Sunday, 28 July 2013

Hack........

1. The Term Hacker was coined by John Nash, the famous mathematician. "It was an insult, meant to describe someone who used a quick,elaborate solution to sidestep a problem.

2.One of the first technology hacks was discovered in 1972. "A whistle from a Cap n' Crunch box was used to make free long distance phone calls. The whistle's frequency allowed access the phone company's internal authorization system."

3.Ian Murphy was the first hacker to be convicted on felony charges. "He hacked AT&T in 1981 and changed the clocks, allowing people to get late-night discounts during midday and higher rates when they called at night."

4.Kevin Mitnick was at one time the most wanted hacker in the United States. "He hacked into IBM,PACIFIC BELL and more.

5.Gary Mckinnon performed the largest military hack of all time. "In 2001 and 2002, he hacked: NASA, US Army, Navy, Air Force, Dept. of Defense Total damages $800,000".

6.Albert Conzalez received the largest jail sentence for hacking in United States history. " Prison Term: 20 Years, he stole 200 million credit and debit card numbers. $200 million in damages.

7.The United States has the most hacked computers that spread spam. "13.1% of the world's spam originates here. India is 2nd with 7.3%. Brazil is 3rd with 6.8%.

8.Virtual hacking schools in china generate $40 million each year in revenue. "Students pay less than $100 to learn. The schools have been linked to attacks against Google and the US government.

9.Worldwide hackers have stolen an estimated $1 Trillion in intellectual property."Hacking costs the US $4 billion a year in damage. It costs China $1 billion a year".

10.In 2009,43% of 2,100 businesses surveyed by Symantec had lost proprietary info to hackers".

11.A survey of IT professionals revealed 1/3 of Companies deal with hacking on a daily basis. "81% of professionals admit their systems are vulnerable, 17% of those hacks are successful".

12.The average power planet receives thousands of hack attempts a year. "Hackers attempt to commit acts of terrorism and extort money. Millions are exorted every year."

13.The Department of defense hires 250 hackers per year to help defend the US from cyber threats.

14.In 2009, the pentagon spent $6 billion in computer security. "It will be $15-$30 billion per year within the next 5 years".

15.Social Networking Sites like: Facebook are some of the most commonly hacked in the world. "Hackers target personal information, like phone numbers, from social networking profiles and many other areas."

Wednesday, 17 July 2013

Collection of Run commands for windows

Hello everyone,Today we will see all Run commands that can be used in you windows pc.
These Run commands will help you to run the Program without any difficulties.
just click on start>run and type the run command for that particular program you want to run. thats it.



Following are the program name and thier Run commands.

 [A] 

Add/Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Authorization Manager= azman.msc "New"

[C]

Calculator = calc
Certificate Manager = certmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Control Panel = control "New"
Command Prompt = cmd.exe
Component Services = dcomcnfg
Computer Management = compmgmt.msc = CompMgmtLauncher "New"

[D]


Date and Time Properties = timedate.cpl
Downloads = Downloads "New"
Device Manager = devmgmt.msc
Direct X Troubleshooter = dxdiag
Disk Cleanup Utility = cleanmgr
Defragment User Interface = dfrgui "New"
Ditilizer Calibration Tool = tabcal "New"
Disk Management = diskmgmt.msc
Disk Parmelonion Manager = diskpart
Display Properties = control desktop or desk.cpl
DPI Scaling = dpiscaling "New"
Driver Package Installer = dpinst "New"
Driver Verifier Utility = verifier or /reset
DVD Player = dvdplay "New"
[E]


Encryption File System = re
keywiz "New"
Event Viewer = eventvwr.msc
[F]


Fax Cover Sheet Editor = fxscover "New"
File Signature Verification Tool = sigverif
Folders Properties = control folders
Fonts = control fonts
Free Cell Card Game = freecell

[G]

Game Controllers | joy.cpl
Group Policy Editor = gpedit.msc
[I]  

Internet Explorer = iexplore 
Iexpress Wizard = iexpress
Internet Properties = inetcpl.cpl
IP Configuration = ipconfig.exe
iSCSI Initiator = iscsicpl "New"
[K]

