Featured Posts


Saturday, April 13, 2013

How To Fix Virtual Memory Too Low Error

This is a very common error message and before showing how to resolve the low virtual memory error we should maybe explain what it is an what causes it.

What is virtual memory?

You computer has RAM which distributes data from the hard drive to the processor and the other way around. When the RAM memory is running out of space it calls for backup in the form of virtual memory. Virtual memory is just that “Virtual” as it taps into space on the hard drive to give your RAM a bit of backup.
If the amount of Virtual memory available to the operating system is too low you will start to get the virtual memory too low messages. The most common reason for getting this message is a recent memory upgrade or setting change. Luckily there is a way to ensure you have enough virtual memory by simply changing a few settings in the virtual memory settings.

How to change the amount of virtual memory in Windows 7 and Vista

Go to your start button at the bottom left of your screen and then go to computer and right click on it.virtual memory too low screen one
You will now see the system information screen. To access the virtual memory settings page click the advanced settings text link on the left hand side of the page.

Low virtual Memory screen 2
You will now have a new window pop up with a number of tabs along the top. It should default to the advanced tab but if not select the advanced tab and then under performance select settings to get to the virtual memory settings. Another new windows will open, select the advanced tab again. Finally click on the change button under Virtual memory and this will be the page we resolve the problem.
Low virtual memory screenshot 3virtual memory screen4
You will now be in the virtual memory settings screen and your virtual memory settings may look different from the screenshot below.
virtual memory
For most people setting the virtual memory to be automatically managed by the operating system should be more than adequate for most people.
If you can’t or don’t want to use the automatic option you can set it manually.
Custom Size – Sets the minimum and maximum Paging file. If you are going to set manually the usual recommended figure for maximum is 1.5 times your amount of RAM. For example if you have 4GB of RAM then the recommended maximum is 6GB of virtual memory but if you are still getting the error it may be worth playing about with the maximum.
System Managed - Means that the memory is managed by the system but again if you are getting virtual memory too low warnings you may be best playing around with custom size.
No paging File – Not recommended. This means you will have no virtual memory backup should you run low on memory.
Once you have set simply OK through the open screens. You may be prompted to restart your computer.
Hopefully that should resolve your virtual memory too low warning messages.
Courtesy :

Thursday, April 11, 2013


A New vision for Postal department

   New  plan for department  of  Posts   has  been  prepared by  Directorate of   Post.......

   To   View  this  slide  

   Please  click  Plan  for  future of  Postal  department 




This is a SQL related issue. The SQL Server might be disconnected during the process of Closing Bag event. Please check the accessibility and condition of the SQL Server. If required, please re-load the SQL Server and check.

With Regards,
Help Desk
Centre for Excellence in Postal Technology
Nazarbad, Mysore 570010
Karnataka, India
Ph:   0821 2449015 
Fax:  0821 2440526

3 ways to send self-destructing emails

In the era of Snapchat and Poke, self-destructing messages on smartphones and tablets are the new fad. However, such self-deleting messages are not limited to handheld gadgets only. You can now send self-destructing messages via good old email too. Yes, there are a number of services in the market that let you send messages to others which get deleted once they read it.

Here are three online services that enable you to send self-destructing emails.

This is an easy-to-use service which actually gives you a URL for the whatever message you have typed. And once the URL is opened for the first time, it gets invalidated and no one can again use it. And this service promises that the message is deleted from their servers too, which makes it a trust worthy service.


It's a pretty interesting concept on which it works. All you are supposed to do is go the website, type in the content that you wish to share, and click on Create Note button. Once done, it would give you a link which can be used in your email. The reader would click on this URL to read the message and once he/she reads it, the URL will get expired.

Self Destructing Message

This service lets you send mails anonymously as well as generate links for the messages. Then you need to click on the drop down and choose the seconds (number of seconds till which the reader can have the message open), type your message and click on Create Message button. Your self-destructing message is now ready.

Source: Dwarka Rao, PCsPlace

MoneyGram renews India Post agreement.

MoneyGram (MGI), a leading global money transfer company, today announced it successfully renewed its agreement with India Post, the largest postal network in the world.
MoneyGram launched the service with India Post in September 2011 at 100 India Post locations.  Since then, that number has grown to include 2,500 India Post locations offering MoneyGram's money transfer service.

According to Pamela H. Patsley, MoneyGram chairman and chief executive officer, extensions and renewals are as important as new signings to the base business. "Retaining and extending existing agent relationships are directly related to our continued success, customer focus and revenue-building initiatives of MoneyGram," said Patsley. "We are also looking forward to further expanding and increasing India Post locations in the coming years to offer convenience to our customers, and offering the added trust associated with India Post and MoneyGram."
MoneyGram's growth strategy includes aligning with post offices, among other types of agents, providing consumers with convenient access to reliable and affordable money transfer service close to where they live and work. Currently, MoneyGram has nearly 30 postal relationships globally in countries such as the United Kingdom, Canada and Italy with plans to expand further in the coming years. 


RNet Version 2.1 (For CRCs and BPCs) Released on 09/04/2013

The RNet application which has been developed based on the earlier CRC Application has been released on 22.07.2011.  Subsequently, MNOP concept has been implemented for Registered Articles/Bags.  During the implementation of RNet application and MNOP concept, suggestions have been received from various CRCs/Divisions/R.O.s/Circles for enhancement of the options available in RNet application. The suggestions approved by Mails Division of the Directorate (which are mentioned in detail later in this document) have been incorporated in RNet application.
Further few suggestions have been received to optimize the usage of Despatch module for the purpose of BPCs and MBCs and these changes approved by Directorate are also incorporated in the Despatch module to be implemented in BPCs and MBCs.  Hence this release.


