Tuesday, December 26, 2006

Baby Congratulaton Messages

When knowledge takes place

Because ... Who said that the computer is not fun?

We discussed in a previous article

that hides the Windows registry some things that, while serious, have their banter. Today it's talking about the windows allows you, instead of "hello to the French" shows you a message every time you boot: a legal notice, a welcome message, a reminder or something more playful.

Again ... BRIEF

POINT FOR IMPORTANT QUESTION AND ITS ANSWER: Question .- I can screw up stuff in it? Response .- Yes

Having said this, and if you have those who dare to mess with the registry of equispé, we'll get to work. It's simple: Go to

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ Winlogon and searches for the key

LegalNoticeCaption

. Write on it something like "CRITICAL ERROR IN THE START." Next, locate the key 
LegalNoticeText

and write on it something like "has been found
esfurullo flist in the BIOS of the system. This could lead to instability, loss of data and could even leave the computer completely unusable. Por favor, reinicie AHORA la computadora y, si el problema persiste, póngase en contacto con el Administrador.

".


Lógicamente el problema persistirá, pues windows mostrará siempre este mensaje al arrancar. Así que ya solo nos queda apagar el ordenador y... esperar que no tardando mucho lo encienda uno de esos usuarios que no distinguen muy bien el sistema operativo del procesador de textos. Cuando este acuda al Administrador (o a ti mismo, que providencialmente pasabas por ahí), la respuesta obligada será: - Pero, ¡qué has hecho! Esta frase ha de pronunciarse en un tono seco. Muy seco. Que no quede duda de que el usuario es el CULPABLE del esfurullamiento del flister. This is the right time to take advantage of the situation: - Well I have to manually reconfigure the unified flist ... But now I have a thirst that I die, so let's go before the bar (you're going to run you the cost, lol). Anyway, my friend, we approach Christmas and the day of the Holy Innocents, and I did not want to miss this opportunity to typical cointribuir joy of these days dear.: D

Thursday, December 14, 2006

Tell Bacterial Infection By Looking At Tongue

Panic Attack! Simply

It's not a defect in the web surfing and spend idle hours at the computer, paddling through the vast ocean of information, but occasionally I do. And sometimes encounter an interesting page that for whatever reason (because now I can not read because I want to take a look later, because I feel like, etc) want to save. The first option that one can come up with is to store the link in the "favorites" function. And not a bad choice but it has some risks. In my case I have a computer you access more people, some of them old enough to play, play with the operating system or browse been compulsively page-not always reliable. That is, there comes a time when the cacharrejo stop doing what you ask and requires more time to change functionality relaying. I have a special predisposition salvation to forget some things when you reinstall the operating system such as the list of my favorite links. Not that there is in them critical and vital information but that does not bother walking losing data. And worst of all, did not learn from my mistake and lost the data more than once.

Some time ago I found a utility simply delicious. Del.icio.us

is a utility that lets you store your favorite URLs on a remote server classified with labels that you define (or you borrow from others who have already qualified this url or other similar content) .
The virtues of this service, from my point of view, are number:

Your bookmarks are safe, away from the evil that can be primed for your team. lets you sort of a very simple way in accordance with the criteria that you want, so the links are organized in the form of files in your folders (labels).


Lets share if you wish, your favorite links with the rest of the world.
gives you access to shared links from around the world, and incidentally discovered gems.


It's free, simply register with the server:
https: / / secure.del.icio.us / register


  • Before Adding new links is required to identify yourself as a user of the system, whatever the mechanism used to use.

  • To save a new link there are several options.
  • Let's start with the basic, which does not require us to install anything.
    would enter the homepage of the server,
  • del.icio.us
  • , and would click on the link
  • to enter login page https: / / secure.del.icio.us / login . Write your username and password (which used to register the service) and if we wrote everything correctly and are ready to insert our link. To do this click on the link

  • post leads us to a new screen that requests the url we want to save. Once written press the save button

leading us to a new screen where you will complete the additional data required by the server to properly organize bond. These data are the following:





url: This item comes already filled in the previous screen. Do Not share : this box allows us to indicate if we want others to view our blogs (if it is unchecked our links will be visible to everyone). description: This field is essential (without it we are not allowed to save the link) and provides summary information of the content of the linked page, useful for a glance, know what that page.

  • notes: This field allows us to expand, if desired, the description of the link.

