Showing posts with label Tips and Tricks windows. Show all posts
Showing posts with label Tips and Tricks windows. Show all posts

Thursday, 26 December 2013

How To Hank a Computer With IP Address Easy Steps

Steps. How to Hank Any IP  Address:

1) Prepare the IP Address of the Victim,


2) Download and Install Advance Port Scanner .

3) Open Advanced Port Scanner and Type the IP Address in the right columm and Click Scan.

4) It will lists you all Opened Ports of the Victim Computer or Router.( e. g: Port 91)

5) After Retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)
and type : telnet [IP ADDRESS ] [port]

6) Now you be asked to Enter Login Information, Just Username and Password and hit Enter.
if no password wused just type the Username.

Done . Now you get access to all Victim' File and Documents by browsing with.... CMD
 (use, CD, Copy, Delete)

Enjoy !
Any Question Comment here .

Friday, 15 November 2013



ABSTRACT This paper takes a keen look at the history of computer technology with a view to encouraging computer or electrical electronic engineering students to embrace and learn the history of their profession and its technologies. Reedy (1984) quoted Aldous Huxley thus: “that men do not learn very much from the lessons of history is the most important of all the lessons that history has to teach.” This paper therefore emphasizes the need to study history of the computer because a proper study and understanding of the evolution of computers will undoubtedly help to greatly improve on computer technologies.


The word ‘computer’ is an old word that has changed its meaning several times in the last few centuries. Originating from the Latin, by the mid-17th century it meant ‘someone who computes’. The American Heritage Dictionary (1980) gives its first computer definition as “a person who computes.” The computer remained associated with human activity until about the middle of the 20th century when it became applied to “a programmable electronic device that can store, retrieve, and process data” as Webster’s Dictionary (1980) defines it. Today, the word computer refers to computing devices, whether or not they are electronic, programmable, or capable of ‘storing and retrieving’ data.
The Techencyclopedia (2003) defines computer as “a general purpose machine that processes data according to a set of instructions that are stored internally either temporarily or permanently.” The computer and all equipment attached to it are called hardware. The instructions that tell it what to do are called "software" or “program”. A program is a detailed set of humanly prepared instructions that directs the computer to function in specific ways. Furthermore, the Encyclopedia Britannica (2003) defines computers as “the contribution of major individuals, machines, and ideas to the development of computing.” This implies that the computer is a system. A system is a group of computer components that work together as a unit to perform a common objective.
The term ‘history’ means past events. The encyclopedia Britannica (2003) defines it as “the discipline that studies the chronological record of events (as affecting a nation or people), based on a critical examination of source materials and usually presenting an explanation of their causes.” The Oxford Advanced Learner’s Dictionary (1995) simply defines history as “the study of past events.…” In discussing the history of computers, chronological record of events – particularly in the area of technological development – will be explained. History of computer in the area of technological development is being considered because it is usually the technological advancement in computers that brings about economic and social advancement. A faster computer brings about faster operation and that in turn causes an economic development. This paper will discuss classes of computers, computer evolution and highlight some roles played by individuals in these developments.