Keyboard Properties = control keyboard

[L]

Libraries = explorer or Windows key + E
Local Security Settings = secpol.msc
Local Users and Groups = lusrmgr.msc
Logs You Out Of Windows = logoff
[M] 

Microsoft Support Diagnostic Tool = msdt "New"
Microsoft Paint = mspaint.exe
Mouse Properties = control mouse
Mouse Properties = main.cpl
Mobility Center (only on mobile) = mblctr
 or Windows key + X
[N]
  
Network Connections = control netconnections
Network Connections = ncpa.cpl
Notepad = notepad
[O]

ODBC Data Source Administrator = odbcad32 "New"
Optional Features Manager = optionalfeatures "New"
On Screen Keyboard = osk or
 Windows key + U 
[P]  

Package Installer = dpinst
Pen & Touch Options = tabletpc.cpl
People Near Me Identifier = collab.cpl
Performance Monitor = perfmon.msc
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Printers and Faxes = control printers
Printer Migration = PrintBrmUi "New"
Private Character Editor = eudcedit
Problem Steps Recorder = psr.exe
Programs and Features = appwiz.cpl
[R] 
  
Regional Settings = intl.cpl
Registry Editor = regedit.exe
Remote Assistance = msra "New"
Remote Desktop = mstsc
Resultant Set of Policy = rsop.msc
[S]
   
Scheduled Tasks = control schedtasks
Screen Resolution = desk.cpl
Security Center = wscui.cpl
Services = services.msc
Shared Folders/MMC = fsmgmt.msc
Shuts Down Windows = shutdown
Snipping Tool = snippingtool "New"
Sounds and Audio = mmsys.cpl
Sound Recorder = soundrecorder "New"
Sound Volume = sndvol "New"
Spider Solitare Card Game = spider
SQL Client Configuration = cliconfg
Stored User Names and Passwords = credwiz "New"
Sticky Note = StikyNot "New"
System Configuration Editor = sysedit
System Configuration Utility = msconfig
System File Checker Utility = sfc
System Information = msinfo32
System Properties = sysdm.cpl or
 Windows key + Pause/Break
System Restore = rstrui.exe
[T]   

Task Manager = taskmgr
Trusted Platform Module = TpmInit "New"
[U]

Utility Manager = utilman
User Accounts = netplwiz or control userpasswords2
[W] 

Windows Activation = slui "New"
Windows Backup Utility = sdclt "New"
Windows Fax and Scan = wfs "New
Windows Firewall = firewall.cpl
Windows Firewall with Advanced Security = wf.msc "New
Windows Image Acquisition = wiaacmgr "New"
Windows Media Player = wmplayer
Windows Magnifier = magnify
Windows Management Infrastructure = wmimgmt.msc
Windows Update App Manager = wuapp "New"
Windows Standalong Update Manager = wusa "New'
Windows System Security Tool = syskey
Windows Share Creation Wizard = shrpubw "New"
W
ordpad = write

So with this you get all the run commands which will help you.

Dont forget to g+1.
Thank you :)

Buying a new laptop

Now a day’s most of the people those who are using desktop computers are moving to Laptop. Laptops are more expensive than the desktop computer, so we have to choice the best Laptop while purchasing. So we people should have a knowledge about the Laptop, if we does not have the knowledge about Laptop we cannot choice the correct Laptops.


So let’s see what are the things to consider when purchasing a Laptop?

First of all we should decide the brand of the Laptop which we are going to purchase. To buy the best brand, choice any one of the brand from the below given brands.
SONY
HP
DELL
SAMSUNG
THOSHIBA
LENOVA
ACER
Then, from the selected Laptop brand we should consider the following things.

