Wednesday, 28 September 2011

AMOLED Display.


AMOLED stands for Active Matrix Organic Light Emitting Diode.

AMOLED is a latest display technology. It is used for mobile devices and televisions. AMOLED screens are ultra thin, ultra bright and doesn't require backlight to work.

Advantages of AMOLED are described below.



  • High contrast ratio.
  • AMOLED
    AMOLED Contrast ratio.
      Conventional


You can see from the image that AMOLED has high contrast ratio than conventional.

    • Fast response.

      Fast response of AMOLED display

      AMOLED(50uS)

      Fast Response of AMOLED display

      Conventional(3000~30000uS)

      Fast response time means full motion graphics can be displayed.

    • Wide Viewing Angle.

    Wide Viewing angle of Amoled display
      Conventional



      Wide Viewing angle of AMOLED
        AMOLED



        • High Luminance.

        • True Colors.

        • Low Power Consumptions.
        • High Flexibility.


          Here are some Images that can amaze you. It is of samsung AMOLED display.



          Flexible Display



        Samsung AMOLED Display

        • Very Slim Design.

        However AMOLED has some limitations which don't make it suitable for all applications.

        • Price

          Price is high compared to other displays.
        • Image Sticking.

          Image sticking is the term used to describe the image rentention occuring when a fixed pattern is displayed over a long period of time.


          Image Sticking
          For example, if we continuously display the checker board pattern like shown in the left side of the image for a long time and switch to 50% grey of full white pattern, we can see the image like the right one. This phenomenon is called Image Sticking.


        • Life Time.

          Life Time is small compared to other displays.

        Wireless Electricity (WiTricity)


        This principle was invented by Tesla.


        Tesla

        Wireless Electricity is called WiTricity. Transmission of electrical energy from one object toanother without the use of wires is called as WiTricity. WiTricity will ensure that the cellphones, laptops, iPods and other power hungry devices get charged on their own, eliminating the need of plugging them in. Even better, because of WiTricity some of the devices won't require batteries to operate.



        The basic model of this is shown in below image.
        Model of WiTricity
        As you can see in the figure that two magnetic coils are coupled with each other. One is energy transmitter and other is receiver. The concept behind this is as below.

        Consider two self resonating copper coils of same resonating frequency with a diameter 20 inches each. One copper wire is connected to the power source (WiTricity transmitter), while the other copper wire is connected to the device (WiTricity Receiver).

        The electric power from the power source causes the copper coil connected to it to start oscillating at a particular (MHz) frequency. Subsequently, the space around the copper coil gets filled with nonmagnetic radiations. This generated magnetic field further transfers the power to the other copper coil connected to the receiver. Since this coil is also of the same frequency, it starts oscillating at the same frequency as the first coil. This is known as 'coupled resonance' and is the principle behind WiTricity.

        With the help of this concept we can recharge our devices without wires.

        We can use this concept to transfer energy from solar plates in the satellite to earth directly without wires. The possible model for this is shown in the image.


        Application of wireless electricity

        These solar plates absorb energy from sun in space. This energy is transmitted to earth where the huge receiver is located. We can understand this by below figure.

        Wireless energy transfer

        In this figure we can consider transmitting antenna as transmitting satellite. And rectena( receiving antenna) as huge receiver at the earth.

        However the efficiency of this is low. So it is hard for this technique to compete with present scenario.

        Tuesday, 27 September 2011

        How to Post blank facebook status?

        We usually like to update the status which is different from others. Here is how you can post a blank status.

        For that just type "@[0:0: ]" without quotes.

        What is Proxy?

        Many people have heard of the word proxy and for most of them, this is just a common technical word. I can explain you what proxy is. And why it is used to access the sites which are restricted by the network administrator. 

        What is proxy?

        A proxy is a site that can provide Internet users the access to sites that are blocked by filters, or restrictions set by Internet and network administrators. It uses masking to avoid filters.

        This kind of restrictions are generally at schools, colleges or offices.


        Proxy has ability to temporarily modify your IP address and make you anonymous when you access blocked sites.

        One common application of proxy is a caching web proxy. This allows a cache or storage of web pages and files available on remote servers. This allows local client workstations to quickly access these frequently used pages. With a caching proxy, the URL that is accessed is searched in the local cache. If it is there, the document is displayed immediately. Otherwise, it gets fetched from the server and returns it to the requesting client and saves a copy of the page in the cache.

