Friday, November 1, 2013

TOP 10 PEOPLE WHO CHANGED THE WORLD


Top 10 people who changed the world .....

1. Bill Gates :
Bill Gates created his first computer program while still at high school, co-founded Microsoft in 1977, and by 1993 was the richest man on Earth. In 2000 Gates and his wife formed the Bill & Melinda Gates foundation, which is the largest charity in the world. One of its aim is to exempt the Third World of polio and other deadly diseases.

2. Martin Luther King :
Martin Luther King was a Baptist minister who campaigned against the segregation of blacks in the Southern states of the United States. He was influenced by Gandhi and believed in peaceful protest. He won the Nobel Peace Prize in 1964. King was assassinated in 1968, but will always be remembered for his dignified, passive resistance to an unjust society.

3. Nelson Mandela :
Nelson Mandela dedicated his life to the fight against apartheid – a policy which kept black and white South Africans apart and denied black citizens the vote. He was imprisoned in 1964 for his aggressive opposition to South Africa’s racist government and was held for 26 years. In 1990, after his release, Mandela was elected President of the African National Congress. In 1993 he won the Nobel Peace Prize for his work to end apartheid

4. Adolf Hitler :
Adolf Hitler was Germany’s leader from 1933 – 1945, during time which he led the world into the most devastating war in history. Hitler’s hatred of Jewish people and his desire for a blue-eyed, blond-haired master race led to the murder of six million people during World War II; most died in concentration camp in Eastern Europe.

5. Albert Einstein :
Albert Einstein was one of the greatest of all physicists and his name has become a symbol of genius. When his most famous work, the General Theory Of Relativity was proven in 1919, Einstein became the most celebrated scientist in the world and he won the Nobel Prize for Physics in 192 1. Einstein was a firm believer in pacifism but his scientific theories helped his adopted country, the USA, to develop the atomic bomb. A week before he died Einstein wrote to Bertrand Russell, a British Philosopher and leading antinuclear campaigner, asking to put his name to a manifesto urging all countries to give up their nuclear weapons.

6. Mahatma Gandhi :
Gandhi began his career as a lawyer but became a great political and spiritual leader. He led the peaceful civil disobedience of Indians against British rule in India and negotiated with the British Government until 1947, when India was granted independence. Gandhi became the first icon of a people’s struggleagains oppression. His simple lifestyle and his belief in religious tolerance have made him a symbol of decency and peace ever since.

7. Karl Marx's :
Karl Marx's ideas on economic history and sociology changed the world. Marx was a social philosopher who attacked the state and predicted a future in which everyone was equal. He explained his theories in the Communist Manifesto (compiled with Friedrich Engels and published in 1848) and Das Kapital (1867 – 94). His ideas eventually led to the Russian Revolution and communism. By 1950 almost half of the world‘s people lived under communist regimes.

8. Charles Darwin :
Naturalist Charles Darwin established the theory of evolution. He began forming his ideas when he served as official naturalist on a world voyage on HMS Beagle (1831 – 36) and spent the rest of his life back in England developing them. When his famous book The Origin of Species by Means of Natural Selections was published in 1859, there were violent reactions against it. Darwin challenged the Bible’s account of creation and explained that human being are descended from an ape-like ancestor. Another English naturalist, Alfred Russell Wallace, independently developed very similar ideas at the same time as Darwin.

9. William Shakespeare :
William Shakespeare is generally agreed to be the greatest play writer in the English language. He began as an actor and wrote atleast 154 love poems and 37 plays, including Hamlet, King Lear, Romeo and Juliet and Macbeth. Shakespeare also probably introduced more than 1,700 new words to the English Language.

10. Christopher Columbus :
Christopher Columbus is one of the most famous of all explorers. He believed he could reach Asia by sailing west across the Atlantic Ocean and in 1492 he set sail in the Santa Maria to prove his theory. Instead, he landed on the islandsnow known as the West Indies. His discoveries led to the European explorations and settlement of the Americas.

Friday, September 27, 2013

How Could You Speed-Up Your PC??


Windows PCs typically slow down as applications are installed and used.  Whether using word processing, excels, internet, gaming or whatever stuffs, hard drives fill with temporary files that do not always get removed when no longer needed. Read on to learn of ways to help keep a PC running smoothly with little or no money.