LAPTOP CONFIGURATION


Processor

Processor is a very important chip in the Laptop mother board. The best processor in the present market is Intel Core i7. After this Intel Core i5 and Intel Core i3 are next best processor. If you’re ready to purchase an expensive Laptop, first of all choice a best brand and then choice the one of the given below processor.
Intel Core i7
Intel Core i5
Intel Core i3

If you decide to purchase a cheaper Laptop than the above mentioned, then you can choice either one of the processor.
Intel Core 2 Duo
Intel Dual Core

If you select the lower quality processor than the above mentioned processors, it’s not suitable for the latest technology.
Next we should consider on Processor Speed. 1.60 GHz Speed and 2.0 GHz Speedprocessors are very slow. So choose 2.8 GHz speed or higher than this.

RAM

Next we should concentrate on RAM size. RAM size is responsible for computer speed, when we run more than 1 program at a time the computer will get slow. So if we want to run latest advanced programs, we should at least use 2GB RAM. If we have more than 2GB RAM your computer will have more speed.
Mostly latest laptop comes with DDR2 RAM, but DDR3 RAM is better than DDR2 RAM. 
So if you wish, you can replace DDR2 RAM to DDR3 RAM. 







HARD DISK
The Laptop which we are going to purchase should have at least a Hard-disk with capacity of 320GB. Because if we want to use the latest advanced software like Photoshop, CorelDraw we need at least 320GB Hard-disk. To save our data and files, we need this much of Hard-disk capacity. When selecting a Hard-disk, we must consider on Hard-disk Speed also.




The following Hard-disk Speeds are better to use in latest Laptop.
SPEED 7200RPM
SPEED 5400RPM
If your Hard-disk speed is less than above mention speed, select one of the Hard-disk from above mentioned.



DVD DRIVE
If you’re buying a branded Laptop you don’t want to care a lot about DVD drive. Because mostly branded Laptop comes with suitable DVD drive.


GRAPHIC CARD
When purchasing a Laptop the next important thing to consider is Graphic Card. It’s important because if you’re using Photoshop, CorelDraw, playing a video game or if you wish to watch HD Videos in your Laptop, you should have quality Graphic card. 


When you select a Graphic Card another important thing to consider is whether it is“Dedicated Graphic Card” or “Integrated Graphic Card”. 
“Dedicated Graphic Card” is much better than “Integrated Graphic Card”. If“Dedicated Graphic Card” is fixed in your Laptop, while playing high quality games the Laptop wont get slow.



OPERATING SYSTEM
Next select the Operating System for your Laptop. In the latest Laptops, mostly Windows 7installed as operating system. But Windows 7 has different versions.

Windows 7 Ultimate
Windows 7 Professional
Windows 7 Home premium
Windows 7 Home basic
Windows 7 Starter version






Select one of the above mentioned version. But 
“Windows 7 Ultimate” and 
“Windows 7 Professional” are the best, so choice either one of this.

Mostly latest laptop comes with Webcam, Mike but once again check whether these are available or not in laptop. And also check HDMI port, Memory card slot, Front mike, etc...

Hidden Local Drive & CD Drive

Hi friends !!!
Today I'm going to show you, how to hide Local Drives without using any software and how to get back hidden CD Drive on your PC.




How to Hide a Local Drive?


Click on Start - Run
In Run box type "cmd" – hit Enter
Now Command Prompt window will appear. Now type “diskpart” and hit Enter.

Then type "list volume" and hit Enter.
Now it will display all the computer details.







After that, type the Drive Letter which you want to hide. 
(Example: If you want to hide volume F, type “select volume F” and hit Enter.)

Now follow mentioned massage will appear to you.
“Volume 0 is the selected volume”






After this, type “remove letter F” and hit an Enter. Now restart your PC once and check.  The particular Drive won’t show in “My Computer”.

To get back Hidden Drive again.

Do the above mentioned steps again.

Click Start Run - cmd - diskpart - list volume - select volume F 
Next type “assign letter D” and hit Enter.

Once again restart your PC, now the hidden Drive will show in “My Computer”

Note: By doing this Computer doesn't lost any data.

_____________________________________________________________________


How to get back Hidden CD Drive again?

Sometime when we insert CD in to computer, CD drive won’t display in "My Computer". Even if the CD drives works properly and if it doesn't show in "My Computer",
Let’s see what to do?