  • tags: This field will contain the tag or tags that allow us to classify our link. We can put as many labels as you want separated by spaces. This means that if we wanted to put the label contains spaces, the system will find many tags as words (ie, if the label did not exist, the service creates it). It is often advisable to a label that gives us an idea of \u200b\u200bthe content of the linked page. Each link can be labeled with as many labels as you want. For example if a certain page contains tips for MS Windows might label the link with the words:
  • windows, SO
  • , tricks.

  • In the bottom of the screen shows the list of labels that have already been created, so that we can reuse labels, which is good to prevent the reoccurrence of such gremlins fed after midnight.

  • Another option would be to use one of the extensions (or additions as they are called in version 2) of which provides the
  • FireFox browser as it might be del.icio.us Complete . This extension allows you to do what would be done on the server page, but from a browser dialog. If you click on the link above will install the extension. Before you can use it you need to configure it. To do this simply select the del.icio.us option from the menu that appears when you right-click anywhere on the page where you are and within the del.icio.us option select Options . We see a dialog with several tabs. We went to the Accounts tab and press the button it Add ...
  • . Introduced in the new window the name we give to the account (for example, our users), our users and our password. Once this is done we can work with our del.icio.us account and introduce new links. To add a new link to the page we want to save, with the right mouse button menu and select deploy del.icio.us. Then select the option Post
  • current page, which will cause the emergence of a new window in which we are asked to enter the same data that we requested via the del.icio.us page, ie description (Description), labels (tags) and if we share or not the link (Private). In the same window we are three lists of tags, the higher (Recommended) contains tags that the service itself del.icio.us suggests. The central list (Your) contains our own tags (which have been introduced). The list below (Popular) contains tags that other users have entered the page you're saving (if anyone else has done.) Clicking on any tag in any of the lists we will fill our field of labels (tags). After entering the required information press the confirm button and our link will be stored.

  • This extension allows you to save links to our favorite sites but to see these saved links need to go into
del.icio.us
. Another wonderful extension for FireFox , Foxilicious that gives us life enormously. This extension allows us to take our browser favorite links that have been stored in del.icio.us . Like its companion extension before using it should be set up. To do this, after installation go to the Tools menu and within it to Foxylicious. We see a new window. At the top is the identification section. Enter the username and password and you can press the button Update Bookmarks . This will create a directory structure with the root del.icio.us under the Bookmarks menu. Thus we move from the browser, our del.icio.us links stored in .

Monday, December 4, 2006

Free Iphone Kate's Playground

del.icio.so Welcome to Intrusinet


Location (happily imagined)
first .- You go to the bakery for your loaf of bread. Baker asks you to put your ID in the mouth. It then asks you if you live alone or with your dog, and if the school gave you better kill or geography. Until you've answered all your questions will not let you ask the loaf. Ridiculous, right? Location (Happily imaginary) second - Are you where you live? - I asked a clerk to come to meet you.

- Eeeeeh, no, look, listen, I was just going to look at these shirts, you know? - What I've told you where you live, dammit!
Y. .. or you take and you run out to see the shirts. (Would you buy in a store like that?)



Location (unfortunately NOT imaginary) third .-

Internet. And we hardly need more specific because, unfortunately, Internet, this is our daily bread.

sort of place you arrive at the typical computer novice (or Halls) who has learned to make forms and has decided to show off their skills ... by passing through the ring to everyone told that reaches the page, and he is obliged to give the information to Mr. he pleases ask.

site or reach the characteristic of the typical computer that works under the typical light which aim to achieve (at the expense of visitors) a lot of data to be able to excel in, with colorful graphics with which to impress at the next board meeting or some other enlightened upper range or hierarchy.

O. ..


I, honestly, I fail to know what I find worse, if they ask for data or the des. Personally, I am of those who give. I hate to frustrate people. So when I ask for a name, give it a name: Lucas Grijander, Daffy Duck, Lucas Caminacielos, Canueces Lucas, Lucas Sanlúcar ... When I ask for an email, give us an email: lucas@fistro.es, masfalsoquneurodemortadelo@estemail.es ... Also, what the hell! That this unfortunate situation also has a positive side! For example, I always wanted to be "Archpriest of Hita, and now I am ... at least a bunch of databases that cyberspace. And I could indulge my latent bisexuality: some days I am a man, another woman ...

