickly and will proceed with appropriate action as necessary. Please understand, however, that there is no guarantee that your account will be reinstated.

Please also bear in mind that once we've reached a decision on your appeal, further appeals may not be considered, and you may not receive any further communication from us.

the above data is from addsense



This category covers all applications which send private information without user consent/awareness. They use tracking functions to send various statistical data such as a list of visited websites, email addresses from the user's contact list, or a list of typed keystrokes.

The authors of spyware claim that these techniques aim to find out more about users’ needs and interests and allow better-targeted advertisement. The problem is that there is no clear distinction between useful and malicious applications and no one can be sure that the retrieved information will not be misused. The data obtained by spyware applications may contain security codes, PINs, bank account numbers, etc. Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the software. Often, users are informed of the presence of spyware during a program's installation to give them an incentive to upgrade to a paid version without it.

Examples of well-known freeware products which come bundled with spyware are client applications of P2P (peer-to-peer) networks. Spyfalcon or Spy Sheriff (and many more) belong to a specific spyware subcategory – they appear to be antispyware programs, but in fact they are spyware programs themselves.
If there is a file detected as spyware on your computer, it is advisable to delete it, since it most likely contains malicious code.

Potentially unsafe,unwanted applications

Potentially unsafe applications

There are many legitimate programs which serve to simplify the administration of networked computers. However, in the wrong hands, they may be misused for malicious purposes. This is why ESET has created this special category. Our clients now have the option to choose whether the antivirus system should or should not detect such threats.
"Potentially unsafe applications” is the classification used for commercial, legitimate software. This classification includes programs such as remote access tools, password-cracking applications, and keyloggers (a program recording each keystroke a user types).

If you find that there is a potentially unsafe application present and running on your computer (and you did not install it), please consult your network administrator or remove the application.

Potentially unwanted applications

Potentially unwanted applications are not necessarily intended to be malicious, but may affect the performance of your computer in a negative way. Such applications usually require consent for installation. If they are present on your computer, your system behaves differently (compared to the state before their installation). The most significant changes are:

  • new windows you haven’t seen previously are opened
  • activation and running of hidden processes
  • increased usage of system resources
  • changes in search results
  • application communicates with remote servers

Trojan horses

Trojan horses

Historically, computer trojan horses have been defined as a class of infiltrations which attempt to present themselves as useful programs, thus tricking users into letting them run. But it is important to note that this was true for trojan horses in the past–today, there is no longer a need for them to disguise themselves. Their sole purpose is to infiltrate as easily as possible and accomplish their malicious goals. “Trojan horse” has become a very general term describing any infiltration not falling under any specific class of infiltration.
Since this is a very broad category, it is often divided into many subcategories. The most widely known are:

  • downloader – a malicious program with the ability to download other infiltrations from the Internet.

  • dropper - a type of trojan horse designed to drop other types of malware onto compromised computers.

  • backdoor - an application which communicates with remote attackers, allowing them to gain access to a system and to take control of it.

  • keylogger – (keystroke logger) – a program which records each keystroke that a user types and sends the information to remote attackers.

  • dialer - dialers are programs designed to connect to premium-rate numbers. It is almost impossible for a user to notice that a new connection was created. Dialers can only cause damage to users with dial-up modems, which are no longer regularly used.

Trojan horses usually take the form of executable files with the extension .exe. If a file on your computer is detected as a trojan horse, it is advisable to delete it, since it most likely contains malicious code.

Examples of well-known trojans are: NetBus, Trojandownloader.Small.ZL, Slapper



Rootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing their presence. Rootkits, after accessing a system (usually exploiting a system vulnerability), use functions in the operating system to avoid detection by antivirus software: they conceal processes, files and Windows registry data. For this reason, it is almost impossible to detect them using ordinary testing techniques.
When it comes to rootkit prevention, you must remember that there are two levels of detection:

  1. When they try to access a system. They are still not present, and are therefore inactive. Most antivirus systems are able to eliminate rootkits at this level (assuming that they actually detect such files as being infected).

  2. When they are hidden from the usual testing. Users of the ESET antivirus system have the advantage of Anti-Stealth technology, which is also able to detect and eliminate active rootkits.



Adware is short for advertising-supported software. Programs displaying advertising material fall under this category. Adware applications will often automatically open a new pop-up window containing advertisements in an Internet browser, or change its homepage. Adware is often bundled with freeware programs, allowing the freeware developers to cover development costs of their (usually useful) applications.
Adware itself is not dangerous – users will only be bothered with advertisements. Its danger lies in the fact that adware may also perform tracking functions (as spyware also does).