        How does it work?

        A proxy operates in the same manner of accessing the Internet as when a web browser is used. It allows the user to enter the web address and be linked to the specific site in the browser window.

        Where the window maintains a code that is part of the proxy site address. It does not reflect the actual website that the user is accessing. And the information accessed and stored in the temporary Internet files will be related to the proxy site and not to the restricted site.

        A proxy site allows anonymous web surfing which gives the advantage of not being tracked about your online activities. With anonymous surfing, no one would know who you are, your location and what particular sites you are visiting.

        Types of proxies.

        • Open Proxies.
          Open Proxy



        • An open proxy is a forwarding proxy server that is accessible by any Internet user.
        • Forward Proxy.
          Forward Proxy


        • Forward proxies are proxies where the client server names the target server to connect to. Forward proxies are able to retrieve from a wide range of sources (in most cases anywhere on the Internet).

        • Reverse Proxy.
          Reverse Proxy

        • A reverse proxy is a proxy server that appears to clients to be an ordinary server.

        The good thing about proxy sites is that the IP address of the user is not recorded. This allows the anonymity and privacy of the user. It can even allow you to eliminate images and advertisements.

        Proxy Scripts

        There are mainly two types of proxy scripts. PHProxy and CGIProxy
        • PHProxy.

          PHProxy or sometimes known as PHP proxy is a site that allows free and unchallenged access to social networking sites without a user name. This kind of proxy also allows access to government and corporate sites. Although PHProxy is useful for those who have security concerns with the different sites, it is most often taken advantage of by hackers or those who were denied access in their previous access attempts.


        • CGIProxy.

          CGI means common gateway interface and this kind of proxy is installed on web servers using different protocols like HTTP, SSL and FTP. With this proxy, you will be able to access any resource from its server. It is very useful for anonymous proxies, virtual private network and for personal uses. It modifies links to point to the proxy and these include images, requests or any other access operation. It can also filter unwanted advertisements.


        A proxy is needed when your school or your employer has strict and unreasonable Internet access policies.

        A proxy is needed to conduct your business without intrusion by anybody.

        It is very useful when you are out of the country and you need to access content that is restricted only to your country.

        You simply need a proxy to hide from advertisers who are interested to know where you are located and what kinds of products you are buying.

        There are countries that block their citizens from getting outside information from the Internet, the use of proxies can allow them to get in touch with the world and know what is going on.


        Open Firefox inside Firefox

        Here is a trick to open firefox inside firefox.

        Just copy this into your firefox address bar without quotes and hit enter.

        "chrome://browser/content/browser.xul"



        After that you can see firefox as below.

        Open Firefox inside firefox firefox tricks

        This browser also works as original browser.

        Monday, 26 September 2011

        IPv6


        IPv6 stands for Internet Protocol version 6.

        Basically it is newer version of IP address. Currently, IPv4 is being used. But it has some limitations. Like...


        • Number of available addresses.

          Because of increasing number internet users and internet using applications,the number of addresses available is decreasing day by day.



        • Security

          IPv4 was published in 1981 and current security problems weren't present at that time. So Providing security to IPv4 is very difficult.
        • Complex address configuration.

          Because of increase in number of internet users and internet applications, the address configuration has become complex.

        • Quality of Service(QoS). based

          Quality of Service (QoS) is available in IPv4 and it relies on the 8 bits of the IPv4 Type of Service (TOS) field and the identification of the payload. IPv4 Type of Service (TOS) field has limited functionality and payload identification (uses a TCP or UDP port) is not possible when the IPv4 packet payload is
          encrypted.


        These limitations has been over come in IPv6. Key features of IPv6 are as under.


        • Number of addresses available.

          IPv4 uses 32 bit address. That means it has 232 = 4,294,967,296 available addresses.

          Whereas IPv6 uses 128 bit address. That means it has
          2128 = 340,282,366,920,938,463,463,374,607,431,768,211,456
          available addresses.
        • Which is 79,228,162,514,264,337,593,543,950,336 times more than IPv4. That means approx ∼ 5 x 1028 addresses per person on the planet.
        • Example of IPv6 address.

          IPv4 address:198.10.0.0/16

          IPv6 address: 2001:db8:12::/40


        • Types of addresses.

          Unicast : One to One (Global, Unique Local, Link local)

          Anycast : One to Nearest (Allocated from Unicast)

          Multicast : One to Many.