Top 5 Useful Windows 7 Tips and Tricks

windows 7 logo

While you will find many articles with Windows 7 tips very few of them are useful to the average users. We look at the top 5 useful Windows 7 tips that can help make life a little easier.

1. Lock your Computer

When you are away from your desk you may want to secure your computer from unauthorised access by locking the screen (Taking it back to the login screen). It is very easy to do this by pressing a  combination of the windows key (the one between alt and ctrl on most keyboards) and the L key together. This will lock your screen and require a password.
Note: To do this your account must be password protected.

2. Rename a batch of files

This technique allows you to rename a collection of files and folders in one go. For example if you have a lot of holiday snaps you may wish to rename them all “Holiday” followed by a unique number. Using this technique will rename the files Holiday(1) Holiday(2) Holiday(3) etc.
Select all the files you wish to rename either by dragging the mouse or if it is all the files using edit/select all. Press F2 and then type the name into the first file and press enter. All your files will be renamed.

3. Improve readability of text with ClearType

ClearType is a piece of software included with windows 7 that allows you to improve the quality of the text on 
the screen to make it easier to read. The program shows you a number of text examples and asks you to choose which is easiest to read and adjusts your display based on the answers.
To start Cleartype click the start/windows button in the bottom left corner of your screen. In the search box at the bottom type cttune.exe. This will launch the program

4. Access recent folders

On the taskbar at the bottom of your screen is a folder icon. Clicking the folder opens the document section of the libraries folder but if you right click you will get a list of recently accessed folders. You can also pin you favourites to this menu

4. Pin folders to the task bar via windows explorer

Pinning a folder to the windows explorer folder on the task bar is very easy to do. For example you may want to pin a frequently accessed folder you use for work. Find the folder you want to pin and click your left mouse button on it and hold. Drag the folder to the task bar until you see a message say “pin to windows explorer” then let go of the mouse button. If you now go back and use tip 4 you will see your folder at the top.

5. Wiggle away those windows

This is a useful little trick for those of you that often have multiple windows open. There are times you want to minimize everything but the window you are working on. If you use the show desktop button it minimises all of the windows. Worry not there is a way to keep that window open.
Left click and hold in the top bar of the window you want to stay open (the bit where the name of the program is along with the maximise and close buttons) While holding wiggle the mouse from side to side quickly and you will see all the windows minimise. To bring them all back just repeat.

Courtesy :

Bridge Plugin Setup and Updates

Bridge Plugin Setup: Download and Install Bridge plugins 

Replace SB Plugins and V2Conversion Latest exe :  Download 


SB Plugins v3.2 :  Download

V2Conversion 3.1 :  Download

Wednesday, April 10, 2013

Holding of PA/SA Direct Recruitment for the vacancies of the years 2011 and 2012 through approved Outsourced Agency.

As per DG, Posts letter No.A-34012/5/2011-DE (Pt.) dated 1st April 2013, addressed to the Deputy General manager, M/S CMC Ltd, Noida and copy to Chief PMG, Kerala, the Competent Authority has agreed to the proposal for holding a separate Aptitude Test for Kerala Circle delinking the same from Phase- I and to hold it on 12-05-2013.

         The above approval is subject to the condition that Admit Cards for the permitted candidates in respect of Kerala Circle will be dispatched by 25-04-2013 besides displaying them in the Indiapost website

Tuesday, April 9, 2013

What is IP Address and Subnet Mask?

An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.

IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.

For example, the dotted-decimal IP address is (in binary notation) the 32 bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.

These eight bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format ( The decimal numbers separated by periods are the octets converted from binary to decimal notation.

For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks do not know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.

For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example and divide it into these two parts you get the following:
   192.168.123.    Network
              .132 Host
-or- - network address.     - host address.

Subnet mask

The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the network and host addresses above cannot be determined unless you have more information. This information is supplied in another 32-bit number called a subnet mask. In this example, the subnet mask is It is not obvious what this number means unless you know that 255 in binary notation equals 11111111; so, the subnet mask is:
Lining up the IP address and the subnet mask together, the network and host portions of the address can be separated:
   11000000.10101000.01111011.10000100 -- IP address (
   11111111.11111111.11111111.00000000 -- Subnet mask (
The first 24 bits (the number of ones in the subnet mask) are identified as the network address, with the last 8 bits (the number of remaining zeros in the subnet mask) identified as the host address. This gives you the following:
   11000000.10101000.01111011.00000000 -- Network address (
   00000000.00000000.00000000.10000100 -- Host address (
So now you know, for this example using a subnet mask, that the network ID is, and the host address is When a packet arrives on the subnet (from the local subnet or a remote network), and it has a destination address of, your computer will receive it from the network and process it.

Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other common subnet masks are:
   Decimal                 Binary         1111111.11111111.1111111.11000000         1111111.11111111.1111111.11100000
Internet RFC 1878 (available from ) describes the valid subnets and subnet masks that can be used on TCP/IP networks.
Related Posts Plugin for WordPress, Blogger...