If you decide to use a freeware product, please pay particular attention to the installation program. Most installers will notify you of the installation of an extra adware program. Often you will be allowed to cancel it and install the program without adware. However, in some cases programs will not install without adware, or their functionality will be limited. This means that adware may often access the system in a "legal” way, because users have agreed to it. In this case, it is better to be safe than sorry.

If there is a file detected as adware on your computer, it is advisable to delete it, since there is a high possibility that it contains malicious code.

Worms? its a type of virus


A computer worm is a program containing malicious code that attacks host computers and spreads via a network. The basic difference between a virus and a worm is that worms have the ability to replicate and travel by themselves. They are not dependent on host files (or boot sectors).
Worms proliferate by means of email or network packets. In this regard, worms can be categorized two ways:

  • email – distributing themselves to email addresses found in a user’s contact list and

  • network - exploiting security vulnerabilities in various applications.

Worms are therefore much more viable than computer viruses. Due to the availability of the Internet, they can spread across the globe within hours of their release – in some cases, even in minutes. This ability to replicate independently and rapidly makes them more dangerous than other types of malware, such as viruses.
A worm activated in a system can cause a number of inconveniences: it can delete files, degrade system performance, or even deactivate some programs. Its nature qualifies it to serve as a "means of transport" for other types of infiltrations.
If your computer is infected with a computer worm, it is recommended that you delete infected files, because they likely contain malicious code.

Examples of well-known worms are: Lovsan/Blaster, Stration/Warezov, Bagle, and Netsky.

wat is virus? can u tell ,if no read here

can u tell ,if no read here:

A computer virus is an infiltration which corrupts existing files on your computer. Viruses are named as such after biological viruses, as they use similar techniques to spread from one computer to another.
Computer viruses attack mainly executable files and documents. To replicate, a virus attaches its "body" to the end of a target file. In short, this is how a computer virus works: after execution of the infected file, the virus activates itself (before the original application) and performs its predefined task. Only after that, the original application runs. A virus cannot infect a computer unless a user (either accidentally or deliberately) runs or opens the malicious program by him/herself.

Computer viruses can range in activity and severity. Some of them are extremely dangerous because of their ability to purposely delete files from a hard drive. On the other hand, some viruses cause no real damage – they only serve to annoy the user and demonstrate the technical skills of their authors.

It is important to note that viruses are (when compared to trojans or spyware) gradually becoming more of a rarity, since they are not commercially enticing for authors of malicious software. Also, the term "virus” is often incorrectly used to cover all types of infiltrations. At present, this is gradually being overcome and the new, more accurate term "malware” (malicious software) is used.
If your computer is infected with a virus, it is necessary to restore infected files to their original state – i.e. to clean them by using an antivirus program.

Examples of viruses are: OneHalf, Tenga, and Yankee Doodle

Intel Details Upcoming New Processor Generations

Penryn die photo hi welcome this is vishnu here to share the new intel Upcoming New Processor Generations plzz read the below post for new intel techniques applied in processors ,awsome to hear and technified to share

the above pictur shows u the arrangement of newly designed processor

Marking the next step in Intel's "tick-tock" product strategy and cadence to deliver a new process technology with an enhanced microarchitecture or entirely new microarchitecture every year, Intel Corporation will begin producing its next-generation Penryn family of processors in the second half of this year. These new processors benefit from enhancements to the Intel® Core™ microarchitecture and also Intel's industry-leading 45nm Hi-k process technology with its hafnium-based high-K + metal gate transistor design, which results in higher performance and more energy-efficient processors.

Intel has more than 15 45nm Hi-k product designs in various stages of development, and will have two 45nm manufacturing fabs in production by the end of the year, with a total of four in production by the second half of 2008 that will deliver tens of millions of these processors. Below are many of the details of the Penryn processor family and a glimpse into some of the key features of Intel's future generation of processors, codenamed Nehalem.

this picture shows intel threading and building:


  • A Range of Products -- Six Penryn family processors, including dual- and quad-core desktop processors and a dual-core mobile processor are all under the Intel Core processor brand name as well as new dual- and quad-core server processors under the Intel® Xeon® processor brand name. A processor for higher-end server multiprocessing systems is also under development. As previously noted, Intel already has a total of 15 45nm products scheduled.

after the sucess of intel core2duo,should wait and see abt this new flash :
  • Technical Marvel -- 45nm next-generation Intel® Core™2 quad-core processors will have 820 million transistors. Thanks to our high-k metal transistor invention, think of 820 million more power efficient light bulbs going on and off at light-speeds. The dual-core version has a die size of 107mm2, which is 25 percent smaller than Intel's current 65nm products - and quarter of the size of the average U.S. postage stamp - and operate at the same or lower power than Intel's current dual-core processors

for any new techniques and processor information and virus removal techniques and pc troubleshooting mail to
[article source :intel ]

Intel Core 2 Duo is here

Intel Core 2 Duo is here – could it be Intel's powerful processor

Author: vishnu
Editor: vishnu
Category: CPU & Chipset
Published:18 aug 2008

Could it finally be Intel’s day to shine?