STEPS:

1. Stop all unused applications The taskbar is on the bottom edge of the screen. In the right side of it appears a group of small icons, collectively names as 'System Tray'. Each of these icons represent specific program that has been partially or running in the background. It acquires some memory and processing power.

  • Winkey+R
  • type 'msconfig'
  • click on 'startup' tab
  • uncheck all the unused or not relevant programs as shown above

2. Turn off unneeded Desktop Features that try to make things look better.




You can get these by right-clicking on 'My computer'->properties and do it as shown above. In the last dialog box, choose 'Adjust for best performance' and do it yourself as 'custom'.

3. Do a shut down/ reboot Some programs do not release memory properly when they close, which is the case for some operating systems. The computer has to be completely shut down and then restarted. Shutting down the system will have the operating system forget which memory locations aren't free, so on the next boot, all memory locations are free to use.

4. Empty the Recycle Bin Simply deleting files from the disk does not really delete them at all, rather they are moved to a temporary holding on drive for restoration. 


Once empties, the space on the hard drive that the data occupied is made available for reuse and the restoration of any files empties from the recycle bin becomes extremely difficult.  Note that this will only speed up you pc if the hard drive is nearly full.

5. Uninstall all applications that are no longer need When applications and games are installed to a Windows PC, some files are written in the Windows directory. Most of these changes are not readily apparent to the user, so proper removal requires uninstalling the program by clicking on Control Panel-> Add or Remove programs-> Uninstall programs

6. Run 'Error Checking' Right click a drive icon in 'My Computer' and select 'Properties  followed by 'Tools'. Choose 'Error Checking' to let the utility scan the drive for damaged files that can contribute to slow drive access speeds. This may take several minutes to complete.

7. Install anti-virus and keep it updated Today, anti-virus is an absolute must. There are many from which to choose at the software store, but there are free Anti-virus available that do a very good job. I would suggest Avast, BitDefender and Eset programs. Install 'Adblock' extension to your browser which prevents malware sites but also reduces temp disk space for the browser by about 30% by not downloading advertising.

8. Find and Delete temporary files Temporary files are used for supporting some applications for a limited period of time and left unused for later. You can delete it by doing this:

  • Winkey+R
  • type 'temp'
  • select all and 'Shift+del' it.
  • if it prompts for 'skip', click on skip.
  • Winkey+R
  • type '%temp%'
  • select all and 'Shift+del' it.
  • if it prompts for 'skip', click on skip.
9. Set your computer;s energy setings to High Performance This is especially true in Laptops and Netbooks where the processor speed is altered in accordance to energy settings(and if you are running on battery power)

10. Have a High RAM If your RAM is small in memory, Your PC won't support a high-speed performance. Upgrade your RAM for better performance.

Wednesday, September 25, 2013

RUN COMMANDS FOR WINDOWS

RUN Commands !

1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting­ Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk




68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver
116. Wordpad - write

Sunday, September 22, 2013

CHANGE THE FOLDER COLOR

Your Computer's folder may contain many beautiful pictures, videos and beautiful stuffs.
But does it look beautiful?? I mean the color you love??

Why use default always??

Let's try the trick..

NOTE: YOU SHOULD BE CONNECTED ONLINE. BECAUSE THIS AIN'T A OFFLINE PROCESS.

1. Download facebook colorizer here.

2. Install it.


3. Just do it as shown above in the picture.

4. When you do it, it will ask you for an e-mail id.
You could give a fake id also, just for formality.
It will accept.

5. And you can enjoy.

Saturday, September 14, 2013

(CTRL+ALT+DEL)ed your files?



Sometimes we would have deleted the files permanently in our computer and realized that the deleting was a mistake??

To those dudes, here you go..

We have a software called 'Kickass Undelete', which brings those files back to your hard disk or your flash drive.

Actually, what is the condition is, only if the data on that drive is not re-occupied, (i.e) the space which was available after the deletion is not been occupied after the deletion.

Click here to download the file.

Steps to proceed:

1. To start searching for the files, select the respected drive from 'My computer' and click the scan button. The scan might take a while.

2. When the file search has been completed, it will show you the results with the name, type, size and the last modified date of the searched file.

3. Now you can select the desired file to be recovered.

THIS IS AN OPEN SOURCE APPLICATION AND AVAILABLE FOR ALL WINDOWS(XP/7/VISTA)



Thursday, September 12, 2013

SAVE AS PDF

You can save your Web Pages by simply right clicking on the web page and save..

