Sunday 25 August 2013

Remove Shortcut Virus From Pendrive, Memory card and Hard disk


Do you Find hidden folders and Shortcuts of Folder in your Computer and Pen drive.Do your Flash drive shows hidden folders and shortcuts whenever you plug it into you Computer, then you are reading the correct article.Here we will discuss how to remove these hidden and Shortcuts of Folders.This problem can also be faced on Computer HDD.Many peoples think it can be solved with antivirus.This problem occurs due to Autorun Worm which is the root cause of it.

Whenever you Scan with Antivirus it detects and delete but when you refresh it appears .....

Sunday 11 August 2013

How to change IP address in every 10 seconds


This will illuminate you on a method using which you can
change your ip address in every 10 seconds. This change in IP address would
help you to surf anonymously over the internet without any
kind of restriction based on country ,number of view or any other factor.

Change of IP address can be easily done with the help of a free
software named as Elitet Proxy server just go to the following
website and download one for
yourself.
Go-> zyan. me/Qeule
Now that you have this software .

Elite Proxy Switcher (Latest version: 1.19)
Overview: Elite Proxy Switcher can help you to visit the blocked
websites and protect your Internet privacy.

How it works: Elite Proxy Switcher changes your IP using a proxy so that the website regards the proxy's IP as your
IP. Thus your real IP is hidden.

Introduction: Elite Proxy Switcher (EPS) is a proxy software to test and use the proxy list. It can test the details (speed, anonymity, country and whether gateway, ssl/https, dangerous or codeen) of the http
proxy and change the proxy settings of your browsers (IE, Firefox and Chrome). Elite Proxy Switcher Main
Features

Proxy Checker: professionally test the details of the proxies.

Proxy Switcher: quickly change the proxy settings of the
browsers.

Proxy Downloader: get daily fresh proxy lists by just one click.

Proxy Manager: easily maintain your personal proxy list.

Use this software now and surf anonymously

WINDOWS RUN Commands





1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System TroubleshootingUtility -
drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool- sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) -
gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool -mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - controlnetconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator -
odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests -
ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) -
rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab

Thursday 8 August 2013

Some Unknown Linux Facts For You


1. Linux is not an OS, but it is the kernel, GNU Linux is the OS and it comes in several hundred flavours.

2. Linux Kernel was written by a 21 year finnish college student as a part of his hobby. Yup! His name is Linus Torvalds.

3. Torvalds created Linux based on GNU General Public License (GPL). Perhaps Torvalds would have never written his own kernel if GPL would be having it’s own kernel and driver.

4. Major part of today’s Linux kernel is written in C programming language and assembly language and only 2% of today’s kernel contains code written by Torvalds.

5. A Standard Linux Kernel of today has over 10 Million lines of code and it grows at the rate of 10% every year. About 4500 lines of codes are added and 1500 lines of code are changed everyday. Initially in 1991, Linux kernel version 0.01 was released with 10239 lines of code.

6. A guy named William Della Croce Jr. registered the name Linux and demanded royalty for using its name and mark. However he agreed to handover the trademark to Linus, later.

7. The Linux kernel’s official mascot is a penguin named Tux, abbreviation of tuxedo. The idea that Linux had a pet penguin comes from Linus Torvalds himself.

Reasons You Should Upgrade to Windows 8


1. Faster startup.

On my tests comparing Windows 8 performance with that of Windows 7 on the same computer, Windows 8 started up more than twice as fast as Windows 7. In a comparison with Mac OS X Mountain Lion, running in Boot Camp on a MacBook, Windows 8 even started up faster than Apple's latest desktop operating system.
2. A whole new world of apps.

Windows 8 gives PC users a whole new world of full-screen, touch-friendly, Web-connected apps to explore. And these new apps can even display relevant information on their Windows Start screen tiles, something impossible in Windows 7 or just about any other operating system around, save Windows Phone. The new Windows Store—analogous to Apple's iTunes App Store—makes discovering and installing these new-style apps a breeze.

3. SkyDrive integration.

Microsoft's cloud service has become way, way more than just online storage. Sure, it still lets you save and access files to an online space that's accessible from a Web browser or apps that run on not only Windows, but also Mac OS X, iOS, Android, and Windows Phone.

4. Better Security, Less-intrusive updates.

PC Magazine networking and security analyst Fahmida Rashid considers Windows 8 "the most secure version of Windows yet." This stems from a couple of things, starting with Secure Boot.