But of course, the little thing begins to get ugly when the deceased these what you are asking for is an email that you are sending
that you need to sign up there that want to enter. Now about a year ago I fell into error, as the nerd I am, to give one of my accounts "real" to me high in a statistics service. Since that fateful day, I have to spend a day tooooodos momentillo tooooodo erase the spam, which, thankfully, the Gmail filters me pretty well.


For when you just want to test a service, you can preserve your privacy and keep you safe from spammers, you (among others) this solution: 10 MINUTE MAIL






10 MINUTE MAIL

is a service that gives you a random email for ten minutes (which can be extended if the deceased who are late in sending the email that you walk waiting.) During those ten minutes all mail arriving at that address, will appear instantly on the web, and you can read, reply, click on the links ... In short, everything you need to be able to sign up for the service you want to try, without having to commit to do any of your accounts "serious." So convenient and so simple.



Thursday, November 30, 2006

Where To Buy Bintang Beer In London

, Mr.Lucas!

What they say in the TVE of the PP and PSOE? Does your PC CD or DVD? Do you lower the mail with POP or IMAP? Do you know how you affect the LSSI and the Data Protection Act? bad thing to use so many acronyms is that always end up confronting one who did not know, and then you realize you talk like real Martians.


And speaking we still have to pass, but the Anglo-Saxons ... The Anglo-Saxons to the acronyms is in-cre-í-ble! The first day you land in a forums in English, we find the typical start ASAP, FYI, IMHO, etc, etc, that everyone knows (everyone but you who are new in these conflicts). But you need not get in any forum: a bit as you move to anything regarding new technologies will find a long list of TCP / IP, SMTP, POP, IMAP, LDAP, PC, RAM, ROM, HD, CD, DVD, CPU, ALU, MIPS, AMD, IBM, RISC, SCSI, VB, HTML, XML, WWW, HTTP, SQL, URL ... The list is in-ter-mi-na-ble, and, worst of all is that these acronyms are so common terms that if you try to find the meaning of any of them is unknown you will have difficulty if you do not in an appropriate or a good site. Have you tried to find any of them in Google, as well as it?


So, of course, this paginilla long ago became one of my favorites:

http://www.acronymfinder.com/
Although this page is specialized in English and, therefore, Anglo acronyms you will find almost any acronym that comes to mind. From the mundane to the most guarretecochinillos: Personnel Identification System


PIS CACA
Chicago Art Critics Association Tennessee Educational Technology Association TETA

to the more English:
Zapatero ZP President (English Socialist Workers Party slogan for 2004 elections)

PP Popular Party (Spain) Lessee Company

CAMPSA Oil Company Monopoly (English Petrochemical Company)

Even some that you may find very curious. If you have a short name, you can try to find what are you in the Kingdom of the Acronym: ANA


CESAR Active Network Architecture Center for Engineering Science Advanced Research

DAVID Digital Audio / Video Interactive Decoder
PEDRO Pneumatic Energy Detector with Remote Optics


Tuesday, November 21, 2006

Cancer Stages And Grades

NPI unknown acronym


If you have to find 8 differences, I'd say you before a game, entertainment or a hobby. If you're looking for 845 differences, I'd say you're at a job or you have a mental illness. But if, in addition, the differences you're looking for are hidden similarities between 8937283, then you have ahead is a brown

.


The good thing about backups is to provide security. The trouble with backups is when they stop being copies. This


of high-capacity USB sticks, CDs, DVDs and the like martingales, you get used to happily make a copy of each project before further changes, to make a copy of these folders to take them home from work or home to work, to get a CD copy of those folders that put them in a safe and secure from the virus ... It's so easy to do!


Days later, weeks or months later the changes will come later in this file from here, in that file there, copy these there ... And there always comes a time when just making these changes to the copy that we should not even knowing that we can roll with that. It's so easy to do!

Then synchronize the other copy and there you remember me, I swear

- you say. But do not always do. And

days later, weeks later or months later you find two folders that should be identical but they are not, but contain a maze of directories and subdirectories on the branches and twigs from the branches they rest for a total ochomiltrescientosveintipico file, which should be similar but are not. It is at this moment when you begin to calculate how long it will take careful comparison of ochomiltrescientosveintipico files. It is at this moment when you start thinking if you should call him folding spoons turkey, if he has something for you, while you scratch your head trying to figure out which of the copies contain the latest each of the files, and perhaps also what are the differences between them and other versions.