Computing machines can be classified in many ways and these classifications depend on their functions and definitions. They can be classified by the technology from which they were constructed, the uses to which they are put, their capacity or size, the era in which they were used, their basic operating principle and by the kinds of data they process. Some of these classification techniques are discussed as follows:
Classification by Technology
This classification is a historical one and it is based on what performs the computer operation, or the technology behind the computing skill.
I FLESH: Before the advent of any kind of computing device at all, human beings performed computation by themselves. This involved the use of fingers, toes and any other part of the body.
II WOOD: Wood became a computing device when it was first used to design the abacus. Shickard in 1621 and Polini in 1709 were both instrumental to this development.
III METALS: Metals were used in the early machines of Pascal, Thomas, and the production versions from firms such as Brundsviga, Monroe, etc
IV ELECTROMECHANICAL DEVICES: As differential analyzers, these were present in the early machines of Zuse, Aiken, Stibitz and many others
V ELECTRONIC ELEMENTS: These were used in the Colossus, ABC, ENIAC, and the stored program computers.
This classification really does not apply to developments in the last sixty years because several kinds of new electro technological devices have been used thereafter.
Classification by Capacity
Computers can be classified according to their capacity. The term ‘capacity’ refers to the volume of work or the data processing capability a computer can handle. Their performance is determined by the amount of data that can be stored in memory, speed of internal operation of the computer, number and type of peripheral devices, amount and type of software available for use with the computer.
The capacity of early generation computers was determined by their physical size - the larger the size, the greater the volume. Recent computer technology however is tending to create smaller machines, making it possible to package equivalent speed and capacity in a smaller format. Computer capacity is currently measured by the number of applications that it can
run rather than by the volume of data it can process. This classification is therefore done as follows:
I MICROCOMPUTERS The Microcomputer has the lowest level capacity. The machine has memories that are generally made of semiconductors fabricated on silicon chips. Large-scale production of silicon chips began in 1971 and this has been of great use in the production of microcomputers. The microcomputer is a digital computer system that is controlled by a stored program that uses a microprocessor, a programmable read-only memory (ROM) and a random-access memory (RAM). The ROM defines the instructions to be executed by the computer while RAM is the functional equivalent of computer memory.
The Apple IIe, the Radio Shack TRS-80, and the Genie III are examples of microcomputers and are essentially fourth generation devices. Microcomputers have from 4k to 64k storage location and are capable of handling small, single-business application such as sales analysis, inventory, billing and payroll.
In the 1960s, the growing demand for a smaller stand-alone machine brought about the manufacture of the minicomputer, to handle tasks that large computers could not perform economically. Minicomputer systems provide faster operating speeds and larger storage capacities than microcomputer systems. Operating systems developed for minicomputer systems generally support both multiprogramming and virtual storage. This means that many programs can be run concurrently. This type of computer system is very flexible and can be expanded to meet the needs of users.
Minicomputers usually have from 8k to 256k memory storage location, and a relatively established application software. The PDP-8, the IBM systems 3 and the Honeywell 200 and 1200 computer are typical examples of minicomputers.
Medium-size computer systems provide faster operating speeds and larger storage capacities than mini computer systems. They can support a large number of high-speed input/output devices and several disk drives can be used to provide online access to large data files as required for direct access processing and their operating systems also support both multiprogramming and virtual storage. This allows the running of variety of programs concurrently. A medium-size computer can support a management information system and can therefore serve the needs of a large bank, insurance company or university. They usually have memory sizes ranging from 32k to 512k. The IBM System 370, Burroughs 3500 System and NCR Century 200 system are examples of medium-size computers.
Large computers are next to Super Computers and have bigger capacity than the Medium-size computers. They usually contain full control systems with minimal operator intervention. Large computer system ranges from single-processing configurations to nationwide computer-based networks involving general large computers. Large computers have storage capacities from 512k to 8192k, and these computers have internal operating speeds measured in terms of nanosecond, as compared to small computers where speed is measured in terms of microseconds. Expandability to 8 or even 16 million characters is possible with some of these systems. Such characteristics permit many data processing jobs to be accomplished concurrently.
Large computers are usually used in government agencies, large corporations and computer services organizations. They are used in complex modeling, or simulation, business operations, product testing, design and engineering work and in the development of space technology. Large computers can serve as server systems where many smaller computers can be connected to it to form a communication network.
V SUPERCOMPUTERS The supercomputers are the biggest and fastest machines today and they are used when billion or even trillions of calculations are required. These machines are applied in nuclear weapon development, accurate weather forecasting and as host processors for local computer. and time sharing networks. Super computers have capabilities far beyond even the traditional large-scale systems. Their speed ranges from 100 million-instruction-per-second to well over three billion. Because of their size, supercomputers sacrifice a certain amount of flexibility. They are therefore not ideal for providing a variety of user services. For this reason, supercomputers may need the assistance of a medium-size general purpose machines (usually called front-end processor) to handle minor programs or perform slower speed or smaller volume operation.