For over 6 years now, Intel has put all of its research and money behind its Pentium line of CPU’s and until the last 3 yeas, it has been an up and down ride taking on the new CPU giant AMD, who’s Athlon series of processors has partly been the bane of Intel’s existence.

K7 and K8 architectures was something Intel probably wished never saw the light of day, especially when it came to Pentium 4’s somewhat weaker architecture. All of Intel’s processors since the Pentium 4 were introduced using the Netburst Micro Architecture. This architecture was designed for speed, raw CPU MHz. Its extremely long pipeline and twin double speed ALU’s allowed speeds hitting 3.8GHz and if things continued, maybe more. Only problem is, clock for clock. AMD’s K8 architecture managed to destroy the Pentium 4 architecture, and power per watt, AMD’s CPU are like an arctic winter compared to the Netburst CPU’s especially the Prescott and Presler based units.

Today marks a big change for Intel. It’s the first time since the early 90’s that its new top market CPU has not carried the Pentium logo - in fact, Pentium branding is now set to die a slow death with the Pentium D to be the last CPU’s from Intel to continue production for a few more month, then we will see only new processors based on Intel’s latest architecture, named “Core Architecture”

So far Intel has already released one CPU series based on this new architecture. Core Duo and Core Solo for the mobile sectors have already emerged; today we are looking at Core 2 series for the desktop section. In our labs we have Intel’s twin Core 2 components, the Core 2 Extreme (X6800) and the Core 2 Duo (E6700).

Intel's New Core 2 Duo Processors Run Blazingly Fast in PC World Tests PCs with new 'Conroe' chips decisively outscore AMD-based rivals in our tests.

Exclusive PC World tests show that PCs equipped with Intel's new Core 2 Duo processors, formerly code-named Conroe, set new high marks for desktop performance--they're the fastest we've seen by far.

With this chip line, which formally launched on July 27, Intel decisively reclaims the power desktop crown from competitor AMD.

AMD recently introduced aggressive price cuts, lowering the cost of its Athlon 64 FX-62 from $1031 to $827, while mainstream chips like the 2.4-GHz Athlon 64 X2 4600+ dropped from $558 to $240. In response, Intel also lowered the prices of older desktop processors.

Testing, Testing

In our WorldBench 5 test suite, Intel's Core 2 Duo reference system outscored a matching system equipped with AMD's high-end Athlon 64 FX-62 chip by 17 percent. We also tested shipping PCs based on several chips in the Core 2 Duo family, including a water-cooled, overclocked ABS machine that posted a mark of 181 on our WorldBench 5 test--the highest WorldBench score we've ever seen. (See PC World's detailed test results and chart. For full reviews of five new Core 2 Duo-based systems, click the product names in the results chart.)

All of our Core 2 Duo configurations performed impressively, and the higher-end models in particular should allow power users to handle demanding multimedia work on their PCs more quickly and to perform multiple computing tasks at once more efficiently. Gaming, too, will receive an impressive boost from systems equipped with the new chips.

Though its new products are good news for users, things are different for some Intel employees, as the company announced the layoff of 1000 management employees.

The Core 2 Duo Line

The Core 2 Duo processor line ranges from the 1.86-GHz E6300 chip ($183) with 2MB of cache to the 2.93-GHz Core 2 Extreme X6800 chip ($999) with 4MB of cache; all have a 1066-MHz system bus. (Intel leaves the "Duo" designation off of its X6800 CPU.)

Though Core 2 Duo chips use the same Socket 775 interface as current Pentium 4 and Pentium D chips, they require new chip sets, so you'll have to get a new motherboard--you can't just pop a Core 2 Duo chip into your existing Intel-based PC and reap the tremendous performance gains. The Core 2 Duo reference systems we tested used a motherboard with Intel's 975X Express chip set (boards using the P965 Express chip set will also be available); nVidia and ATI have their own Core 2 Duo boards as well.

The new processors and systems will be on sale from various vendors beginning July 27, with some configurations of Core 2 Duo machines checking in at surprisingly reasonable prices.

Intel® Core™2 Duo Desktop Processor E4600 - SLA94

Intel® Core™2 Duo Desktop Processor E4600 - SLA94: "Intel® Core™2 Duo Desktop Processor E4600

Processor Specifications:
sSpec Number:
CPU Speed:
Bus Speed:
Bus/Core Ratio:
L2 Cache Size:
L2 Cache Speed:
2.40 GHz
800 MHz
2 MB
2.4 GHz
Package Type:
Manufacturing Technology:
Core Stepping:
CPUID String:
Thermal Design Power:
Thermal Specification:
VID Voltage Range:
65 nm
Product Documentation:
Product Order Codes:
Box Order Code:
OEM Order Code:
Supported Features:
# Dual Core
# Enhanced Intel Speedstep® Technology
# Intel® EM64T 1
# Enhanced Halt State (C1E)
# Execute Disable Bit 2
# Intel® Thermal Monitor 2

These parts have PROCHOT enabled.