The turkey I doubt spoons have a solution for yours or anybody else, but if you look at the situation described there

recalls that the solution for you. I doubt there into the world again by a developer who does not use a tool like this, but do not have to be a computer guru to take advantage of them, using them occasionally. I'm going to recommend the programilla I've been using for years: the


WinMerge. You can download it from

SouceForge

or website:
www.WinMerge.org

.

The WinMerge

this does two things:


Compare Compare files folders Lo compare folders helps us solve our problem: you say you caught a folder and the other and you compare them. He and the cop-plim-plim plam, plam, in a segundillos (depending on how fat they are), shows a report telling you which files exist only in one, which alone in the other, which are the same in both, and what are different. Of course, you can tell that you also compare (or not) the subfolders, ie you compare recursively.


Lo compare files can be directly (one by one) or based on the previous result. The idea of \u200b\u200bthis comparison is to highlight small changes between versions of a file, and it works great. Yes, of course, compare text files, not binary. Precisely the extraordinary usefulness of such tools is one reason why I use increasingly more text files to the detriment of the binaries.

    case you do not understand me, what I'm saying is that if you work with. Html files instead of. Doc,
  • be happier.

As to

WinMerge as a program I can only say good things ... Performance: very good

Usability:
pretty good Documentation: good (in English)

License: GNU Public License case you do not know what it means GNU license, I translate:

better than free!

The truth is that these programs are designed for entendidillos, but any handyman can them out a great game if you decide to use them.


Thursday, November 16, 2006

Protein Whey Store In Singapore

The entertaining game of the 845 differences


Al "dark side" of Windoze ", which is how I like to call the black window of the family:

Windows console, also known as shell
, Prompt or MS-DOS window
.


are many names but only one call. And before anyone throw stones me for any of these names, let me argue that I alone am responsible of the first, the others put

the

you call You call the little thing, the truth is that the console gives us access to a series of commands, facilities, utilities ... im-pres-cin-di-tions. I can promise and promise that this thing I use it to sack , more than anything to do several little things faster than the Explorer, or simply be able to do other stuff without having to settle other programilla unnecessary. Do you remember, for example, how useful it could become findstr command ? Well, I have many more examples, its I swear!

Peeeero (everything has a but) once you start to catch a taste of this console, and start using a bag, start to suffer the Faraway
Act, that the window MS-DOS always opens in a separate folder and distant from the one you want to go. Watch now! Think of a folder, go to Start / Run ..., type cmd (command in the old win9x), accepts y. .. That was not, eh? A not! Never succeeds: nun-ca.

So if you wanted to work with folders or files, the first thing you touch is a painful journey to the destination folder: cd .. to the folder above, cd to the folder that, cd to the folder which ... Walker no way is the path to change. Ele my art!


course ... with such cd cd up and down, as you charge the fee in these, you will not be able to pay or pawning the Lesotho Promise. Do not worry, be happy! There are a couple of tricks that you can relieve the agony.

For the first one, you just need a few fingers (few) spread across both hands and with enough coordination between them as to do a "drag and drop (drag & drop, oh, yeah!) between windows. The idea is as follows. Can I change the starting folder to the destination folder in one step? Yes, writing cd carpetadestino , where "carpetadestino" is written to the destination folder with full path. This route can be quite long, which not win anything, so why can avoid typing the full path? Yes, drag the target folder from the Windows Explorer to MS-DOS window. E voila!



For the second need to be entered through the dark side of

cmd, not

command. It's auto-complete folder names with the tab key. If you have moved in a linux or similar, this will be familiar, but if you are windows to the very marrow will have to try it: type cd, space, the first letters of the folder you want to change, and press the key tab. Have you seen? Chuli, eh?

Now that really would have been good to avoid


Faraway effect forcing the MS-DOS window to be opened in the folder we would have liked. Because if you have to change folder, change, but change for change, is foolishness. Can this be? This can. For the window always open to a particular folder, simply change the shortcut to

prompt (right click, Properties ...), and you're done.

Now, really, what good would open the window in the folder

increasingly interested us. Can this be? This can. And we will see two solutions. 1. The way the Supreme Being (The freak Way)


Open the registry (Start / Run ... 'regedit') and under the key creates a new key called puertaladoscuro , or as I call it seems good. Use your own imagination to give a default value (Default): Open the side door

&
dark, or as you please. This is the text you see on the shortcut menu, so you better not put a simple

Open or givers.