Classification by their basic operating principle
Using this classification technique, computers can be divided into Analog, Digital and Hybrid systems. They are explained as follows:
Analog computers were well known in the 1940s although they are now uncommon. In such machines, numbers to be used in some calculation were represented by physical quantities - such as electrical voltages. According to the Penguin Dictionary of Computers (1970), “an analog computer must be able to accept inputs which vary with respect to time and directly
apply these inputs to various devices within the computer which performs the computing operations of additions, subtraction, multiplication, division, integration and function generation….” The computing units of analog computers respond immediately to the changes which they detect in the input variables. Analog computers excel in solving differential equations and are faster than digital computers.
Most computers today are digital. They represent information discretely and use a binary (two-step) system that represents each piece of information as a series of zeroes and ones. The Pocket Webster School & Office Dictionary (1990) simply defines Digital computers as “a computer using numbers in calculating.” Digital computers manipulate most data more easily than analog computers. They are designed to process data in numerical form and their circuits perform directly the mathematical operations of addition, subtraction, multiplication, and division. Because digital information is discrete, it can be copied exactly but it is difficult to make exact copies of analog information.
These are machines that can work as both analog and digital computers.
The computer evolution is indeed an interesting topic that has been explained in some different ways over the years, by many authors. According to The Computational Science Education Project, US, the computer has evolved through the following stages:
The Mechanical Era (1623-1945)
Trying to use machines to solve mathematical problems can be traced to the early 17th century. Wilhelm Schickhard, Blaise Pascal, and Gottfried Leibnitz were among
mathematicians who designed and implemented calculators that were capable of addition, subtraction, multiplication, and division included The first multi-purpose or programmable computing device was probably Charles Babbage's Difference Engine, which was begun in 1823 but never completed. In 1842, Babbage designed a more ambitious machine, called the Analytical Engine but unfortunately it also was only partially completed. Babbage, together with Ada Lovelace recognized several important programming techniques, including conditional branches, iterative loops and index variables. Babbage designed the machine which is arguably the first to be used in computational science. In 1933, George Scheutz and his son, Edvard began work on a smaller version of the difference engine and by 1853 they had constructed a machine that could process 15-digit numbers and calculate fourth-order differences. The US Census Bureau was one of the first organizations to use the mechanical computers which used punch-card equipment designed by Herman Hollerith to tabulate data for the 1890 census. In 1911 Hollerith's company merged with a competitor to found the corporation which in 1924 became International Business Machines (IBM).
First Generation Electronic Computers (1937-1953)
These devices used electronic switches, in the form of vacuum tubes, instead of electromechanical relays. The earliest attempt to build an electronic computer was by J. V. Atanasoff, a professor of physics and mathematics at Iowa State in 1937. Atanasoff set out to build a machine that would help his graduate students solve systems of partial differential equations. By 1941 he and graduate student Clifford Berry had succeeded in building a machine that could solve 29 simultaneous equations with 29 unknowns. However, the machine was not programmable, and was more of an electronic calculator.
A second early electronic machine was Colossus, designed by Alan Turing for the British military in 1943. The first general purpose programmable electronic computer was the
Electronic Numerical Integrator and Computer (ENIAC), built by J. Presper Eckert and John V. Mauchly at the University of Pennsylvania. Research work began in 1943, funded by the Army Ordinance Department, which needed a way to compute ballistics during World War II. The machine was completed in 1945 and it was used extensively for calculations during the design of the hydrogen bomb. Eckert, Mauchly, and John von Neumann, a consultant to the ENIAC project, began work on a new machine before ENIAC was finished. The main contribution of EDVAC, their new project, was the notion of a stored program. ENIAC was controlled by a set of external switches and dials; to change the program required physically altering the settings on these controls. EDVAC was able to run orders of magnitude faster than ENIAC and by storing instructions in the same medium as data, designers could concentrate on improving the internal structure of the machine without worrying about matching it to the speed of an external control. Eckert and Mauchly later designed what was arguably the first commercially successful computer, the UNIVAC; in 1952. Software technology during this period was very primitive.
Second Generation (1954-1962)
The second generation witnessed several important developments at all levels of computer system design, ranging from the technology used to build the basic circuits to the programming languages used to write scientific applications. Electronic switches in this era were based on discrete diode and transistor technology with a switching time of approximately 0.3 microseconds. The first machines to be built with this technology include TRADIC at Bell Laboratories in 1954 and TX-0 at MIT's Lincoln Laboratory. Index registers were designed for controlling loops and floating point units for calculations based on real numbers.
A number of high level programming languages were introduced and these include FORTRAN (1956), ALGOL (1958), and COBOL (1959). Important commercial machines of this era include the IBM 704 and its successors, the 709 and 7094. In the 1950s the first two supercomputers were designed specifically for numeric processing in scientific applications.