5. First-class touch input, but still fine with keyboard and mouse.

In some ways, touch-screen input on Windows 8 is superior that of the Apple iPad. For example, you can do everything you need to by swiping with your thumbs, making a tablet easier to use by holding it by the sides.

UNKNOWN FEATURES OF WINDOWS 8.1

Windows 8 is the most advanced operating system released by Microsoft. Due to its features windows 8 has been in the discussion since day it was released, some persons like them a lot and some totally dislikes it. Since it was totally different from itspredecessors so some users find it difficult that’s why they totally dislike windows 8.

If you have ever tried windows 8 then you also must have missed some features like a start menu, but Microsoft have tried a lot for making its users comfortable with its next level operating system.
Microsoft already has unveiled the windows 8.1, new version of its windows operating system so you will see that you have got your start menu button back. Another change it that you can skip the start screen boot and set it to desktop boot so whenever you turn on your system you will directly see the desktop rather that start menu, like it was in older version of windows. These were some big changes and every one the internet is talking about these features but still there are some hidden features in windows 8.1 and those features you should definitely know.
–>
1.)Batch Tile Editing:

Batch tile editing feature lets you manage the group of apps just in one go. With batch editing you can edit, uninstall, pin/unpin and resize more than one app. So now windows are providing this feature, peoples who were complaining about this got their answers. If you want to move your tiles around then this feature will be really helpful for you because with this you can move more than one tile. So this is pretty handy setting.

2.)Changes in All apps screen:

In windows 8.1 you have got an update, Nowyou can uninstall, Pin and Unpin multiple appsfrom All apps screen. To do this select the multiple apps from the list and then press uninstall, a conformation will be demanded and also there will be option if you want to uninstall apps from one specific PC or also from the syncd pc’s. So it means if you select any app and you want that app should be removed from all pc’s you are connected with so you can do it with just one click, you don’t need to go to each and every pc one by one and uninstall that app because you can do it with single step.

List Of Full Form of Domain Names Extensions



.com → commercial Internet sites.

.edu → educational sites .

.firm → for an Internet site for a business.

.gov → for a U.S. government site on the Internet.

.int → international institutions.

.mil → for a U.S. military site on the Internet.

.mobi → for mobile phones.

.nato → for NATO sites.

.net → for Internet administrative sites.

.nom → for a personal site on the Internet.

.org → for organizational Internet sites.

.store →for a retail business.

.web → for an Internet site that is about the World Wide Web.

.Us → united states

.uk united kindom

Android 4.2 for PC with Installation Instructions


Android 4.2 X86 is a project to port Android open source project to X86 platform, also known as 'patch hosting for android x86 support'. Their original plan was to host different-different patches for android x86 support from open source community. A few months later, they found out that they could do much more than just hosting the patches.

The reason why Android is so popular among all the OS's is just because, it is completely open source .It means, the possibilities for the Android platform are endless. Now, with just giving a small piece of time and a bit work, you can have Android running on your PC for free with minimal effort, and then you can use your PC with a feel of smartphone or tablet. To take advantages and want to install Android OS 4.2 on your Desktop, just follow the simple steps which i mentioned below.

Simple Steps For Installation :

1. Firstly, Download Android 4.2x86 ISO image. To download
go here :-http://www.guppit.com/site/6cbec65c68

Download the 2nd file named as "android-x86-vm-20120130.iso"

2. Now burn the ISO image on a CD/DVD or you can burn the ISO image to USB also by making the USB bootable using UNetBootin Software. To download UNetBootin

Go here :- http://www.guppit.com/site/968d58eaa9

3. Now Insert USB or CD/DVD and then launch UNetBootin. Locate the ISO image and select correct USB or CD/DVD.

4. Click OK to start the conversion process to write the bootable data to the selected media.

5. After completing the process click reboot on asking, and you are done..!!

Wednesday 17 July 2013

Easy Tools for Cleaning Up Your Email Inbox


Email can be a wonderful thing -- until it becomes unruly. It's on your home computer, work computer, mobile phone and tablet, and most likely across multiple email services. You have business messages, personal messages, reminders, invites, newsletters and so much spam. Where is that email invoice for your most important client? Can't remember if you emailed your vendor about a change in schedule? It's not a good situation.

The good news is your email inbox doesn't have to be a source of stress and frustration. These tools can help you clean up your out-of-control inbox while making sure you don't miss any important messages.

1. Mailstrom
 This free online tool categorizes all of the email in your account so that you can quickly review, archive and delete messages in bulk. Sort your incoming messages by sender, subject, social or shopping. Choose every item in the list with a single click then choose an action. Mailstrom relays that information to your actual inbox and moments later the posts are either deleted or archived. You can also assign Gmail labels and set up rules to handle recurring messages.