        • IPv6 Header format is shown below.


          IPv6 Header Format
        • Decomposition of IPv6 address in to its binary form is shown below.


        • IPv6 Address into Binary Form
        • 8 June 2011 was named as IPv6 day.

        Amazing sports watch for athletes.

        Nike and TomTom has invented an amazing sports watch.

        Nike and TomTom's sports watch
        It has following features that can amaze you.
        • Accelerometer Sensor.
        • GPS tracking.
        • Heart Monitor.


        It measures runners speed, run-time, distance, elevation, and heart rate during running workouts.

        The watch can store runner's run history and map routes.

        The watch use runner's pace, body weight and distance data to calculate how many calories runner burn while running.

        Data can be uploaded to a computer by using a usb contact in the watch band.

        Alternatively, the information can also be accessed at a running training program website maintained by Nike for it's users. The site is known as the largest running training program in the world with over 4 million members.

        It has ultra-low power consumption and has a rechargeable lithium polymer battery that fully charges in 2 hours, with a 50 day standby capacity, 2 month watch mode, or 9 hour run mode.

        The watch is water resistant to 5 ATM and can operate in temperatures between -20C to 60C (-4F to 140F).

        Thursday, 22 September 2011

        Visible Light Communication

        You can use light to send data across the room. This type of communication is called Visible Light Communication. LEDs are used in this type of communication. Advantages:
        • LEDs are currently penetrating many areas of our everyday life. They are likely to replace high energy consuming light bulbs in private and business homes and even in street lamps. Moreover, they can be used in headlights of planes and trains, front and back lights in cars and trains, and for object illumination in museums, etc.

        • Bandwidth is not limited. So ultra high data rates.



        • Existing local powerline infrastructure can potentially be utilised.

        • Transmitters and receivers devices are cheap, and there is no need for expensive RF units.

        • As lightwaves do not penetrated through objects or walls. It is very difficult for an intruder to pick up the signal from outside the room.

        • Visible light radiations are undoubtedly free of any health concerns Therefore, these systems will receive acceptance for use in hospitals, private homes, etc.

        • Furthermore, no interference with RF based systems exist, so that the use in airplanes is uncritical.

        • No harmful effects like cellular tower.
        The basic block diagram is shown below.

        Visible Light Communication Block Diagram A model for this is shown below.


        Visible Light Communication
        Visible Light Communication uses the frequencies between 400THz to 800 THz. Different types of modulation techniques can be used. It has both partial and full solution of limited bandwidth.

        Applications:

        • Smart Home Network.

          Enabling smart domestic or industrial lighting, home wireless communication including media streaming and internet access.

        • Hospitals and Helthcare.

          Enable mobility and data communication in hospitals. No harmful effects.

        • Defense and Military applications.

          High data rate wireless communications within military vehicles and aircraft.

        • Under water communications.

          It can communicate between divers and remote vehicles.

        • Hazardous Environment.

          Enable data communications in environments where RF is potentially dangerous. Such as oil and gas, petrochemicals and mining.

        • Wi-Fi spectrum release.

          Providing additional bandwidth in environments where licensed or unlicensed Communication bands are conjusted.

        • Commercial Aviation.

          Enables wireless data communications such as in-flight entertainment and personal communication.

        • Security.

          Provides the use of wireless networks where wifi presents security risc.

        Wednesday, 21 September 2011

        Top 10 tech stock companies


        Top Stock Companies
        These are the Latest list of Top 10 tech stock companies those have height growth by at least 15% over the next five years. The data is sourced from different website and survey. The technology industry provides the basis for chip production, information & communication systems. Here are list:
        1- Apple Inc. (AAPL): Apple produces and markets personal computers, mobile communication and media devices. AAPL recently traded at $377.48 and gained 43.31% during the past 12 months. The stock has a market cap of $350 billion, P/E ratio of 14.94 and estimated EPS growth over the next 5 years at 20.9%. Rob Citrone’s Discovery Capital Management had $707 million invested in AAPL at the end of June



        2- Baidu, Inc. (BIDU): Baidu provides Chinese and Japanese language Internet search services. BIDU recently traded at $143.63 and gained 70.32% during the past 12 months. The stock has a market cap of $50.1 billion, P/E ratio of 65.29 and estimated EPS growth over the next 5 years at 48.6%. Baidu is the 2nd largest holding of Navellier & Associates’ equity portfolio. Louis Navellier has shares of Baidu worth $68 million. Ken Fisher’s Fisher Asset Management has the highest stake in the company. Fisher has $590 million invested in Baidu. Andreas Halvorsen also has a stake in Baidu worth $300 million.