Third Generation (1963-1972)
Technology changes in this generation include the use of integrated circuits, or ICs (semiconductor devices with several transistors built into one physical component), semiconductor memories, microprogramming as a technique for efficiently designing complex processors and the introduction of operating systems and time-sharing. The first ICs were based on small-scale integration (SSI) circuits, which had around 10 devices per circuit (or ‘chip’), and evolved to the use of medium-scale integrated (MSI) circuits, which had up to 100 devices per chip. Multilayered printed circuits were developed and core memory was replaced by faster, solid state memories.
In 1964, Seymour Cray developed the CDC 6600, which was the first architecture to use functional parallelism. By using 10 separate functional units that could operate simultaneously and 32 independent memory banks, the CDC 6600 was able to attain a computation rate of one million floating point operations per second (Mflops). Five years later CDC released the 7600, also developed by Seymour Cray. The CDC 7600, with its pipelined functional units, is considered to be the first vector processor and was capable of executing at ten Mflops. The IBM 360/91, released during the same period, was roughly twice as fast as the CDC 660.
Early in this third generation, Cambridge University and the University of London cooperated in the development of CPL (Combined Programming Language, 1963). CPL was, according to its authors, an attempt to capture only the important features of the complicated
and sophisticated ALGOL. However, like ALGOL, CPL was large with many features that were hard to learn. In an attempt at further simplification, Martin Richards of Cambridge developed a subset of CPL called BCPL (Basic Computer Programming Language, 1967). In 1970 Ken Thompson of Bell Labs developed yet another simplification of CPL called simply B, in connection with an early implementation of the UNIX operating system. comment):
Fourth Generation (1972-1984)
Large scale integration (LSI - 1000 devices per chip) and very large scale integration (VLSI - 100,000 devices per chip) were used in the construction of the fourth generation computers. Whole processors could now fit onto a single chip, and for simple systems the entire computer (processor, main memory, and I/O controllers) could fit on one chip. Gate delays dropped to about 1ns per gate. Core memories were replaced by semiconductor memories. Large main memories like CRAY 2 began to replace the older high speed vector processors, such as the CRAY 1, CRAY X-MP and CYBER
In 1972, Dennis Ritchie developed the C language from the design of the CPL and Thompson's B. Thompson and Ritchie then used C to write a version of UNIX for the DEC PDP-11. Other developments in software include very high level languages such as FP (functional programming) and Prolog (programming in logic).
IBM worked with Microsoft during the 1980s to start what we can really call PC (Personal Computer) life today. IBM PC was introduced in October 1981 and it worked with the operating system (software) called ‘Microsoft Disk Operating System (MS DOS) 1.0. Development of MS DOS began in October 1980 when IBM began searching the market for an operating system for the then proposed IBM PC and major contributors were Bill Gates, Paul Allen and Tim Paterson. In 1983, the Microsoft Windows was announced and this has witnessed several improvements and revision over the last twenty years.
Fifth Generation (1984-1990)
This generation brought about the introduction of machines with hundreds of processors that could all be working on different parts of a single program. The scale of integration in semiconductors continued at a great pace and by 1990 it was possible to build chips with a million components - and semiconductor memories became standard on all computers. Computer networks and single-user workstations also became popular.
Parallel processing started in this generation. The Sequent Balance 8000 connected up to 20 processors to a single shared memory module though each processor had its own local cache. The machine was designed to compete with the DEC VAX-780 as a general purpose Unix system, with each processor working on a different user's job. However Sequent provided a library of subroutines that would allow programmers to write programs that would use more than one processor, and the machine was widely used to explore parallel algorithms and programming techniques. The Intel iPSC-1, also known as ‘the hypercube’ connected each processor to its own memory and used a network interface to connect processors. This distributed memory architecture meant memory was no longer a problem and large systems with more processors (as many as 128) could be built. Also introduced was a machine, known as a data-parallel or SIMD where there were several thousand very simple processors which work under the direction of a single control unit. Both wide area network (WAN) and local area network (LAN) technology developed rapidly.
Sixth Generation (1990 - )
Most of the developments in computer systems since 1990 have not been fundamental changes but have been gradual improvements over established systems. This generation brought about gains in parallel computing in both the hardware and in improved understanding of how to develop algorithms to exploit parallel architectures.
Workstation technology continued to improve, with processor designs now using a combination of RISC, pipelining, and parallel processing. Wide area networks, network bandwidth and speed of operation and networking capabilities have kept developing tremendously. Personal computers (PCs) now operate with Gigabit per second processors, multi-Gigabyte disks, hundreds of Mbytes of RAM, colour printers, high-resolution graphic monitors, stereo sound cards and graphical user interfaces. Thousands of software (operating systems and application software) are existing today and Microsoft Inc. has been a major contributor. Microsoft is said to be one of the biggest companies ever, and its chairman – Bill Gates has been rated as the richest man for several years.
Finally, this generation has brought about micro controller technology. Micro controllers are ’embedded’ inside some other devices (often consumer products) so that they can control the features or actions of the product. They work as small computers inside devices and now serve as essential components in most mac