It works with Gmail, Microsoft Outlook.com and other email services that are enabled for IMAP (Internet Message Access Protocol), a standard method of accessing and storing mail on a mail server. Since you can add multiple email accounts, you can see all of your incoming messages on one page. Even better, Mailstrom has a one-click unsubscribe button so you can rid yourself of future list emails without having to go through them one by one.
 
2. Triage
With Triage, your messages show up on your smartphone as index cards. Flick the card up and it goes into your archive. Flick in down and it stays in your inbox. If you need more detail, you can open the message and even reply to it if you have time.

With Triage on your phone, you can clear two dozen messages while waiting in line at the bank. The app works with Gmail, Yahoo Mail, iCloud Mail accounts and most email services that support IMAP. The only downside is that it can't handle more than one email account at a time.

Triage is available for all devices using iOS 6 or later and costs $1.99.

3. Boomerang for Gmail
For people who use their Gmail inbox as a to do list, there's Boomerang. This app archives your messages then sends them to you or another recipient on the scheduled date. Need to follow up on an email after a conference? Send the email to Boomerang and the app will send it back when it's time to respond. Client gone on vacation? Write the email now when you're thinking of it and schedule it to be delivered a few days after their return. Boomerang can even send a message back to you if the recipient doesn't reply within the time frame.

Boomerang is available online as well as an app for Android.

The service connects with Gmail or Google apps and it's free for up to 10 messages a month. For $4.99 a month you can get unlimited messages on Gmail or pay $14.99 for unlimited messages with a Google apps email address.

4. AwayFind
If you want email downtime but are afraid of missing an important message, consider signing up for AwayFind. This app can send you a text message, voice call or push notification when you receive a specified email. You can set it to watch for a specific subject or an incoming email address such as an investor or a major client.

The service connects with Gmail, Google Apps and most providers that use IMAP. Accounts start at $4.99 a month for up to 100 alerts and one email account. For $14.99 you can monitor up to five accounts and receive 1,000 alerts including voice alerts. If you need more, there's a $49.99 Max account with unlimited email address and alerts.

You can access the app online or download it free for iOS or Android.
 