Check whether the CD Drive is Enable or Disable in “Device Manager”. Also check whether the IDE Cable which is connected from CPU to DVD drive is damage or broken.

Even if the CD Drive doesn’t show yet in “My Computer”, we can get back CD Drive to “My Computer” by making some changes in “Registry”.

Click on Start – Run
type “regedit”
Now “Registry Editor” window will open.
Then find the following path.
HKEY_LOCAL_MACHINE -->
SYSTEM -->
CurrentControlSet --> 
Control -->
Class -->  Click on {4D36E965-E325-11CE-BFC1-08002BE10318}






In right side, if there “UpperFilter”, “LowerFilter” sub keys,
Just Delete it. (To Delete, Right Click --> Delete --> Yes)

Now Restart your PC once!!!

How to Lock PC temporarily when Someone enter wrong password

Hi Friends !!!
Today I'm going to show you "How to Lock PC temporarily when Someone enter wrong password".  Most of us saved our Important data and files on our computer. If we away from our PC, somebody may try to login into our system by guessing the password.


To avoid this situation we can lock our PC temporarily by using "Windows Security Settings". By using this option, our PC will lock automatically if someone entered wrong password more than 3 times. This will make hard to guess the password to the particular person. If the person entered more than 3 wrong passwords, PC may get lock for next 30 Minutes.



How to do this


Click on Start button
Type Local Security Policy in Search programs and files box.
Now Click on "Local Security Policy"







From left window pane Expand Account Policies
Then Double click on Account Lockout Policy 
After that Double click on Account Lockout threshold




Now a new window will appear. 




In that window give the value after how many invalid password login attempts you want to lock your PC.



Now click on Apply.

Then Click OK

Wednesday, 5 June 2013

Pullout interface

Pullout interface

Alexey Chugunnikov has creatively designed the Rollerphone concept. It is a wearable cell phone that looks like a wristwatch. What makes the Rollerphone special is that it has a retractable transparent screen at the base. The gadget features a media center, allowing you to watch videos, chat online, play games, read e-books and listen to music.

Tuesday, 4 June 2013

Spider for Cloud Computing

Spider for Cloud Computing

The new Spider Computer by Swedish designer, Nikolaus Frank, gives the mobile computer user a smaller and lighter option for travel. This small device relies on a projected screen and laser keyboard to offer you a ready computer on the go. It relies totally on the “cloud” factor and even doubles up as awkward phone.

Its three legs can easily be folded out, allowing it to be placed on a flat surface. Storing all your data on the Cloud, it reduces the amount of electronics you need to take with you. Digital correction compensates for angular differences in projection versus surface.

Working prototype was made for technology, user studies and research. When you fold it up, it also works as a mobile phone . It can be carried in your pocket and brought anywhere.

T0P SIX TIPS TO IMROVE SYSTEM SPÊED!

T0P SIX TIPS TO IMROVE SYSTEM SPÊED!

1. Let your PC boot up completely
before opening any applications.

2. Refresh the desktop after closing any application. This will
remove any unused files from the RAM.

3. Do not set very largefile size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up
to 500 bytes of RAM

5. Empty the recycle bin regularly.
The files are not really deleted from your hard drive until you
empty the recycle bin.

6. Delete the temporary internet files regularlery.

Share it if this usefull

Friday, 31 May 2013

What happens on the web in 30 seconds

What happens on the web in 30 seconds!

20,400 GB of global IP data transferred
70+ BotNet Infections
12 New victims of identity theft
3+ New Wikipedia Articles published
102 Million Emails sent
700 new Mobile Users
25.000 App downloads
$45,000 sales on Amazon
31,141 hours of music played on Pandora
55+ New linked in Accounts
Over 10 Millions photo Views, 3500+ Photo uploads on Flickr
165 + New Twitter accounts, 50,000+ New Tweets
150,000 Facebook Log ins 3M+ Facebook Views , 350,000 Status update, 40,000+ Wall posts, 205,010 comments
Over 1 million Search queries on Google
15+ Hours of video uploaded – 6.1 Video views on YouTube
25+ WordPress downloads, 75 plugin downloads
1000+ Firefox downloads
30+ New Blogs, 1000+ blog posts
50+ Domain registered
7000+ Iphone App downloaded
12,000+ New posts in Tumblr
800+ Reads on Scribd
200,000+ minutes of voice calls on Skype

