Adding and Customizing Feedjit to Provide Live Traffic Feed for Your Website

Feedjit provides a live feed free tracking tool to track your Blogger Blogspot blog or any website visitors in real time. Feedjit gives you up to the minute information about where they are from, the type of browser used, the landing page your visitors arrive at and where they exit from. It also displays the search keyword or keywords the visitor used to access your blog and will help you understand more about the content your visitors are interested in.

A free Feedjit Live Traffic widget can be a very useful widget to add to a Blogger Blogspot blog because it provides details about the kind of content your visitors are interested in. It is simple to customize and add a Feedjit widget to your Blogger sidebar or footer. Included is a tutorial that will walk you through every step of how to place a Feedjit Live Traffic Feed on a Blogger blog.

It is easy to place a Feedjit Live Traffic Feed widget into the sidebar or footer of your Blogger Blogspot blog or WordPress. It only takes a few minutes to customize the look of the widget to suit your blog and paste the Feedjit javascript code into a gadget in your Blogger sidebar or footer. Below is a step by step tutorial that will make it a breeze to get a Feedjit Live Traffic Feed widget for your Blogger blog.
  1. Go to design tab of your blogger blog and click "Add a Gadget"
  2. Choose HTML/JavaScript widget
  3. Copy and Paste the following code to the content area as shown in the figure.

    <!-- Begin  alaawiki.blogspot.com - provided code -->
    <script type="text/javascript" src="http://feedjit.com/serve/?bc=FFFFFF&tc=D52A33&brd1=FFFFFF&lnk=5F5F5F&hc=000000&ww=310"></script><noscript></noscript>

MySQL - String concat multiple rows using group_concat

If you are implementing a tagging system like what you see with WordPress, then you may have a requirement to fetch all the tags of each article in the blog when displaying the blog. As each article has many tags, one option is to first fetch all the articles and for each article fetch the list of tags. However, there is a better way to do this in one single SQL when using MySQL.
MySQL has the function group_concat that allows one to condense a set of rows into one single row by concatenating the list of values.
The SQL will be something like

Nokia N8 cpu underclocked at 192 MHz not 680 MHz!!!

Many mobile phone reviews that listed the specification of the Nokia n8 mobile phone mentioned that the Nokia n8 CPU was clocked to 680 Mhz of pure processing power.Well there is a new handy application that is called X-plore and shows your devices serial number,total memory,free memory and cpu speed.I installed the app and then launched it and I found some interesting info for my device.I saw that the CPU clock speed was set to 192 MHz and Nokia did say it was clocked to 680 MHz. Is that right?


How to Write-Protect USB Flash Drive


Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.

How to Hack Symbian S60 Phones to Install Unsigned Applications and Get Rid of Certificate Errors


If you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. Have you been trying to install applications on your S60 3rd or 5th edition phone but ending up getting a certificate error? At times, this can be really annoying; but here is a smart solution to this problem!
Here in this post, I will show you how to hack your Symbian S60 3rd or 5th edition smartphone, so as to modify the phone’s firmware and completely bypass the mandatory signing requirement. So, once you are done with this one time hack, you should be able to install any compatible application including unsigned and those with an expired certificate.

Avoid WORMS In USB Devices


USB Devices like i-pod,pen drives e.t.c; brings viruses/worms which are bad since it disables a lot of features as well as it ruins memory the slows down the whole thing. It disables much of the removal process like Windows RegEdit.exe, MsConfig.exe and also TaskMan.exe. Variations of these also disables your keyboard during normal booting, floods your disk with virus files in the root directory and also the windows directory and some also floods your directory with Folder looking icons that is an executable..
So here are some tips in avoiding this:

Exiting Windows the Cool and Quick Way


Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)