Friday 12 July 2013

105 website that the most useful in your days



1. screenr.com – Record movies of your desktop and send them straight to YouTube.
2. bounceapp.com – For capturing full length screenshots of web pages.
3. Goo. gl – Shorten long URLs and convert URLs into QR codes.
4. untiny.me – Find the original URLs that’s hiding behind a short URLs.
5. localti.me – Know more than just the local time of a city
6.copypastecharacter.com– Copy-paste special characters that aren’t on your keyboard.
7. topsy.com –A better search engine for twitter.
8. fb.me/AppStore –Search iOS apps without launching iTunes.
9. iconfinder.com –The best place to find icons of all sizes.
10. office.com –Download templates, clipart and images for your Office documents.
11. woorank.com –everything you wanted to know about a website.
12. virustotal.com –Scan any suspicious file or email attachment for viruses.
13. wolframalpha.com– Gets answers directly without searching .
14.printwhatyoulike.com– Print web pages without the clutter.
15. joliprint.com –Reformats news articles and blog content as a newspaper.
16. isnsfw.com – When you wish to share a NSFW page but with a warning.
17. eggtimer.com – A simple online timer for your daily needs.
18. coralcdn.org – If a site is down due to heavy traffic, try accessing it through coral CDN.
19. random.org – Pick random numbers, flip coins, and more.
20. mywot.com –Check the trust level of any website .
21. viewer.zoho.com –Preview PDFs and Presentations directly in the browser.
22. tubemogul.com –Simultaneously upload videos to YouTube and other video sites.
23. truveo.com – The best place for searching web videos.
24. scr.im – Share your email address online without worrying about spam.
25. spypig.com – Now get read receipts for your email.
26. sizeasy.com –Visualize and compare the size of any product.
27. whatfontis.com –quickly determine the font name from an image.
28. fontsquirrel.com –A good collection of fonts – free for personal and commercial use.
29. regex.info – Find data hidden in your photographs .
30. tineye.com – This is like an online version of Google Googles.
31. iwantmyname.com– Helps you search domains across allTLDs.
32. tabbloid.com –Your favorite blogs delivered as PDFs.
33. join. me – Share your screen with anyone over the web.
34. onlineocr.net –Recognize text from scanned PDFs and images – see other OCR tools.
35. flightstats.com –Track flight status at airports worldwide.
36. wetransfer.com –For sharing really big files online.
37. pastebin.com – A temporary onlineclipboard for your text and code snippets.
38.polishmywriting.com –Check your writing for spelling or grammatical errors.
39.awesomehighlighter.com– Easily highlight the important parts of a web page.
40. typewith.me –Work on the same document with multiple people.
41.whichdateworks.com –Planning an event? Find a date that works for all.
42. everytimezone.com– A less confusing view of the world time zones.
43. warrick.cs.odu.edu– You’ll need this when your bookmarked web pages are deleted.
44. gtmetrix.com – The perfect tool for measuring your site performance online.
45. imo.im – Chat with your buddies on Skype,Facebook, GoogleTalk, etc from one place.
46.translate.google.com– Translate web pages,PDFs and Office documents.
47. youtube.com/leanback – Sit back and enjoy YouTube videos in full-screen mode.
48. similarsites.com –Discover new sites that are similar to what you like already.
49. wordle.net – Quicksummarize long pieces of text with tag clouds.
50. bubbl.us – Create mind-maps, brainstorm ideas in the browser.
51. kuler.adobe.com –Get color ideas, also extract colors from photographs.
52. followupthen.com– Setup quick reminders via email itself.
53. lmgtfy.com – When your friends are too lazy to use Google on their own.
54. tempalias.com –Generate temporary email aliases, better than disposable email.
55. pdfescape.com –Lets you can quickly edit PDFs in the browser itself.
56. faxzero.com – Send an online fax for free– see more fax services.
57. feedmyinbox.com –Get RSS feeds as an email newsletter.
58. isendr.com –Transfer files without uploading to a server.
59. tinychat.com –Setup a private chatroom in micro-seconds.
60. privnote.com –Create text notes that will self-destruct after being read.
61. flightaware.com –Live flight tracking service for airports worldwide.
62. boxoh.com – Track the status of any shipment on Google Maps – alternative.
63. chipin.com – When you need to raise funds online for an event or a cause.
64.downforeveryoneorjustme.com – Is your favorites really offline?
65. example.com – This website can be used as an example in documentation.
66.whoishostingthis.com –Find the web host of any website.
67. google.com/history– Found something on Google but can’t remember it now?
68.errorlevelanalysis.com– Find whether a photo is real or aphotoshopped one.
69. google.com/dictionary – Get word meanings, pronunciations and usage examples.
70.urbandictionary.com –Find definitions of slangs and informal words.
71. seatguru.com –Consult this site before choosing a seat for your next flight.
72. sxc.hu – Download stock images absolutely free.
73.download.com.np-Get all softwares.
74. wobzip.org – Unzip your compressed files online.
75. vocaroo.com –Record your voice with a click.
76. scribblemaps.com– Create custom Google Maps easily.
77. buzzfeed.com –Never miss another Internet meme or viral video.
78. alertful.com –Quickly setup email reminders for important events.
79.encrypted.google.com– Prevent your ISP and boss from reading your search queries.
80. formspring.me –You can ask or answer personal questions here.
81. snopes.com – Find if that email offer you received is real or just another scam.
82. typingweb.com –Master touch-typing with these practice sessions.
83. mailvu.com – Send video emails to anyone using your webcam.
84. ge.tt – Quickly send a file to someone,they can even preview it before downloading.
85. timerime.com –Create timelines with audio, video and images.
86. stupeflix.com –Make a movie out of your images, audio and video clips.
87. aviary.com/myna –An online audio editor that lets you record and remix audio clip.
88. noteflight.com –Print music sheets, write your own music online (review).
89.disposablewebpage.com– Create a temporary web page that self-destruct.
90. namemytune.com– When you need to find the name of a song.
91. homestyler.com –Design from scratch or re-model your home in3d.
92. snapask.com – Use email on your phone to find sports scores, read Wikipedia, etc.
93. teuxdeux.com – A beautiful to-do app that resembles a paper diary.
94. livestream.com –Broadcast events live over the web, including your desktop screen.
95. bing.com/images –Automatically find perfectly-sized wallpapers for mobiles.
96. historio.us –Preserve complete web pages with all the formatting.
97. dabbleboard.com –Your virtual whiteboard.
98. whisperbot.com –Send an email without using your own account.
99. sumopaint.com –An excellent layer-based online image editor.
100. lovelycharts.com– Create flowcharts, network diagrams, Sitemaps, etc.
101. nutshellmail.com– Get your Facebook and Twitter streams in your Inbox.
102.The Hype Machine -Web-based music discovery site based on the music posted to blogshttp://hypem.com/
103.SimpleWash -A site to help you clean up old content you may not want to show on your social media profiles anymore (currently Facebook only, Twitter is coming soon) SimpleWash™
104.ListenToYouTube.com -Converts YouTube videos to mp3sYouTube to MP3 Converter - Fast, Free - ListenToYouTube.com
105.PushBullet -Easily send notes, links, lists, files, etc. to your Android phonehttps://www.pushbullet.com/

SIM (subscriber identity module) Card Explained in Detail


A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices ,such as mobile phones and computers.