Yes indeed, this is one way to change the browser a "Open file" for a "Delete File" transparent to the user: an inexhaustible source of friendly jokes that will give you endless laughs until a beggar find your lifeless body in a dark alley.

Lo & is to be thin: letrilla indicates the command, such that together with Alt
lets

keyboard shortcuts. Well, now creates, under the newly created key ( HKEY_CLASSES_ROOT / Folder / shell / puertaladoscuro ), another new key called command . This give as default (Default): cmd.exe / k cd% 1

or
C: \\ windows \\ command.com / K cd% 1 if you're in an old win9x. That is, using cmd
whenever you can, or

failing command. You may need to put the full path for the system to find (C: \\ windows \\ command.com C: \\ windows \\ system \\ cmd.exe ,...). And the meaning of the arguments that you pass, and other options, I could see the self-help shell: the / K means that the interpreter execute the command that follows (in this case cd to the folder view) and be active later.


Once done, go to Windows Explorer. See that in the context menu that appears when you press the right button on a folder, is now the "Open Door

next scuro or", or whatever that you called. If you choose, it will open the MS-DOS that folder. 2. The path of the medium (Our Way) Let's do the same but without touching the registry directly, as if we were still human beings.


rare sites Without getting into, right from the Windows Explorer, we go to "Folder Options ...". This in XP should be in the "Tools" menu and win9x in the View menu. If you can not find it, ask the child's father where he has placed in your system. When you've found it, get on the tab "File Types" and select the type "Folder." Here you have to edit the type and, again, maybe you have to figure out how to do it on your system. In XP it is giving the button "Advanced" and then the New button. In win98 it was giving directly to the button "Edit ..." and then "New ...". are now editing the new action. In Action write the name in which you want to share ( Open Door & dark side

). In
Application used to perform action before
writes (

C: \\ Windows \\ system32 \\ cmd.exe / k cd% 1

, or similar). You can use the "Browse ..." to help you choose the program, including the route comfortably without mistakes. I remember the advice: in XP does not choose but

cmd command
.


The cmd.exe is a descendant of the command interface of Windows NT, while the command.com is a 16-bit application that stays there for compatibility reasons. Commands entered in command.com are passed to the cmd.exe to be the one who runs. (If you do not believe me, run command.com command and look in the task manager, you will see how, in fact, is who the running cmd.exe.)

Well, done, as before, you can go Windows Explorer and enjoy your new door to the dark side on the shortcut menu that takes you directly where you want.

Monday, October 30, 2006

Email Thanking For Interview

The door to the dark side of the windows Windows

who never goes out ... except by choice or "accident" applications, I mean (hehe). Well, I'll go to the point, not before, as usual prevent: SHORT POINT FOR IMPORTANT QUESTION AND ITS ANSWER:


Question .- I can screw up stuff in it? Answer .- Yes

And that what was said, went on to propose a simple exercise for the more adventurous newcomers get in danger the health of your computer ... Open


Windows registry and look for this key
 


HKEY_CURRENT_USER \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer

(D. Micro $ oft reserves the right to call his keys as he wants in the different versions of their products, I notice.)

The fun begins when, under it, you create a value called NoClose


type DWORD (REG_DWORD) , which will give value 1 if you want to disable the Shut Down command

, or 0 (zero) if you re-enable it. Yes, you read that right: these values \u200b\u200bare used to enable or disable
option System Shutdown.
Of course, the fun increases when, instead of the previous key, use this:

HKEY_LOCAL_MACHINE \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer With the first we are preventing the user that we have entered into the system to switch off, but the latter is what we prevent all the users. But what is the reason for the existence of this variable in the always surprising and largely unknown


Windows registry? There are several theories.

data
A first theory originated in the days when John F. Hopkins, an employee of the company, every day off your computer and ran, as led by the devil himself, to arrive in time to take the bus that took him to the small village where he lived, about 50 miles from their workplace. Colleagues "Developers Team" decided that it might be funny, when leaving, John had some unforeseen difficulties which delayed. We've all seen the Internet video in which John, in his cubicle, smash the computer to see despair, one day more, that the option to Shut Down has "disappeared." So many were the laughs that what they were made, their charm and wit that variable companions decided to stay there forever.
Another theory suggests that it was the President himself U.S. who suggested that it would be interesting to introduce this type of difficulty in operating systems. Was achieved in this way, the interns often borrowed his superiors for help, encouraging beneficial as vertical communication in organizations. And

where employer does not send sailor was said and done.