These parts have THERMTRIP enabled.

These parts have Extended HALT (C1E) power of 8W.

These parts have PECI enabled.

These parts have Tdiode enabled.
Legal Disclaimers:
1 Intel® EM64T requires a computer system with a processor, chipset, BIOS, operating system, device drivers and applications enabled for Intel EM64T. Processor will not operate (including 32-bit operation) without"

Intel® Core™2 Duo processor numbers

Intel® Core™2 Duo processor numbers: "Intel® Core™2 Duo processor

* Intel® Core™2 Duo processor

The power to perform. With power-optimized enabled dual-core technology and exceptional energy efficiency, the Intel® Core™2 Duo processor excels running the most intense applications.

* » Learn more

Number¹ Architecture Cache Clock
Speed Front
Bus Dual-core Intel® Virtualization Technology
(Intel® VT)Φ Enhanced
Technology Intel®
64Φ Execute
Disable Bit° Intel® Trusted Execution Technology
E8600 45 nm 6MB L2 3.33 GHz 1333 MHz
E8500 45 nm 6MB L2 3.16 GHz 1333 MHz
E8400 45 nm 6MB L2 3 GHz 1333 MHz
E8300 45 nm 6MB L2 2.83 GHz 1333 MHz
E8200 45 nm 6MB L2 2.66 GHz 1333 MHz
E8190 45 nm 6MB L2 2.66 GHz 1333 MHz
E7300 45 nm 3MB L2 2.66 GHz 1066 MHz
E7200 45 nm 3MB L2 2.53 GHz 1066 MHz
T9500 45 nm 6MB L2 2.60 GHz 800 MHz
T9300 45 nm 6MB L2 2.50 GHz 800 MHz
T8300 45 nm 3MB L2 2.40 GHz 800 MHz"

AdSense keywords and description

  • DEFINATON:keywords are nothing but the words which google index ur page by selcting some of ur words from ur post which u write,using good keywords means the keywords which are often searched by people or trafic

NOTE: the above defenition is my own defination and it may work or may not ,i dont hav any response to it ,its only my experience :thnQ

Had another little play with addsense and what it shows on my own site. My site sells very specific widgets and every page has an addsense at the bottom of the page that shows adds from all competitors and their general everyday widgets.

Decided to create an affiliate site in a directory on the same site.
Each page of the affiliate site has a couple of paragraphs related to to the chosen area of adds and then the affliate links and descriptions stuffed with keywords of the links. Each pages filename is also stuffed with keywords.

On the first upload of every page the addsense adds showed adds related to my competitors and their general everyday widgets. Not any related to the category of the page.

Hit the refresh button and related adds started showing. Some pages got the correct adds after only one refresh other pages took a couple of page refreshes before showing any related adds.
One page just would not show the correct adds and continued to show general everyday widgets. Could not work out why, keywords there, descriptions etc etc. Even the affiliate links were for well known brand names related to each other and the category of the page. Even tried uploading the page again with more keywords stuffed in the meta tag, no just didnt want to play fair. Leave it for a while me thinks. Continued upload other pages and getting the correct adds after doing a refresh.

Back to the offending page, first quick explanation, each page has a php include navigation menu with the chosen categories. I upload each page type in the url and check the affiliate links work before adding the link to the php include navigation menu. Do this so I can mess with pages on a live site without users being able to click through before Ive finished.

Anyhoo still could not get this page to show the correct adds, kept trying a refresh even different browsersand clearing the cache. Decided oh well at least the affiliate links work, add it to the menu anyway. Uploaded the menu, clicked on the link to the offending page, whoo hoo correct adds. Why? dunno, my guess, again addsense give some importance to the filename or the description of the href link.

And Finally!
Had one page showed related adds after a refresh, however all the adds were for a specific gadget, and not a very popular gadget compared to others on the page. The only mention of this gadget was in the description of the affiliate link and just happend to have the first letter of each word capitalised. For some reason addsense latched onto only that word.

there you go, if you actually read all the above youl be like me, none the wiser!
cheers all.



contact no: 9989593819,



clik on the above 5 links and dwonload thm ask to take a print out ,obviosuly in intenet cafe

Recommended systems

Recommended systems
Dell Inspiron 1525 Laptops

DellTM InspironTM 1525 with Intel® CoreTM 2 Duo processor