It is also a portable memory chip used mostly in cell phones that operate on the Global System for Mobile Communications (GSM) network. These cards hold the personal information of the account holder, including his or her phone number, address book, text messages, and other data. When a user wants to change phones, he or she can usually easily remove the card from one handset and insert it into another. SIM cards are convenient and popular with many users, and are a key part of developing cell phone technology.

Sim Cards are of four (4) Types. Named as Below H1, H2, H3, H4

H1= You Will Get Normal Network On This Sim
H2= You Will Get Better Network On This Sim, Means Strong
H3= You Will Get More Better Network On This Sim, Means Stronger
H4= Normal, Better, More Better Is Nothing In Front OF This Sim.

Basically H4 Sim giving for Corporate Sim, Army Peoples etc. The Company doesn’t Provide H4 Sim To all User,because this Sim eat More bandwidth. For knowing Which Type of Sim is using Just Check Its Back Side and will Get the Sim No. and the Sim Type.

SIM cards are made in three different sizes to accommodate different devices. Most phones use mini-SIM or micro-SIM cards, which are quite small — the mini is 25 mm by 15 mm , and the micro is 15 mm by 12 mm.Full-sized cards are much larger, 85.6 mm by 53.98 mm , and are too big for most phones. All cards are only 0.76 mm thick, and the microchip contacts are in the same arrangement. This means that, with the proper adapter, the smaller cards can be used in devices designed for larger ones.

A SIM card offers security for both the user’s data and his or her calls. The cards can be locked, meaning that only someone who has the correct personal identification number (PIN) can use the card. If the phone is stolen, the thief cannot use a locked SIM or get any information off of it without the PIN.

Thursday 11 July 2013

Reason for the Blue Color in Facebook


When you open Facebook, the first thing that you notice is the blue color it uses. Ever wondered
why is Facebook so blue in color and not changing its color
scheme?

Ever since they started as 'thefacebook', Facebook has stayed with the blue color.
Although major changes have been made in the Facebook
theme since then, the major unchanged thing has been the blue color. Facebook from its early days
when it was known as the facebook
An exciting fact: In its earlier days, facebook.com required you to have an .edu email id to
join. Everywhere from its login page to
Facebook groups, you find only blue. Facebook Login Page. All Blue!

The reason for this is that Mark Zuckerberg, the young founder of
Facebook is red-green color-blind and blue is the richest colour for
him which he confirmed in an
online interview with Leo Laporte. Another important commercial
factor for using blue color is the fact that most colors tend to
distract the viewers. Blue on the other hand acts as a transparent
background to the main content as visible to the human brain due to which most popular websites
tend to use the blue color. It can easily be called a webmaster's
favorite color. Blue color is also sometimes referred to as 'Nirvana' for the brain.

Full form of Major IT companies


GOOGLE :- Global Organisation Of Oriented Group Language of Earth

APPLE:- Asian Passenger Payload Experiment

HP :- Hewlett-Packard

IBM:- International Business Machines Corporation

HCL:-Hindustan Computer Limited

WIPRO:- Western India Product Limited

GE:-General Electronics

INFOSYS:-Inform ation System

TCS:- Tata Consultancy Services

AOL:- American Online

BPL:- British Process Laboratory

INTEL:- Integrated Electronics

CISCO:- Computer Information

System Company

DELL:- michael DELL

SONY:-Sound Of New York

AMD:- Advance micro devices

LENOVO:- LE(Legend),NOVO (New)

COMPAQ:- Compatibility And Quality

Wednesday 3 July 2013

Interesting facts about Windows History


More than 70.39% of Internet users are currently running Windows, and there are 1,693,244,385 users. (As per 2012)

Bill Gates started Microsoft with Paul Allen in Gates’ 500-square-foot garage in 1975 with a huge vision—a computer on every desktop and in every home.

Microsoft currently employs 88,180 people who work across 32,404,796 square feet of Microsoft’s premises.

Microsoft shipped out the first copy of Windows 1.0 on November 20, 1985. Its TV commercial featured current CEO Steve Ballmer as an enthusiastic salesman.