Saturday, 25 May 2013

Inventors of Computer Hardwares

Inventors of Computer Hardware: -

1:Key board— Herman Hollerith, first keypunch
devices in 1930’s
-
2:Transistor— John Bardeen, Walter Brattain & Wiliam
Shockley ( 1947-48)
-
3:RAM— An Wang and Jay Forrester (1951)
-
4:Trackball— Tom Cranston and Fred Longstaff (1952)
-
5:Hard Disk— IBM , The IBM Model 350 Disk File (1956 )
-
6:Integrated Circuit— Jack Kilby & Robert Noyce
( 1958)
-
7:Computer Mouse — Douglas Engelbart (1964)
-
8:Laser printer— Gary Starkweather at XEROX in1969.
-
9:Floppy Disk— Alan Shugart &IBM( 1970)
-
10:Microprocessor— Faggin, Hoff & Mazor – Intel 4004
(1971)

share it 90% of your friends don't know about it

DiD U kNow..

30 Funny Computer Facts

1. Amazon, originally a printed book seller
company, now sells more e-books than
printed books.

2. 220 million tons of old computers and
other technological hardware are trashed in
the United States each year.

3. The first two video games copyrighted in
the U.S. were Asteroids and Lunar Lander in
1980.

4. Tim Berners-Lee coined the phrase
“World Wide Web” in 1990.

5. U.S. President Bill Clinton’s inauguration in
January 1997 was the first to be webcast.

6. Google uses an estimated 15 billion kWh
of electricity per year, more than most
countries. However, google generates a lot
of their own power with their solar panels.

7. Microsoft Windows tutorial’s another
name is ‘Crash Course’. Now we now!

8. Did you know hows was Bill Gates’ house
was designed? Using a Macintosh computer.

9. About 1.8 billion people connect to the
Internet, only 450 million of them speak
English.

10. By the end of year 2012, there will be
total approximately 17 billion devices (which
includes computers, tablets and mobile)
connected to the Internet.

11. Every month, domain names are being
registered at a rate of more than one
million!

12. Did you know that Email was already
around before the World Wide Web came?

13. During 1980s, an IBM computer was not
considered to be 100% compatible if it
could not run Microsoft Flight Simulator.

14. MySpace reports over 110 million
registered users. Were it a country, it would
be the tenth largest, just behind Mexico.

15. Last year (2011), one out of every 8
married couples in the USA, met online.

16. The average 21 year old has spent 5,000
hours playing video games, has exchanged
250,000 e-mails, instant and text messages
and has spent 10,000 hours on the mobile
phone.

17. The average computer user blinks 7
times a minute, less than half the normal
rate of 20.

18. The first banner advertise was
introduced in the year 1994.

19. Doug Engelbart had made the first
computer mouse in 1964, and it was made
out of wood.

20. The first domain name ever registered
was Symbolics.com.

21. The world’s first computer which was
named the Z1, was invented by Konrad Zuse
in 1936. His next invention, the Z2 was
finished in 1939 and was the first fully
functioning electro-mechanical computer.

22. There are approximately 1,319,872,109
people using the Internet.

23. There are approximately 1.06 billion
instant messaging accounts worldwide.

24. While it took the radio 38 years, and the
television a short 13 years, it took the World
Wide Web only 4 years to reach 50 million
users.

25. 70% of virus writers work under
contract for organized crime syndicates.

26. A program named “Rother J” was the
first computer virus to come into sight “in
the wild” — that is, outside the single
computer or lab where it was created.
Two-thirds of American Internet users shop
online.

27. Sweden has the hightest percentage of
internet users, they are 75%.

28. Mosaic was the first popular web
browser which was released in 1993.
Every minute, 10 hours of videos are
uploaded on Youtube.

29. Up until the 14th of September, 1995,
domain registration was free.

30. 70% of virus writers actually work
under a contract for an organization.