        3- American Tower Corporation (AMT): American Tower Corporation is a wireless and broadcast communications infrastructure company. AMT recently traded at $52.38 and gained 6.75% during the past 12 months. The stock has a market cap of $20.7 billion, P/E ratio of 54.56 and estimated EPS growth over the next 5 years at 18.4%.

        4- Salesforce.com Inc (CRM): Salesforce.com provides enterprise cloud computing applications. The Company provides a customer and collaboration relationship management, service to businesses of all sizes and industries worldwide and provides a technology platform for customers and developers to build and run business applications. CRM recently traded at $123.23 and gained 4.95% during the past 12 months. The stock has a market cap of $16.5 billion, P/E ratio of 616.15 and estimated EPS growth over the next 5 years at 28%. Cramer recommends owning Salesforce.com through deep-in-the-money calls to protect from downside, as CRM is a volatile stock.

        5- Tele Celular Sul Participacoes (TSU): TSU provides mobile telecommunications services in Brazil. TSU recently traded at $27.7 and has a 4.5% dividend yield. TSU lost 6.95% during the past 12 months. The stock has a market cap of $6.9 billion, P/E ratio of 8.74 and estimated EPS growth over the next 5 years at 57.4%.

        6- Marvell Technology Group Ltd. (MRVL): Marvell is the leading fabless semiconductor company. MRVL recently traded at $13.69 and lost 19.57% during the past 12 months. The stock has a market cap of $8.4 billion, P/E ratio of 11.04 and estimated EPS growth over the next 5 years at 16%.
        7- First Solar, Inc. (FSLR): First Solar provides solar modules using a thin-film semiconductor technology. FSLR recently traded at $84.96 and lost 38.62% during the past 12 months. The stock has a market cap of $7.3 billion, P/E ratio of 14.47 and estimated EPS growth over the next 5 years at 20%.

        8- F5 Networks, Inc. (FFIV): F5 Networks is one of the leading application delivery networking companies. FFIV recently traded at $74.6 and lost 20.76% during the past 12 months. The stock has a market cap of $6 billion, P/E ratio of 27.43 and estimated EPS growth over the next 5 years at 23.2%. Ken Griffin’s Citadel Investment Group increased its FFIV holdings by 64% during the second quarter. Ken Griffen had $59 million invested in FFIV

        9- Rackspace Hosting, Inc (RAX): Rackspace Hosting is a hosting and cloud computing company. RAX recently traded at $35.17 and gained 61.78% during the past 12 months. The stock has a market cap of $4.5 billion, P/E ratio of 95.05 and estimated EPS growth over the next 5 years at 31.3%. Bill Miller’s Legg Mason Capital Management had the largest position in RAX at the end of June. Bill Miller had $47 million invested in RAX.

        10- Equinix, Inc. (EQIX): Equinix, Inc. provides network neutral data center services. EQIX recently traded at $87.66 and lost 7.27% during the past 12 months. The stock has a market cap of $4.1 billion, P/E ratio of 51.26 and estimated EPS growth over the next 5 years at 29.6%. Stephen Mandel’s Lone Pine, Jeffrey Tannenbaum’s Fir Tree and Eric Bannasch’s Cadian had the largest stake in EQIX among the 300+ funds we are following.

        Tuesday, 20 September 2011

        Download Pieces in Order

        This post is for utorrent users. This will help to download the pieces of the video file in order. Make sure that VLC media player is installed. If you want to download pieces in order then follow the steps shown below.


        1. Start downloading torrent.



        2. After two or three minutes, just click on the 'stream' button. Make sure that you have selected to play the video file with VLC media player.

          Download pieces of torrent in order.



        3. After clicking it a new dialogue box will appear. In that select the file you want to download in order.(It will only appear if there are multiple video files in the torrent.)


        4. After selecting it the remaining time will appear inplace of the 'Stream' button.


        5. After that time is elapsed, the video will play automatically.


        6. But after playing for few seconds/minutes it will stop playing.


        7. But dont close the player. Keep it open.


        8. You can see the pieces downloading in order in the pieces menu.


          How to download pieces of torrent in order?