Windows 1.0 only required a minimum of 256 kilobytes (KB), two double-sided floppy disk drives, and a graphics adapter card.

Control Panel made its first appearance in Windows 2.0.

Windows XP was compiled from 45 million lines of code.

Monday 1 July 2013

WiFi hacking and security


Netstumbler for wifi hacking and security

1) Download the NetStumbler and Install it.

2. Run the NetStumbler. Then it will automatically starts scanning the wireless Networks around you.

3. Once its completed, you will see the complete list of wireless networks around you.

List of Wireless Networks Scanned by NetStumbler
There you will see different columns such as MAC, SSID, SPEED, VENDOR, TYPE and much more...

4. Now select anyone of the MAC address that you wish to hack and want to explore more about that. If you click on the MAC address of one of the discovered wireless networks under channels, you will see a graph that shows the wireless network’s signal strength. The more green and the less spaces are there,it indicates better is signal strength.

5. As you can see NetStumbler provides a lot more than just the name (SSID) of the wireless network. It provides the MAC address, Channel number,encryption type, and a bunch more. All of these come in use when we decides that we wants to get in the secured network by cracking the encryption.

There are two most common types of Encryption Methods used by Wireless Networks:
a. WEP (Wired Equivalent Privacy) – WEP isn’t considered safe anymore. Many flaws have been discovered that allow hackers to crack a WEP key easily.
b. WAP (Wireless Application Protocol) – WAP is the currently the most secure and best option to secure your wireless network. It’s not as easily cracked as WEP because the only way to retrieve a WAP key is
to use a brute-force or dictionary attack. If your key is secure enough, a dictionary attack won’t work and it could take decades to crack it if you brute-force it. This is why most hackers don’t even bother.

Thats all about scanning the wireless networks,
Now how can protect our wireless network from scanned by NetStumber.

How to Protect yourself from NetStumbler?
1. Don not broadcast your SSID.
2. Always try to use stronger passwords like atleast one digit, one special character, uppercase letters mixed with lowercase letters.
3. But second point doesn't matter much so try to use better encryption method i.e. WAP to password protect your wireless Network







Saturday 29 June 2013

INTERESTING FACTS FOR COMPUTER: What you know about COMPUTER


*The first domain name ever registered was Symbolics.com.
*Tim Berners-Lee coined the phrase “World Wide Web” in 1990.
*Google uses an estimated 15 billion kWh of electricity per year, more than most countries. However, google generates a lot
of their own power with their solar panels.
*Bill Gates house was designed Using a Macintosh computer.
*About 1.8 billion people connect to the Internet, only 450 million of them speak English.
*Sweden has the hightest percentage of internet users, they
are 75%.
*Up until the 14th of September, 1995, domain registration was free.
*There are about five porn pages for every ‘normal’ web-page.
*The prime reason the Google home page is so bare, is due to the fact that the founders didn’t know HTML and just wanted a quick interface. Infact, the submit button was a later addition initially, hitting the RETURN key was the only way to burst Google into life.
*There are approximately
1,319,872,109 people using the Internet.
*The first Apple computer built by Steve Jobs and Steve Wozniak was made by using parts they got for free from their employers. They were made to scrounge
spare parts from work.
*A program named “Rother J” was the first computer virus to
come into sight “in the wild” — that is, outside the single
computer or lab where it was created.
* Mosaic was the first popular web browser which was released
in 1993.

*Of the 247 BILLION email messages sent every day, 81% are
pure spam.

25 People Who Changed the Internet
Forever

1. Sir Tim Berners-Lee – World Wide Web
2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.
4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape

How to stay anonymous online and maintain your privacy in Internet


To begin with, if you still believe that staying anonymous online is related with illegal cyber activities then you are wrong. Staying anonymous has another side too beside criminal activities. Staying hidden on Internet can help you too in many ways like it’s helping thousands of Internet users worldwide. Your location can be easily traced on a normal connection because on a normal Internet connection you have an IP address. Most of the websites today logs IP of every visitor of the website. By simple method people can know who is your ISP by knowing your IP address and if we go more further, people can also find location of your computer. So in such cases, staying anonymous has helped many times.

Today we gonna learn some techniques to stay hidden, anonymous online. There are different levels of anonymity, we will start from basics and move towards advance.

Change your browser

If you are still using Google Chrome or any other browser then STOP using them, I recommend you to start using Firefox browser. The reason why I am recommending Firefox is quite simple – First, the organization behind this wonderful browser is a non-profit organization. The community is quite big too and second, you can protect your privacy on Firefox more better than anyother browser, thanks to it’s plugins.

