Posts which you will also like.

Saturday, October 23, 2010

How to Know Which sites are safe for browsing????

While on the Internet some times we generally submit our sensitive data to some sites we even don't know.
These sites may breach your browser security and may spread viruses in your computer and can use your sensitive data to swindle you.How to get rid off these sites???

 There is a simple and free solution to this problem !!!

McAfee SiteAdvisor

This is a free browser plugin that gives safety advice about websites on the search results page before you actually click on the links. After you install the SiteAdvisor plugin, you will see a small rating icon next to each search result which will alert you about suspecious/risky websites and help you find safer alternatives. These ratings are derived based on various tests conducted by McAfee.
Based on the quality of links, SiteAdvisor may display Green, Yellow, Red or Grey icon next to the search results. Green means that the link is completely safe, Yellow means that there is a minor risk, Red means a mojor risk and Grey means that the site is not yet rated. These results will guide you to Web safety.
SiteAdvisor works on both Internet Explorer and Firefox which you can download from the following link: http://www.siteadvisor.com/download/windows.html

Read More ->>

Install Windows 7 from Pen drive

Follow the following steps:


  1.  Plug in the usb drive 2 GB or more.
  2. Open the command prompt as administrator
  3. Then type following command: diskpart ->enter
  4. type list disk next (this will display the disk no. of your USB drive.Note it down e.g d 1)
  5. run following command in sequence
  • select d 1
  • clean
  • create partition primary
  • select partion 1
  • active
  • format fs=ntfs
  • assign
  • exit
    Once you have assigned a drive letter to your Pen drive( let g: in this case) open a new window for command prompt.
Insert windows DVD/CD or mount an image of the Windows in virtual drive and run following command.
  • f:
  • cd boot
  • bootsect.exe /nt60 i
  • exit
Remaining Steps
  1. Now copy all files from DVD/CD to USB drive.
  2. Next change boot option to flash boot from Bios .
  3. Restart the Computer with pendrive plugged in.
  4. Your computer will now boot from Pen drive.................

Read More ->>

Friday, October 15, 2010

Using slmgr in more detail

slmgr is a Windows Software Licensing Management Tool stored in the visual basic script slmgr.vbs and resides in C:\Windows\system32.

SWITCHES WITH slmgr:
  1. -xpr:  tells the expiry date of license
  2. -dli:  shows the basic information about your windows license
  3. -ipk  :Installs a product key, or replaces an existing product key with a new one
  4. -upk: Uninstall the current product key
  5. -ato: Activates windows
  6. -dlv: Displays the detailed license information

These command will be really helpful to know any thing about your license .
Njoy

Read More ->>

Count the no. of words in a string

This program counts the no. of words in string entered by user.This program is space resistant up to two spaces.In similar way we can make it for three or more spaces between words.

import javax.swing.JOptionPane;
class WordCount
{
private String str="";
private int wc;
private int sp;
public void wc()
{
str=JOptionPane.showInputDialog(null,"Enter a string:");
for(int i=0;i<str.length();i++)
{
if(str.charAt(i)==' ')
{
if((i<str.length()-1) && str.charAt(i+1)==' ')
{
i=i+1;
}
sp++;
}
}
JOptionPane.showMessageDialog(null,"No. of words in \""+str+"\" are:"+(sp+1));
}
public static void main(String [] args)
{
WordCount w=new WordCount();
w.wc();
}
}


OUTPUT: Enter a string:Hi how are you?
                 No. of words in "Hi how are you?" are:4
 

Read More ->>

Thursday, October 14, 2010

Clear Your Router Congestion To Get Maximum Speed By Your ISP

Your ISP may promise you 2-5 MB Internet access and above, but some times we get a speed much lesser than promised becouse our  router may prone to congestion. Generally Routers can congested if their incoming packet buffers get full. When this happens, the router drops packets, and bandwidth suffers. In addition, streaming media such as videos may drop packets, and the
video may stop in between frequently, or you may not be able to view it all.
Windows Vista and Window 7 includes a lesser known tool called Explicit Congestion Notifcation (ECN) that may help for this kind of problem.