        9. It will download the pieces in order till you keep vlc player open.

        (This will work only for videos)

        Block Unwanted Programs From Using Your Internet

        If we don't block these programs the can use our data plans. They can use our data for no worth. There are many software available in the internet. But the most easy to use software are firewalls. There are many firewalls available. I will show you how to use it.

        • Install any firewall software. I will show you how to use 'Sygate Personal Firewall'. You can download it from the link given below.
          Sygate Personal Firewall


        • Install it. It will demand for restart.
        • After connecting to internet, after some time you will get the message like under.

        Stop Unwanted programs from using your internet


        • You can select 'yes' or 'no' according to your choice.
        • You will find it interesting that you will come to know that which softwares are using your internet connection. And you can allow or block them.
        • Here are some screenshots of this software.



        Block unwanted programs from using your internet.


        Prevent unwanted programs from using your internet?







        Download torrent files using download manager.

        Some times we don't get enough speed while downloading files via torrent. So here is the method for how to download torrent file via IDM or other download manager.


        1. Goto www.torrific.com .



        2. Copy URL of your torrent file and paste it as shown below. And click on Get.



        Download torrent file using IDM



        3. After that you will see the page as below. And click to download the torrent file.




        Download torrent file using download manager.



        4. After thar you will see the page as below. Click on 'initiate bittorrent transmission'.




        How to download torrent file using using download manager?

        5. After waiting for few seconds you will see the page as below. And then click on any file to download with your download manager.



        Increase download speed of torrent files.


        6. After clicking on any file you will prompted to download the file. That's it!!



        Increase download speed of torrent using IDM


        7. You can download torrent with download manager.

        Make Portable Version of any software.

        Installation of any software is a boring thing to do. But you can make any software portable. For this you can use the software called Cameyo.

        You can download it from the link given below.

        Cameyo



        1. Install the software.

        2. After installing it you will see the screen as

        Make portable version of any software.


        3. Now Click on
        Caputre Installation.


        4. After that you will see the screen in the right bottom corner as under.



        Make portable version of any software using cameyo.


        5. Intstall the software into your system whose portable version you want to create.


        6. After Complete installation of the software click on the Install Done of the cameyo screen.


        7. Now it will create a portable version of your installed software which you can carry and run anywhere without any installation.


        8. You can get the portable version of it in My Documents\Cameyo Packages folder.

        It is very simple.

        Photo Zoom Application for Picasa, Twitter and hi5

        As we all know that facebook photozoom addon has become very popular. And we all would like to have it in other sites also. Here is an addon for that. It is called Thumbnail zoom. It works for the sites listed below.

        Facebook       Twitter       Twitpic
        
        
        MySpace        LinkedIn      Hi5
        
        
        
        
        
        
        Amazon         Picasa        Flickr
        
        
        Tagged         PhotoBucket   deviantART
        
        
         Last.fm        Wikipedia    GoogleImages
        
        
        YouTube        Daily Mile   IMDb
        
        
        Imgur          Photosight
        



        You can see working of it in the snapshot shown below.




        Thumbnail Zoom Aplication



        You can download this addon from the link given below.


        Thumbnail Zoom

        Convert DoCoMo 2G in to 3G.

        If you want to get 3G speed in 2G data plan in docomo, just follow these two very easy steps.


        1. First recharge with a 2g plan like 48rs or 96rs 6gb.



        2. Then recharge with 11Rs 3G intenet plan and thats it!!

        All your 2G data will be converted into 3G. And you will get fast 3G speed.

        Send SMS without showing your number.

        Today we all send sms to communicate with friends, or promote business. Here are some list of sites that can send sms for you. In most of these sites you don't need to enter your number!!


        tech4world



        bollywoodmotion


        smsti.in


        Spicesms


        atrochatro

        How to disable drive autorun?

        Now a days there are lots of viruses in your school, college or in a public computer. These viruses can also affect your computer. Most of the viruses come from pendrive or flash drive. You can save your computer from being affected by disabling drive autorun. Here are few easy steps by which you can disable drive autorun.

        1. Open notepad.
        2. Type in that file as written below.
        REGEDIT4
        [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
        @="@SYS:DoesNotExist"


        3. Then save the file as "Name.reg".



        4. After saving, double click on it.

        5. You will get a dialogue box like under.




        6. Select YES. Then you will receive Dialogue Box as under.



        7. Thats it your drive autorun has been disabled.


        There is also another method to do it



        1. Go to Start Menu \ Run and type in 'gpedit.msc' .
        2. You will see the Group Policy window.
        3. You should select Administrative Templates \ System in the tree view
        4. Double click on 'Turn off Autoplay' .
        5. You will receive a dialogue box like under.





