background preloader

"How to"

Facebook Twitter

Help. Remove DRM protection from iTunes tracks with iMovie HD. UPDATE: Sadly, this technique does not seem to work anymore. If there are other solutions, please update the comment thread because others may find the information useful. A few days back I found myself perusing the iTunes Music Store looking for a few songs that I had heard via Sirius*. After completing the painless process of purchasing the songs, I immediately synced the tracks to my iPhone and went on my merry way.

Because I had spent very little none of my time following the DRM vs. DRM-free music download option being offered by Apple, I simply downloaded the $0.99 version(s). DRM-free tracks from EMI will be offered at higher quality 256 kbps AAC encoding, resulting in audio quality indistinguishable from the original recording, for just $1.29 per song. Great. So what options do you have if the song you wish to purchase is not available?

Remove DRM protection using iTunes + CD-R/W Remove iTunes Music Store DRM with Apple software in Leopard Side banter and miscellaneous notes. The 7 Bad E-Mail Habits that Make People Want to Kill You. E-mail is a shallow way to communicate. It’s easy, fast and lacks the depth of understanding most people have face-to-face. Unfortunately, many people don’t realize just how much of this understanding is lost. As a result, they pick up bad habits and start driving coworkers, bosses and friends crazy. Here are seven particularly bad habits, and how you can fix them so people don’t want to kill you: 1) Hanging Questions Any e-mail that involves a request or question requires a follow-up.

Here’s the fix: For small questions, answer them immediately after reading. 2) Buried Requests A buried request is where the question or actionable information is sandwiched between unimportant info. Hi Bob, I’ve been considering your new proposal for adjusting the customer service policy. Compare to… Hi Bob, I’ve been considering your new proposal for adjusting the customer service policy. In the first e-mail, the request is in the second sentence, buried away. 3) Wrong Medium 4) Trying to Be Clever. Product Reviews and Reports - ConsumerSearch.com. Compare Banks Bank Rates, Bank Reviews Customer Service, Bank In. Sucide machine.

Are you Sure your Email isn’t being Hacked? In the interests of full disclosure, I didn’t come up with this idea. I read about it in a computer magazine a year or two back but of course when I wanted to refer to it for this article, I couldn’t find it! But someone on Digg eventually managed to find it so here is the original article if you want to see it. As email providers give away more and more storage space, more and more personal information is being stored in those accounts. People are increasingly using their email accounts for more than just email – it has become their online document storage area with backup documents such as passwords, bank account numbers, account usernames, scans of correspondence and much more. Even if you don’t use your email for this purpose, you may still be inadvertantly revealing personal information in general conversation emails to family and close friends.

But if someone HAS cracked your email password, it may not be apparent to you. Here’s how to do it : 1. 2. 3. 4. 5. Money Origami models A to G. LifeHacker. Fonolo - 50 Best Websites 2009. Supercook: recipe search by ingredients you have at home.

Computer Programs