Right??

But some web pages like indiabix.com won't allow you to do this kinda stuffs..

Alternately, you can the below steps to do so..



Download CutePDF writer here and install it.. it will be around some Kb's in size..

After installing, it will ask you to download a convertor which will be available here..

You are done..

Now, CTRL+P your webpage and select your printer as CutePDF and print it..

It will ask you to save it under what name??

Just give your desired one..


Tuesday, September 10, 2013

COGNIZANT 2014 RECRUITMENT

Whichever website you take, Cognizant's aptitude will contain Verbal and Analytical sections only.
They concentrate more on that(Someone said someday).

Things have changed.

Today, My first (and last maybe) Campus interview.
It was the company, Cognizant Technology Solutions.
Venue was at PSG College of Technology, Coimbatore.
It's On-Campus.

I think there were around 996 candidates registered their names.
Out of 996, 500 something were for Direct HR round. I'm not the one in it actually.

I was for the aptitude round, which was conducted online.

There were some formalities of filling out the details of you(aggregate, phone no, blah blah blah)

Then i started the test(Everyone does).

I was shocked totally.

Because, there were Logical Reasoning, Analytical and Numerical Ability (No verbal at all).
It had 55 questions i think.

There was no problem with Logical and Analytical to me. Because i have concentrated on it. But i had no idea about Numerical. It was not in the pattern of Cognizant.

I managed somehow and does something.

In my class, out of 35, only 1 person cleared this first round.

My request to you:

Concentrate on everything if you are attending CTS recruitment.

Have a clear idea about your 'Area of Interest' in your CV.

HR questions are based on that only and your Project as well.

Tuesday, August 20, 2013

Cloud Computing

What is Cloud Computing?




Cloud Computing(CC) is now evolving like never before, with companies of all shapes and sizes adapting to this new technology.  Industry experts believe that this trend will only continue to grow and develop even further in the upcoming years.  While cloud computing is undoubtedly beneficial for mid-size to large companies, it is not without its downsides, especially for smaller businesses.


Definition says that Cloud Computing(CC) is a colloquial expression used to describe a variety of different computing concepts that involve a large number of computers that are connected through a real-time communication network.  In science, CC is a synonym for distributed computing over a network and means the ability to run a program on many connected computers at the same time.
To say it in noun, CC is a Computing services provided over the Internet or cloud, whereby shared resources, software and information are provided to computers and other devices are on demand.


Main Advantages of Cloud Computing:

1. Cost Efficiency
2. Availability
3. Backup and Recovery
4. Environment friendly
5. Scalability and Performance
6. Increased Storage Capacity


Main Dis Advantages would be:

1. Security
2. Technical Difficulties
3. Increased Vulnerability


I'll explain the advantages and Cons later in the next post.
Keep updated.

CONTACT ME ON FACEBOOK


Sunday, August 11, 2013

TOP TEN COMPUTER VIRUSES OF ALL TIME

Top 10 Virus Of All Time

10. Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish. Visit Symantec's Security Response for instructions on how to remove Sircam.

9. Red Raider

Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.

The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec's Security Response for instructions on how to protect your system from Code Red.

8. Bad Benjamin

Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive. Visit Symantec's Security Response for instructions on how to remove Benjamin.

7. Numbing Nimda

Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec's Security Response for the Nimda removal tool.

6. Tennis Anyone?

The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec's Security Response for instructions on how to remove Kournikova.

Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.

5. (Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.

4. Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec's Security Response for instructions on how to remove Magistr.

3. Malevolent Melissa

The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.

So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. Visit Symantec's Security Response for instructions on how to remove Melissa.

2. Klez the Conquerer

The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec's Security Response for instructions on how to remove Klez.

1. Love Hurts

LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec's Security Response for instructions on how to remove LoveLetter.


CONTACT

Saturday, August 10, 2013

மயிரே போச்சு...

என்னுடைய முதல் வலைப்பதிவு இது..தமிழில்..

'மயிரே போச்சு' என்று யாராவது சொன்னால் அவர்களை பார்த்து சிரியுங்கள்..

ஏன் சிரிக்க வேண்டும்???

