Skip to main content

Multiple Instances of GTalk

How to use Gtalk on Windows with multiple Gmail accounts? Here is the solution...

I was using a chat messenger which use to support multiple messenger but after using it for some time I realized that my machine has become unresponsive :P. So I decided to come back to my old lovely GTalk but the only problem is we can not have multiple instance of  'The GTalk'. So I searched for an solution and luckily I found one.

Step I
Create a shortcut for gtalk and let's keep it on desktop.

Step II
Now right click on the shortcut icon and select 'Properties'.

Step III
In Shortcut tab the value for 'Target' will be something like

"C:\Users\Home\AppData\Roaming\Google\Google Talk\googletalk.exe" /startmenu

(The above value will change according to your gtalk location but they will be quite similar)

Now change this value to

"C:\Users\Amol\AppData\Roaming\Google\Google Talk\googletalk.exe" /startmenu /nomutex

i.e. add "/nomutex" word at the end of the value and now it will look like below.


Step IV
That's it you are good to go now whenever you double click on the gtalk icon a new gtalk window will appear and now you can enter you different gtalk emails and login in two or more gmail accounts at the same time.

Happy chatting!!


Comments

Popular posts from this blog

Carnivorous Island from "Life of PI"

Yann Martel described about an floating carnivorous Island for symbolizing that something seemingly good in life can turn out to be harmful, so we should keep going with our journey of life... About the carnivorous Island from movie. In the movie 'Life of PI' after PI struggles to live in the pacific with the Bengal tiger suddenly one morning Pi  found himself at a Island. After spending so many days in the middle of the sea he found himself very lucky to find a Island. After spending some time he thought might be this was the end of his suffering and he can spend rest of his life at that island. He makes h is bed on a tree and sleeps there, in the middle of the night he wakes up and find that there were dead fish in the fresh water where he took swim in the day time. While trying to understand the mystery he plucks a fruit from the same tree and peel it off and finds a human tooth inside that fruit and then he realize that it was an carnivorous Island. The...

Create Table in Liquibase

For creating table using liquibase you can use below code and add it in your liquibase file. <createTable tableName=“employee”>      <column name="id" type="int">      <constraints primaryKey="true" nullable="false"/>   </column>      <column name="first_name" type="varchar(255)"/>   <column name="last_name" type="varchar(255)"/>   <column name="username" type="varchar(255)">      <constraints unique="true" nullable="false"/>   </column> </createTable> The use is pretty simple it's the way it looks : Tag: <createTable></createTable> This is an opening/ending tag for creating a table. These tags will enclose column sub tags which will define columns for the table. Attribute:   tableName : Name of the table which you want to create. (This is a mandatory   ...

Everything you need to know about ShellShock.

Shellshock was a security threat that was identified by Stéphane Chazelas on 12 September 2014 and was disclosed and announced to the public on 24 th September 2014 with the fix ready for distribution. It was assigned the identifier as CVE-2014-6271 . By the way, this is another security bug with cool logo after Heartbleed. 1. What is Shellshock? Shellshock is a name given to a vulnerability in Bash which allows an attacker to execute remote commands on vulnerable system. Bash is a command-line interpreter available on most of the operating systems like Apple’s OSx, windows and present on many versions of Linux. Bash also acts as a parser for the functions given to it.  2. Why is it harmful? Shellshock is significantly harmful for the servers connected to internet. Since, it lets attacker to escalate their privileges and potentially they can gain access to root. This gives access to the attacker as if they are the actual user and they can perform any...