Caution: This tool is turned off by default because most of the routers does not support it.Turning on this feature for an unsupported router may even create worse problems.
However, there is a way to find out if your router supports ECN and then to turn on ECN from the
command line.

Follow the following steps:

  1.      Run the Internet Connectivity Evaluation Tool :Make sure you’re logged in to Windows as an administrator. Then go to www.microsoft.com/windows/using/tools/igd/default.mspx and agree to the terms.
  2.     Install ActiveX Control:When you agree, on the page that appears, Microsoft will attempt to install an ActiveX control. Your Internet Explorer security settings will most likely block the attempt. The Information Bar will light up yellow. Click it, and from the menu that appears ,select Install ActiveX Control.
  3.     Start Testing:Follow the prompts for installing the software. A new web page will appear. Click Start Test. After several minutes of testing, you’ll see a results screen.

If your router supports it then your are ready to turn on ECN.
first run an elevated command prompt(Administrative privilege) by typing cmd at the Search box and
pressing Ctrl-Shift-Enter.
At command Line: netsh interface tcp set global ecncapability=enabled

To turn this feature off: netsh interface tcp set global ecncapability=disabled
Read More ->>

Tuesday, October 5, 2010

Reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name Joker, then do as follows
4. Type net user Joker * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason.
There are also some other tools such as PClogin now,Ophcrack ,Backtrack, Offline NT Password & Reg Editor .
They are used when even administrator does not remember his/her password.
Some of these tools are available at free of cost and user need to burn them on cd before he/she can use it.
These are Live Os with Linux based kernal.
After burning simply boot with the cd  and follow the instruction and you are done................................
Read More ->>

Trick to use Window 7 without activation

Generally we can use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post here a small trick using which it is possible to use Windows 7 without activation for approximately an year!

Follow the procedure
1. “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. This command can only be used up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1. 6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
Enjoy........................................................
Read More ->>

Test the strength of your Antivirus

This file is a fake virus, which simulates a virus. This string
is provided by EICAR for distribution as the EICAR Standard
Anti-Virus Test File. The file is a legitimate DOS program and
produces sensible  results when  it  runs  (it prints the message
“EICAR-STANDARD-ANTIVIRUS-TEST-FILE!”)
Paste the following text into Notepad and save the text file to
your desktop:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
as Antivirustest.text.
You should see a threat found message. It mean your antivirus
works !!!!
Read More ->>

Hacker Jargon

Here are some terms which a computer user must know:
Malware  –  The generic term used  for all forms of software
designed with malicious intent. Viruses, worms, spyware etc.
are all forms of malware. The term  virus  is often used when
malware should really be used as it describes all forms of
malicious software.
Virus  – A computer virus acts  very much like a human virus.
Human viruses are spread, via thumb drives, floppy discs,
network connections etc., to  other PCs.  Viruses need a host
(like a free screensaver program) to spread. By pure definition:
a virus has the ability to spread itself,  via a host, to other
computers.
Worm  –  A worm is much like a virus. The key difference is
worms can spread between PCs without a host (free
screensaver program, downloaded game etc.) These programs rely on computer networks and usually damage files and slow
down networks in their path.
Trojan(horse)  -  A Trojan horse is a seemingly
harmless program that looks to provide value. However, just as
in Greek mythology, a Trojan horse has a secret agenda and
acts as a backdoor to your computer. This backdoor can be
accessed by a hacker to compromise your PC. Trojan horses are
not self-replicating and spread due to users installing them
manually on their PC.
Spyware  –  Spyware tracks a user’s activity by monitoring
browsing habits and keyboard activity and can even take
screenshots while you use your PC. This information is sent
back to the creator  or beneficiary of the spyware. Signs of
spyware include: modified browser homepages, slow internet,
and suspicious looking sites in place of legitimate sites.
Adware  –  Like spyware, adware is software that  may track
visited websites and act as a key logger. Adware tracks this
information to  automatically display  downloaded or installed
adverts to a user. You may wonder why you are being offered
“PC Super Anti Spyware 2011” when using your PC; this is
adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer
are all examples of adware. 
Backdoor - A backdoor is a point of access to a computer that
does not require authentication. An unlocked house back door
gives access to an otherwise secure  home;  a computer
backdoor allows access to your PC without your knowledge or
permission.
Key logger – Key loggers are used to monitor keyboard activity
on a PC. These can be software-based (bundled with Trojan
horses, adware, and spyware) or hardware-based (between the
keyboard cable and the  PC, acoustic etc.) Usually this
information is retrieved across a local network, the internet, or
from the physical device connected to the keyboard.
Read More ->>