இந்து முறைப்படி, மொட்டை அடிப்பது ஏன் என்று உங்களுக்கு தெரியுமா??

'கடவுளே! என் அழகையே உனக்கு அர்பணிக்கிறேன்.. எனது கோரிக்கையை நிறைவேற்று..' என்று அர்த்தம்..

ஒருவருக்கு அழகை தருவதில் நமது முடி முக்கியத்துவம் வாய்ந்தது.. அதை ஒருவன் உதாசீனம் படுத்தினால், அவனுக்கு அவனுடைய அழகின் மேல் அவனுக்கே அக்கறை இல்லை..


(ஏதோ சொல்ல எத்தனித்திருக்கிறேன்.. சரியாக வந்ததா என்று தெரியவில்லை.. உங்கள் நேரத்தை வீனடித்திருந்தால் மன்னியுங்கள்)

CONTACT

Thursday, August 8, 2013

HOW TO INSTALL IN WINDOWS' OPERATING SYSTEM???

That sounds weird, isn't it?

Yep.. Most of the geeks and nerds don't care to know how to install a Windows' OS.
Most of the guys and gals are studying in B.E., B.Sc., M.C.A., in Computer field should be aware of this. Because, when some stranger or a neighbor asks you to install an OS, what will you do?? Stare at him??

Let's have a clear point and clear solution about that.

THESE ARE THE STEPS INVOLVED TO INSTALL A WINDOWS' OS:

1. Have a 4 GB Pen Drive.
2. Have the Windows OS in a .ISO format which you wanna install.
3. You must have PowerISO to convert your USB into a bootable Pen Drive.

Let's start the process.

Open PowerISO and goto Tools>Create Bootable USB Drive

It will prompt you to use as a administrator. Click Yes.

It will ask you to choose the source image file (.iso file). Choose it.

Choose the destination USB drive, that you wanna change to bootable.

Choose the Write method. Most probably the default option will be USB - HDD. If No, select that option.

Then hit 'Enter'.

It will start to create your USB into Bootable disk.

After it gets finished, unplug your device.


NOW IT'S TIME TO CHANGE THE DEFAULT BOOTABLE OPTION IN YOUR SYSTEM:

When you switch on your system, in the bottom of the screen, you can see "PRESS F2 TO GET THE BOOTABLE OPTIONS". Press it. It some computers, it may be F12.

Now, go to the BOOT tab, and change the First preference to USB. You can change it by pressing F5 to move up and F6 to move the option down. And Exit. And restart your system by plugging your bootable pen drive.

It's almost done.

Now we will be directed to OS Installation settings.

Accept the terms and conditions, and choose the drive (C/E/G or whatever drive you've in your PC) and install it.

It will restart at some point. Unplug your pen drive at that time, and plug after it gets on.

It will complete the installation process.

It will restart again now. Now unplug you USB permanently.

It's done.

Welcome to the neighborhood.

Sorry for not showing any screenshots. But i bet it will work fine. If you want any help,

Thursday, July 11, 2013

PROBLEM WITH YOUR DNS SERVER?(ONLY TO WINDOWS USERS)

If you are a internet user, who uses internet via wi-fi, this post helps you.


When you are connected to the internet  via wi-fi, it should view as above image.
But when it is showed with an exclamation mark in it, it means, it is connected but no internet connection.

So, what you would be doing??

1. Restart the laptop
2. Restart the modem
3. Switch off/on the connections.

Right??

Still the problem persists??
Then go on with this..


Click "Start", and type ncpa.cpl and enter in it.

Right click on the connection that you use for the local connection, and then click "Properties".

Click to select "Internet Protocol Version 4 (TCP/IPv4)", and then click "Properties".

In the Internet Protocol window, let's change the "Preferred DNS server" to 208.67.222.222

If the problem persists still, change the server to 208.67.220.220.

That's it.. 

Surf it now.. it must work..


Monday, July 8, 2013

HOW TO USE ANY SIM IN HUAWEI E1731 USB MODEM...?

You could have bought airtel 3g dongle to browse the internet. It costs around 1800 to 2000 Rs. in indian market i believe (costlier isn't??)



Don't worry.

Here's the way to crack it and you can use any sim card (any network) to browse.. Many networks offering attractive GPRS offers..

First of all you have to install the firmware of your modem.. or you can download it from here HUAWEI E1731 FIRMWARE

You should run the firmware as administrator.