But the more popular theory is based on conjecture

Nobitch-Hellman , that there computer (at least one) whose mental age is bounded below by the so-called teen-age (also called the awkward age or, more recently, the chicken)

. To prove this theory, an immediate corollary would be that there are certain elements
computer databases or applications with serious and

morally and intellectually acceptable. Aligning with this line of argument, some suggest the following example. There

environments where it is undesirable that the machine can be turned off by any user, such as those in which you are running security software or control that should be permanently

active. Sea, for example, the case of a digital recorder . A digital recorder is, in essence (

often do much more
), a collecting images programilla a camera (security) and saves. It is clear that if the computer we have one of these, do NOT agree that any user can shut us, because if we stop him we were no cameras, and this is NOT good.

Of course, if we want to prevent any user we can turn off the computer , the first thing we should try to do is restrict access to the off switch, power cable, motherboard and all that nonsense with which so easily can make the ordenata then poof! That is, in our example let the ranger's hut (security office fine sites) monitor, keyboard and mouse as much. The rest will be on the other side of any wall in any room of greater security and more restricted access.


But is that enough? Well of course not: we have not blocked access to the registry, or the command line, or ... Anyway, if you like games of attacker and defender, here's a pretty cool. When you think you have everything well tied down (if you do as a defender), you only miss a good attacker. If you want to save the Styes that would cost you a fee, you very well apañártelas Aragonese looking for a network, the habemos in abundance. Choose a computer to know: what will distinguish the Cachirulo black with the skull (optional) and because the keys pressed loose. Put it in front of your computer and espétale good stiff, hands on her hips: Á-WHY-no-Ma-Pa-GAS-e-Lor-DE-NA-DOR!

(As is well known, the hands always accentuate the syllables, but especially when we challenge something.)

Do you like ... computing?

Do you like ... compete?


Luck to the hand, then!

Tuesday, October 24, 2006

Epsom Salts And Hair Loss

MacLeod, The unquenchable

on the screen of my computer is it: Google, Great Search. Front to him, staring at him, that's me: a seasoned internautical machine with hundreds or thousands or millions of hours of computer experience, which everyone calls a MH (Very Hacker). I have to look for the story to my nephews. Google searches are no secrets for me, but I'm rather flojillo stories. I know that I'm looking for is titled "Nosecuantos Blancaleches and Dwarfs." I do not remember exactly how many were the bloody gnomes, or how exactly the whore called (pardon me). What would a layman with this data? Look for "dwarfs", which is the only term insurance leads. A's see ...




Dwarfs



Result (check it out!): Too many dwarfs. Well, here I go, the animal computer. Let's try the name, which certainly do better. What do I do when I find on my machine a file whose name begins with "White" I do not know how it ends? Search for "White *"! Yast, since Google will be the same, di-go-yo. So try it ...

White *


Result: Uh, oh, for the little king of computers seems to have fallen upside down ...! turns out that Google does not support "stemming" which what we call the MH to the ability to use a wildcard instead of part of a term in a search. Are we lost? "We have no choice but to dive into the maelstrom of dwarfs that offers the first search?


Tachánnnnn, tachínnnnnn, pi-pi-pi (tune of tension


great crescendo of scary movies)

Noooo, tranquiii ... Google supports asterisks as part of a consultation, but the meaning assigned to them is not part of a word, but of a whole word. That is, if we seek "the * red" get all pages that contain "red boxes," the Red Shoes, "" red berries "...

So if we know who are" the Nosecuantos Dwarfs ", even without knowing exactly how many, we can see:


" the * Dwarfs


Thus so simple, we have refined our search, obtaining results incomparably better than the first query: the first results obtained from the references to "Snow White

and

seven dwarfs" they were looking for.

Try applying this technique to our old problem of "
Among nosedonde and Valdemoro

"

"between * and Valdemoro"

Pinto! :)


Oh, and we have several words undefined in the same query! That is, we can substitute an asterisk all the words of a sentence to doubt "correct." So, if you do not remember exactly what it was that said that the Greek had no destination, we find:


"The 'no destination"

vulgar spirits!

vulgar spirits have no
destination, according to Plato

.