Sunday, 27 October 2013


Windows NT Server contain various components among which some of the components run in user mode and other run in kernel mode. Kernel Mode is a
special type of mode in which all the hardware and system data can be accessed by  the running code,
whereas in user mode, there in only restricted access to the system data and hardware by the running code. The user mode is also referred to as non-privileged mode. The architecture of Windows NT Server contains the following components :
  • Hardware Abstraction Layer (HAL)
  • Kernel
  • NT Executive
  • Protected Environment Subsystems

Hardware Abstraction Layer (HAL)

HAL is a software interface located between the hardware and the operating system and it is the lowest level
component of the Windows NT operating system. HAL is platform-specific and carries cods for communication and controlling the hardware on which Windows NT operates. HAL gives the interface for
Symmetric MultiProcessing (SMP) and enable Windows NT Server more application-friendly.
HAL is executed as a Dynamic Link Library (DLL) and, is responsible for protecting Windows NT server based on HAL is that it is not compatible with the older version of DOS and Windows program : 


All operating systems consist of  similar components and perform  almost similar functions but the methods and procedures for performing these functions are different. Operating systems are classified into following different categories based on their distinguishing features: 
  • Single -user Operating system
  • Multi-user Operating system
  • Batch processing Operating system
  • Multiprogramming Operating system
  • Multitasking Operating system 
  • Parallel Operating system
  • Distributed Operating system
  • Real.time operating system

Single-User Operating System 

It allows a single user to access a computer at a time . These computer have single processor and execute 
single program . The resources such as CPU and I/O device are constantly available to the user in a single 
user operating system for operating the system. As a result, the CPU site idle for most of the time and is not utilised to it maximum. A single -user OS is divided into categories :
  • Single-user, single-tasking operating system
  • single-user , multi-tasking operating system
The single-user, single-tasking operating system allows a single-user to execute on
program at a time. MS-DOS and palm OS for palm hand-held computer at
examples of single-user single-tasking operating system .

Single-user multitasking operating system allows a single-user to operate multiple programs at the same time. For example, you can perform calculation in Excel sheet print a Word document and download a file from the internet concurrently .
Mac OS Windows 95, Windows 98, Windows NT Workstation and Windows 2000 Professional, operating system for desktop and laptop computer are the examples of single-user, multi-tasking operating system. 