Unix Architecture Overview

Kernel
Unix is a multitasking, multiuser, operating system, designed from day one to be lean and
effective in dealing with real time processing of information. The operating system
design essentially embodies effective operating system control over resources (hard disk,
tapes, screen, filesystem, etc.), so that as many applications as possible to support over
the system can run concurrently, without problem.
The architecture of Unix is relatively simple. Unix derives most of its functionality via
the Kernel, which is a block of code that supports all interaction with end user
applications, shells, etc.
Process Structure
Unix systems multitask applications in what is generally regarded as "user" mode,
whereas the kernel code itself runs in "kernel" or "privileged" mode. The differences are
important - kernel code is customized, via device drivers, for the hardware platform -
hence, the kernel can take advantage, thru device drivers, of specialized processor
functionality that make the multitasking of applications much smoother.
User mode applications, however, are restricted in their ability to access certain processor
instructions, and furthermore, the system is able to keep tabs on what an application does
with resources such as memory, files, etc., independent of any other application. Such
concepts like memory management, virtual memory, etc., are not new to the Unix world -
they were implemented years ahead of the DOS/Windows environment because Unix
needs them to operate!
Input/Output and Piping
Unix console applications work in a similar fashion as do Windows console application
they both support keyboard oriented input, and text mode output.
Unix supports all standard input/output mechanisms, including C functions like printf(),
gets() and so forth. Just like with a Windows console, these standard sources can be
redirected.
Thus, the output of a given command can be directed to a file or device by using the ‘>’
symbol (greater than) to direct the output from the normal “stdout” destination. The inp
of a given command can be read from a file or device by using the ‘<’ symbol (less than
to pull the input from a file rather than the normal “stdin” destination.
Unix generally supports the ability to select which input or output source you wish to
redirect. Prefacing a digit in front of the input or output redirection symbol does this. 0
indicates stdin, 1 indicates stdout, and 2 indicates stderr (the error destination which
normally isn’t redirected).
Read More ->>

Sid Meier's Civilization V Released

Civilization  is back with its new release.
This RTS turn based game is highly anticipated game of the year.This is a triumphant remake of a classic strategy game.Excellent tactical battles and a slick interface make the latest Civilization another wonderful addition to a classic franchise.
Some of the gaming sites(Such as www.gamespot.com) rated it 9/10 and awarded with editor's choice .
A must have game of the year.....
Read More ->>

TOP 10 UNIVERSITIES OF THE WORLD

Universities at UK and US lead in the Universities ranking of year 2010
  Rank         University                Country
  1.  University of Cambridge    UK
  2.  Harvard                               US
  3.  Yale                                      US
  4. University College,London  UK 
  5. MIT                                       US
  6. Oxford                                   UK
  7. Imperial College                   UK
  8. University of Chicago           US 
  9. California Inst. of Tech.        US
  10. Princeton                               US
Read More ->>
DMCA.com Protected by Copyscape Online Plagiarism Tool