        6. Select 'All drives'. And then click on apply.

        7. Thats it your autorun has been disabled.

        Google Wallet brings 'wave and pay' to mobile phones

        Google Wallet is a mobile payment app developed by Google that allows its users to store credit cards, loyalty cards, and gift cards among other things, as well as redeeming sales promotions on their mobile phone, Launched in the US on the Sprint Nexus S 4G.
        Google Wallet


        Initially, the only phone supported is Sprint's Nexus S 4G, but Google plans to produce NFC stickers associated with one credit card each, ostensibly to be affixed to non-NFC-capable phones. Two methods for providing money to the service are advertised, Citi Mastercards and "Google Prepaid Card", which can be loaded using any major credit card.


        PayPal Lawsuit

        Shortly after launch, PayPal filed a lawsuit against Google and two former employees of PayPal - Osama Bedier and Stephanie Tilenius. The complaint alleges “misappropriation of trade secrets” and “breach of fiduciary duty.” The lawsuit reveals that Google was negotiating with PayPal for two years to power payments on mobile devices. But just as the deal was about to be signed, Google backed off and instead hired the PayPal executive negotiating the deal, Bedier. The lawsuit notes that Bedier knew all of PayPal’s future plans for mobile payments, as well as an internal detailed analysis of Google’s weaknesses in the area.

        Open Multiple facebook, twitter accounts simultaneously

        In todays world many people have more than one accounts in facebook, twitter, gmail etc. But they can't open it simultaneously. I will show you how to open these accounts simultaneously. This trick will only work in firefox. You can open any accounts simultaneously with the help of this trick.


        If you dont have firefox then you can download it from the link given below.



        After intalling it follow the steps given below.


        1. Go to start menu. Click on Run.


        2. Type "C:\Program Files\Mozilla Firefox\firefox.exe" -no-remote -p
        Then click Ok.





        3. After clicking OK you will get screen like below. Click 'Create Profile' on it.





        4. After clicking on it, you will receive dialogue box like shown below. Select 'Next' on it.



        5. After that type the profile name you want to create.



        6. Then click on finish. You will get the dialogue box as under.




        7. Now select the profile you want to open and click on 'start firefox'. Uncheck the checkbox as shown in the above figure so that you can select the profile at the time of starting the firefox.

        8. To open second account, open firefox in another profile. And that's it! You can open second account in it.



        For chrome users, follow steps written below.

        1. Log in to the account in chrome.

        2. Now press ctrl+shift+N. It will show new icoginto window.

        3. Thats it! Now you can open another account in it!

        Facebook Keyboard Shortcuts

        Here are some very useful facebook sortcuts for facebook users.

        For Chrome Users :
        • Alt + 1 : Go to news feed
        • Alt + 2 : Go to your own profile.
        • Alt + 3 : To see your friend requests.
        • Alt + 4 : To view messages.
        • Alt + 5 : To view notifications.
        • Alt + 6 : Go to your account settings.
        • Alt + 7 : Go to your privacy settings.
        • Alt + 8 : To view facebook's own profile.
        • Alt + 9 : View Facebook Statements and Rights agreement
        • Alt + 0 : Open facebook Help Center.
        • Alt + ? : Go to the facebook search.
        • Alt +m : To compose a new message.

        For Firefox users :

        • Alt + Shift + 1 : Go to news feed
        • Alt + Shift + 2 : Go to your own profile.
        • Alt + Shift + 3 : To see your friend requests.
        • Alt + Shift + 4 : To view messages.
        • Alt + Shift + 5 : To view notifications.
        • Alt + Shift + 6 : Go to your account settings.
        • Alt + Shift + 7 : Go to your privacy settings.
        • Alt + Shift + 8 : To view facebook's own profile.
        • Alt + Shift + 9 : View Facebook Statements and Rights agreement
        • Alt + Shift + 0 : Open facebook Help Center.
        • Alt + Shift + ? : Go to the facebook search.
        • Alt + Shift + m : To compose a new message.



        If you are using Internet Explorer, then you just have to hit enter after the facebook shortcuts of chrome.