Monday, 13 May 2013

Are you troubled by your laptop's battery

Are you troubled by your laptop's battery is full after charging the battery, the laptop is the battery backup or shutdown Lॅptop is in the middle repeatedly. This kind of healing Many of you will come to the laptop. To overcome these difficulties, who arrive in laptops we've brought you some tips. The first

Go to the Start button and select Control Panel Power Options, click Options.
Turn power option offers the option would have been to go to the Monitor section.टर्न ऑफ ऑप्‍शन में जाने के बाद आपके सामने कई दूसरे विकल्‍प आएंगे जिनकी मदद से आप अपने लैपटॉप की स्‍क्रीन के पॉवर ऑप्‍शन को सेट कर सकते हैं। On the laptop as well and we never seem to talk on your phone, or sometimes fall asleep while working.
Time to go to options you can set up your convenience. Such as 1 minute, 30 seconds better than your laptop more battery backup time will be reduced.
The two power settings and options appear in front of you first turn off the hard disk and system Standbayॅ set out in Advance option "When I close the lid to my portable computer" option to're choosing.

Friday, 10 May 2013

Install Windows 8 From USB Drive, Dual-boot with XP, Vista & 7

Back when the Windows 8 Consumer Preview hit the Web, we offered a basic guide on configuring a virtual machine. With Windows 8's Release Preview available and the final version inching toward completion, we figure it's a great time to offer a similarly easy step-by-step walkthrough on installing Windows 8 with a USB drive.

If you're familiar with the process, there isn't much for you to see here, but this should serve as a quick confidence booster for anyone who hasn't installed an operating system recently.

Step One

Download Windows 8 and the Windows 7 USB/DVD tool

If you're not sure what version of Windows 8 to download, we'd recommend the 64-bit build, especially if your system is relatively modern. You can read more about the difference between 32-bit and 64-bit operating systems here and the download page linked above provides system requirements for each architecture. The short of it: Windows 8 64-bit requires an extra 1GB of RAM and 4GB of storage -- negligible for most users. Also, before you ask, the Windows 7 USB/DVD tool will work fine with Windows 8.

Step Two

Create a bootable Windows 8 USB drive

Naturally, to create a bootable USB drive, you'll have to insert one and it needs to be 4GB or larger. Install the Windows 7 USB/DVD tool. Once the utility opens, you should be able to browse for and select the Windows 8 ISO you downloaded as well as the USB drive you inserted. It's worth noting that your USB drive will be wiped, so save anything important. The process takes about five minutes depending on the speed of your drive. You'll see a message that reads "backup completed" when it's done.

Step Three

Install the Windows 8 Release Preview (key: TK8TP-9JN6P-7X7WW-RFFTV-B7QPF)

Needless to say, back up anything important before proceeding. If you plan to upgrade or overwrite your installation of Windows XP, Vista or 7, open the root directory of your USB drive in Windows Explorer and launch Setup.exe to begin. You'll get to choose between the two. Windows 7 users should have a painless upgrade as programs, Windows settings as well as user accounts and files are imported. However, Windows 8 won't save programs from Vista and it won't save programs or Windows settings from XP.

If you want to dual boot Windows 8 with your existing operating system, you'll have to install a second storage device or create a new partition. The former is relatively self-explanatory, just attach the drive and choose it during the installation process. The latter, however, requires a little more effort. Vista and 7 users can create a new partition with Windows' Disk Management application (Start > search for Disk Management). Once the application loads, you should see your operating system's drive. Follow these steps:

Right click the drive that you want to house Windows 8 and choose "Shrink Volume" (Windows 8 64-bit requires at least 20GB, so shrink your current partition accordingly)
Right click the new "Unallocated" space and create a "New Simple Volume"
Choose the next available drive letter and quick format the partition with NTFS (you can name the volume anything, but we'd suggest something like Windows 8 RP x64)

Windows XP users will have make partition adjustments with a third-party tool such as Partition Logic, but you'll do the same thing: shrink one volume to create another. It should be smooth sailing from here as Microsoft's installation process guides you through everything. Just boot off your Windows 8 USB drive, choose a custom installation and select your newly created partition. If you're having trouble launching the USB drive, you probably just have to put it ahead of your system drive in the BIOS (look for boot options).

