Skip to main content

Make Your PC welcome you when you open it (It speaks)


NOW MAKE YOUR COMPUTER WELCOME YOU !!!! 

EVERYTIME YOU OPEN YOUR PC (TESTED)







Yes it is possible and we (technology reforms) have tested it for you guys!!
From the beginning we all wanted our PC to welcome us like JARVIS did in Iron Man s
o this is for u guys only!!!

So here we go-
First of all open your notepad, I mean that one which is in your PC. 


2) Then go and copy and paste the code given below.
---------------------------------------------------------------------------

Dim speaks, speech
speaks="Welcome to your laptop, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks

----------------------------------------------------------------------------
3) Now he third thing is to replace the username with your name or simply what you want to speak is to be typed in the speak title.

4) Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs".
5) Now windows 7 and 8 users paste the to 

C:\Users\ {UserName}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

5b) WINDOWS XP users go to
C:\Documents and Settings\All Users\Start Menu\Programs\Startup

and you are almost done 
Just restart the PC or whenever next time you start the PC it will welcome you!!

Note: For best results, it is recommended to change sound scheme to No Sounds.
You can change the sound scheme to No Sounds by following the steps given below:-
Go to Control Panel.
Then click on Switch to Classic View.
Then Click on Sounds and Audio Devices.
Then Click on the Sounds Tab.
Select No Sounds from the Sound Scheme option.
If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the pop-up menu.
Click on OK.
In my personal opinion, this can be a wonderful trick.

Comments

Popular posts from this blog

View Private Facebook Profile Picture in Full Size

An Easy Trick to view Private Facebook Profile Picture in Full Size 1.Some people on Facebook set  their image privacy settings to  "Only  me".We will not be able to see  their images in full size.Here is a  simple  work around technique using which you can see the image in full size. 2.Go to the Timeline of the  person(I  know its mostly a girl ). 3.Right click on the profile pick  and  choose the option open image  in a new tab from the menu. 4.Then the image will open in a  separate window. 5.Now just remove s160X160  from  the url of the screenshot and  hit enter . 6.Now you will be able to see the image in full size. Hit like if it worked. #iospranav #TechnologyReforms

Now Don't Let Unwanted Software And Plugins Get Installed On Your Pc

      Tired of unchecking unrelated offers while installing Then DON'T worry your friend UNCHECKY is here . Introducing Unchecky! Keeps your  check boxes  clear. Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a  check box , and spent hours afterwards removing  ad-ware ? Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser? Unchecky aims to keep potentially unwanted programs out of your computer. Unchecks Unchecky automatically unchecks unrelated offers, both saving you mouse clicks and making it less likely to miss a checkbox of an unwanted offer. Warns Installers often try to sneak additional programs as a natural part of the installation. Unchecky warns you when you try to accept a potentially unwanted offer, which makes it less likely to be accepted accidentally.

How To Know If Someone Hacked Your Computer!

  HOW TO KNOW IF SOMEONE HAS HACKED YOUR COMPUTER! Steps : 1. Click "Start," then type "cmd" into the quick search. Right-click the app link and click "Run as administrator." 2. Type "netstat -an" and press "Enter." Wait a few moments for the utility to run. 3. Look through the results in the command-line tool "netstat" (network statistics). The first column tells you the type of connection, the   second shows you the local address, the third the foreign address, and the final column shows the status of the connection. 4. Check the port numbers for an intrusion. The port numbers follow the IP or server address in the following format: ":XXXXX." Ports between 0 and 1023 are safe; ports between 1024 and 49151 are relatively safe; and you should be suspicious of ports between 49152 and 65535. Certain peer-to-peer software applications use the final port range, so close any P2P software and