Change your Search Engine

If you simply don’t want someone to know what you are searching over Internet, then obviously you have to say good bye to Google. I agree it would be hard to leave Google, it’s been in the business from over a decade but if you care for your pircay then you have to let it go. So to prevent others from logging info about what you are search on Internet then use DuckDuckGo.com, it’s popular for it’s tought privacy policy.

Get a proxy

As I said earlier, you can be easily tracked by your IP address and the solution of this can be a Proxy. When you visit a website through proxy, it’s accessed from a Proxy server and therefore the IP address of proxy server is logged on the website you are visiting not your own IP address. Proxies also help in bypassing country specific restrictions, you can grab the IP of required country and visit the website and you will get the access. There are various types of proxy, many of them can reveal your IP address so be carefull with it. You can even get highly anonymous proxies from Spys.ru (http://spys.ru/en/)

Grab a VPN

Proxies help you in hiding your IPs but there is higher level too, VPNs. Simply, VPN is like opening website in someone else’s computer, it hides your IP along with entire network. It’s superior than proxies. There are many free VPN providers such as VPN Book (http://www.vpnbook.com/) but it is always recommended to purchase your own VPN server, in some other country and change the server regularly, the best way to stay anonymous online.

the last but not least
Store nothing

You can also use pre-configure JonDo live CDs (https://anonymous-proxy-servers.net/en/jondo-live-cd.html), it includes everything which can help you stay anonymous. Beside these anonymous stuff, it also includes basic tools and Libre Office office solution.

So these were some of the simple and easy ways to stay anonymous online and protect privacy but remember that there is no bulletproof service, the more comp
lex tools you use, the more difficult it becomes to track you.

HOW TO CHECK OUT LOADING TIME OF ANY WEBSITE


If you own a website, you should be curious that how much time does ur website takes to load so today we are going to learn a method to know the loading time of any website in
a matter of seconds.

Let`s start:
Open up

http://www.loads.in/

Now, you type in the website address in the column provided and select START. It will automatically start running tests and comes up with the results.
After the first test, you can test from different locations and different browsers and then optimize accordingly.

Trick To Make Your Firefox Fast


This Firefox tricks will
improve the speed & load time of
firefox. And you will be able to
surf faster.
Type about:config in the address
bar, Then look for the following
entries, and make the
corresponding changes.
network.http.max-connections-
per-server =32
network.http.max-persistent-
connections-per-proxy =16
network.http.max-connections
= 64
network.http.max-persistent-
connections-per-server = 10
network.http.pipelining = true
network.http.pipelining.maxrequests
= 200
network.http.request.max-
start-delay = 0
network.http.proxy.pipelining
= true
network.http.proxy.version =
1.0
Lastly right-click anywhere and
select New- Integer. Name it
nglayout.initialpaint.delay and
set its value to 0. This value is
the amount of time the browser
waits before it acts on
information it receives.













How to Bypass Captcha Verification in Chrome, Firefox Safari


Some web services uses Captcha image verification to restrict entry to bots for improving the security and automated registrations. But sometimes these captcha codes become hard to read even by humans and becomes more time consuming activity.

Rumola, an addon will be helpful in this situation which lets you bypass captcha verification and automatically fills the captcha codes in websites.

How to Bypass Captcha verification using Rumola

Open an account at Rumola. (you’ll get 10 free trials at registration)
Register Rumola At http://skipinput.com/
Install the addon
For Chrome :
https://chrome.google.com/webstore/detail/bjjgbdlbgjeoankjijbmheneoekbghcg

For Firefox :
http://skipinput.com/files/mozilla.htm

For Safari :
http://safariaddons.com/addon/134/

After installing the addon, restart your browser if required and once the plugin is activated, it will automatically start filling captchas for you.Once you start to fill other fields or double click captcha field, Rumola will initiate captcha recognition and read the numbers & letters and puts them in the box for you.

How to make sure that the link you open are not harmful, contain virus and malware


This is an obvious question, while surfing Internet, daily we come to links which point to a website which we never visited earlier. Though we can prevent us clicking on the new ‘suspicious’ link, but what if my friend had sent me and it’s urgent to access it, in this case how you would make sure your computer will stay safe ?

In this article we will learn how we can find whether the link contains virus, malware or trojan and is harmful or not.The best way to find whether the URL which you want to access is harmful or not is to scan it and check whether it contains malware, virus, trojan, keylogger or any such harmful program which may get installed in your computer automatically and harm your PC and steal your data.