If you want to get rid of Windows 8, load your primary OS and launch partition software (again, Disk Management for Vista or 7 users). Delete the Windows 8 volume and extend your remaining partition into the freshly unallocated space. Removing Windows 8 could screw up your bootloader and prevent your original OS from starting properly. Don't panic, this is a simple fix. Windows Vista and 7 users can use the automatic Startup Repair, while Windows XP users will have to get their hands a little dirtier.

Tuesday, 7 May 2013

All (Ctrl+Alt+Del) Permanently deleted files Recovery solution

           Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...

 Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.

Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.

To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.

When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.

3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).

Saturday, 4 May 2013

How Stdaun your computer immediately

                   How Stdaun your computer immediately

How Stdaun your computer immediately

Read: How to find the location of train
Today we Btaang about a way you can shutdown your computer quickly without any damage.
1. The initiatives below to shutdown the computer, go to the Task Manager by right-clicking to open it. Or direct shortcut CTRL ALT DEL to open Task Manager can also experiment.
2.'re Choosing Task Manager option to open the application after running the End Task to close the program option you're choosing to make
3. The shutdown by pressing ALT U icon to open it.
4. Stdaun or by pressing the CTRL button then select Turn Off Option
5. 're Choosing the option that will turn your computer.

Sunday, 28 April 2013

Construction and Operation of the Hard Disk

                  Construction and Operation of the Hard Disk

Photograph of a modern SCSI hard disk, with major components annotated.
The logic board is underneath the unit and not visible from this angle.
By. Amit Kumar

To many people, a hard disk is a "black box" of sorts--it is thought of as just a small device that "somehow" stores data. There is nothing wrong with this approach of course, as long as all you care about is that it stores data. If you use your hard disk as more than just a place to "keep stuff", then you want to know more about your hard disk. It is hard to really understand the factors that affect performance, reliability and interfacing without knowing how the drive works internally. Fortunately, most hard disks are basically the same on the inside. While the technology evolves, many of the basics are unchanged from the first PC hard disks in the early 1980s.

In this section we dive into the guts of the hard disk and discover what makes it tick. We look at the various key components, discuss how the hard disk is put together, and explore the various important technologies and how they work together to let you read and write data to the hard disk. My goal is to go beyond the basics, and help you really understand the design decisions and tradeoffs made by hard disk engineers, and the ways that new technologies are being employed to increase capacity and improve performance.

Saturday, 27 April 2013

Lock Your Computer Folder Without Any Software

       Lock Your Computer Folder Without Any Software

Now you can protect your sensitive files and folders without using a software base lock. In order to secure your privacy on your pc, u might need to lock certain folders. Although password protecting software do work, it is almost useless to hide private data with these software(because we are always questioned as to what it is that we are hiding with the help of these software). Hidden folders do not work as they can be easily searched with Windows Search. So, we need an alternative way to create hidden password protected folders which 

Follow the easy steps

It’ll only take a couple of steps and you’re done. The default password is “yourpassword”. This is the only thing you’re gonna change in the code.
Copy the below code.

title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
echo Are you sure to Lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== yourpassword goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
echo Invalid password
goto end
md Locker
echo Locker created successfully
goto End

Save this file as “locker.bat”.
Now double click on locker.bat.
It will create a folder named Locker with automatic lock. After creation of the folder, place the contents (your files & folders) you want to lock inside the Folder,
Double click locker.bat again. It will ask to lock the folder Y/N. If you press y then enter. it will lock the folder and your folder will be hidden.
To unlock run locker.bat again, it will ask to enter password, type in correct password then enter, you can see your folder back.
Please don’t change anything except password, otherwise this lock may does not work.
Note that: ***The default password is “yourpassword”. This is the only thing you’re gonna change in the code.***

Please comment and share your views

Friday, 26 April 2013

Windows 8 - Unlock the lock screen trick

                  Windows 8 - Unlock the lock screen trick

A lock screen is nice and pretty for a tablet and all, and perhaps for a little privacy in the office, but for your desktop at home it’s a barrier requiring more keyboard or mouse interaction just to use your PC. Save some sanity, time and RSI in your hand by disabling it.
Tap Windows key+R to bring up the ‘Run’ dialogue box.
Type in gpedit.msc and press Enter.
Navigate to ‘Computer Configuration > Administrative Templates > Control Panel > Personalization’.
Double-click on the ‘Do not display the lock screen’ setting.
Toggle it to ‘Enabled’ and click ‘OK’.
Of course, you’ll still be presented with the login screen, which you may want to keep if more than one person uses your computer. However, if this is redundant for you, it can also be bypassed.

Facebook friend request sent when blocked new trics

         Facebook friend request sent when blocked new trics

Imagine that you are blocked from
sending Friend Requests by Facebook
for 2, 4, 7, 14 or even worse 30 days!
That would be a really serious problem
if you actually wanted to add someone
during that period. Now, you can! With
this simple trick you can send 1000's of
friend requests when when you are
blocked . There's just one part which
will be tough for you if you are going to
add unknown people. You will need the
Email address of the person you want to
Head over to this Link . Here you will
find the place to add a friend through
their Email based on the different Mail
Services. But, if you 're thinking of
adding too many people then it would
be better that you create a contactfile.
For the people who don't know the
easiest way to create a contact file, here
it is:
1. Open a New text document (.txt) in
2. Add all the email addresses
separated by a comma (' , ').
3. Now save that file with the
extension .vcf
Now, this new file is your contact file.
Upload it to Facebook and you willbe
prompted to send friend request. Click
'OK' and that's it, you're done!
Simple yet effective! If you are not
blocked from sending Friend Requests
but still you get warnings like 'This
Friend Request Can't Be Sent' thenyou
can refer another trick which will help
you in bypassing this error here .
There's more in TechAmy which will
definitely help you in Facebook, just
head over here .

Wednesday, 3 April 2013

How to chek your ip address

4.) Your IP Address appears on the scren.
3.) In the command window tppe "ipconfig" and press inter .

How can i find my computer.s IP address
1.) Press the windows key +R. oor from the start menu .clik Run.
2.)Type "cmb" and clik OK

Monday, 1 April 2013

How To Delet Viruses In Pen Drives

How to delete viruses in pen drives without software

It's very cool will helpful trick of everyone .so you want do it follow this
steps are here:

1). Cannect your pendrive and do nat open it by using autorun .

2). Open run  and type cmd and press inter.

3). In the command prompt , Type the pendrive letter of your pendrive (you can check
     it form my computer) then press enter .

4). Type dir/w/o/a/p and press enter.

5). Now i that list search for virus filelist:


New folder.exe


Lexplore .vbs



any other file with .exe Extension.*
6). If it contains any of the file then type attrib-h-r-s-a** and press Enter.

7). Delete each of that file using delete command delete filename
     (For exaple: del new _folder.exe

Saturday, 30 March 2013


1. Minimize   all open windows application (Word , Excel , Internet explorer etc.) and
improve computer performance .Whenever you do not work on any application.minimize
it to free up system recources.

2.  If you use Firefox than I would recommend you to  use MEMORY FOX  add -on this 
     tol will free -up memory automatically click here ti install memory fox.
3. Monitor CPU Usages Create a shortcut of ..
     C\Windows\System32\taskmgr.exe and post it in start up folder for Windows xp (All
      Programs> startup OR C:\Document and Setting\All Users\start Menu\Programs\Startup)
  Once you do this the next time you start you computer . the task manager will always be
   availlable and seen in task tray . this wll help you know how much CPU you are utilizing  
    and its skipes. Goto link.
4. FF Preload website  Regularly used: we will write in detail adout it soon .Keep visiting.