Don’t worry, it’s not so difficult to scan a URL for malware, there are many of the online service which provide user option to scan any suspicious website and that too for Free. Suppose someone gave you any suspicious link such as www.example.com/abc/phis/hck.php then how would you find it’s safe or not ? You can make sure that URL is not harmful by first using free Comodo Web Inspector, visit siteinspector.comodo.com, enter the suspicious URL and click on START THE SCAN button, wait for few seconds for scan to complete and results will be in front of you, it will let you know whether it found any malware on site or not, if it says the link is harmful, don’t open the link, but if it says it’s safe then you can open the link.

Second free service to scan suspicious URL is Zulu URL Risk Analyzer, visit zulu.zscaler.com, enter the suspicious URL, click on Submit URL button, wait for some time, it will scan the website and give it a score from 0 to 100, where 0 means completely safe and 100 means completely harmful. This website scans all the elements and tells whether they are Belign, Suspicious or Malicious. Though this service is helpful in advance thorough scanning, it has also reported false positive on safe site.

Third free service which will help you to find whether URL is safe or not is VirusTotal, visit www.virustotal.com/en/#url and enter your URL and click on Scan it! button. Wait for few seconds and it will check the reputation of website from various directories and will check whether it was ever marked as suspicious or malicious or not. It will give you test results, and if you find that it’s not malicious then you can access the URL

Amazing Windows Command Line Tricks


Whatever eye candy the graphical interface of windows may offer but it could never match the functionality that could be achieved with command line. Here is the list 10 useful commands and tricks for Windows command line.

1. Super Hide your files
I have posted detailed post regarding this before also . Besides normal hidden files, windows file system provides another attribute for files that makes them super hidden so that they aren’t visible form explorer or with normal dir command. Use the command
attrib +s +h pathtofile to super hide a file. Replace + symbol with - to remove super hidden attribute from file.You can also use this command to show hidden files in usb drives, simply use
attrib -s -h *.* c command.

2. Join multiple mp3 files
Here’s a nice trick that otherwise would require some software to perform. You can join multiple mp3 files to form a single mp3 file. Simply move to the folder in command line where mp3 files are stored that you want to combine and run the command
copy /b *.mp3 newfile.mp3
The wildcard *.mp3 will combine all mp3 files to form a newfile.mp3 file. You can control which files are combined using wildcard parameters.

3. Map a Drive Letter to a Folder
Most of the time, our hard drives get filled with huge amount of data folder, files etc that moving to a folder you occasionally use becomes a heck. However, there’s a dos command that lets you map a drive letter to a folder. e.g. to map the folder C:\windows to M drive use the command:
subst M: C:\Windows
However the mapped drive gets lost once you restart your pc, you can then create a batch file including the above command and schedule it to run at system startup.

4. Change colors of command Window
Perhaps you need to take a print out of dos window and don’t want to waste ink on black background of dos window. Windows command line provides a command to change background and text color of dos window in a snap.Simply use color bf to change colors. b is the code for background color and f is code for text color. To know color codes type color /? at command line.

5. Use previously entered Command
Just typed a long command moments ago and need to run that again but the effort involved to type again is making you sick! But don’t worry as command line keeps track of your previously entered commands which are accessible by pressing F7 key.
Command History
Alternatively you can use Up Arrow key to use earlier commands you used.F1 & F2 also offer similar kind of functionality but in a different way, try them out.

6. Run Multiple commands at once
Multiple commands can be concatenated using && and run at once with single press of Enter. Simply type in your commands and concatenate them with && at once.
e.g. color f8 && dir && time
would run all the three commands one after another with a single press of Enter.

7. Filter output of commands
Some commands like systeminfo provide a whole bunch of information about your pc but what if you need info only about updates installed or Processor or Virtual Memory. You can filter the output using find. Here’s how to get only updates list from systeminfo.
systeminfo | find "Update"
This will only show updates installed on your system.

8. Drag Drop Folder paths
No need to type in long folder paths at command line, simply drag n drop that file or folder from explorer onto command line window to copy its path.

9. Move selected files to another folder
If you need to move only doc files to another folder or project documents created this month to another folder from a folder containing large number of files, you would rather end up using Ctrl+click to select individual file in Windows Explorer. But thanks to command line, you can use wildcards to move selected files.
Use move *.doc newfolderpath
to move only doc files to new folder. Any wildcard combination can be used here.

10. Take screenshots of webpages
To take screenshots of web pages, you would need a tiny utility called IEcapt.exe and then place it in c:\Windows directory, now go to command line and type in
iecapt urltocapture pathofoutputimage
to get a screenshot of the webpage.