After running it, you'll get the IMEI of your modem..

Copy it..

Then run the UNIVERSAL MASTER CODE GENERATOR

You'll get the flash code..

Now click on NEXT in Firmware Wizard and then START..

Now the process got successful crack..

Goto Tools->Profile Management->New to set the new operator

Set the APN of your operator and then save it..

Now you have successfully updated you usb modem..


CONTACT ME???

Wednesday, June 5, 2013

"DISK STRUCTURE IS CORRUPTED OR UNREADABLE"?

You'll get this error message rarely when you're working on Windows Platform.

Let us see how to solve it.

Go to Start->Accessories->Command Prompt->Right click and Run as administrator.

type 'chkdsk /r'

You'll get a warning and you will be asked to Y/N that the check will be done on next startup. Say Yes.

Restart your PC.

Disk checking will be done on the startup.

Problem solved.

Thanks.

Thursday, May 30, 2013

When your Laptop is plugged in, but not charging??(ONLY FOR WINDOWS USERS)

I faced this problem recently in my laptop that my laptop was plugged in for more than hour, but not charged even a single %.

It really makes you irritating when you face this kinda problem.

Let me give the solution i used to solve it.

STEPS:

SOLUTION 1:

1. Shutdown your PC

2. Remove the battery

3. Switch on your PC using AC power

4. Goto Computer->Properties->Device Manager(in right pane)-> Batteries -> Microsoft ACPI-Compliant Control Method Battery

5. Right click on that 'Microsoft ACPI-Compliant Control Method Battery' and Uninstall it

6. Unplug the AC power, Shutdown your PC and insert the battery

7. Problem solved.

SOLUTION 2:

If the above solution doesn't work, try this.

Remove the battery. Unplug the power. Hold on the power button for 30 seconds. Insert the battery. Charge it. It worked.

Tuesday, April 2, 2013

WHY SCREENSAVER???



We always put a really cool images as the screensaver when our pc is not in use..
Why the screen savers are used?
Are they meant for fancy-view?? or something else??

Screensavers were first created to protect a computer monitor from phosphor burn-in. Early monitors had problems with the same image being displayed over and over for long periods of time. The phosphors, used to make the pixels in the display, glow at a constant rate for such a long period of time that they could discolor the glass surface of the monitor. This discoloration could be visible as a faint image overlaying whatever else was shown on the screen. Advances in technology and the creation of energy-saver monitors have virtually eliminated the need for screensavers.

Having said that, most of us still use screensavers. The most common reason is for entertainment, they just look good, however, you can also use a screensaver for security. Some screensavers can be set up with a password so you can walk away from computer and know it is safe.


screensaver is a type of computer program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use. Contemporary screensavers are used primarily for entertainment, security or to display system status information.


Screensaver software can also be used as a rudimentary security measure. Many screensavers can be configured to ask users for a password before permitting the user to resume work. However, a user might be able to circumvent the password by restarting the computer if the computer's owner has set their account to automatically log in upon startup.

FILE SHARING NETWORKS


First off, you are aware that a significant percentage of the content you'd get from any peer to peer network is probably illegal, right? Downloaders who are involved with these various systems are also right in the crosshairs of the Recording Industry Association of America and the Motion Picture Association of America. By percentage, of course, the chances of you getting busted is essentially nil, but "essentially nil" isn't "zero", so beware and go in with your eyes open.

For the rest of this answer, I'm going to turn this answer over to my friend Greg...
The way Peer to Peer works is that people who want a file and people who have a file are all linked up together. Bits and pieces of the file are swapped around until they all have a complete copy.

Let's say that Person A has the whole file, while persons B, C, and D want it. A good P2P system will have person A feeding the first 1/3 of the file to person B, the second 1/3 to person C, and the last 1/3 to person D. Then, while that's happening, persons B, C, and D are feeding each other bits of what they've downloaded from person A.

This speeds up the process, because instead of persons B, C, and D receiving the file at 1/3 the speed that person A can deliver it, they're getting that, plus a portion of the speed each of the other two can deliver the file. So, all things being equal, it can double or triple the download speed for B, C, and D.

If person A goes offline before each of the other three have downloaded their full third of the file, the other three can keep sharing the bits they got until all of them have everything the other does, but until another person with the whole file comes into the network, they'll be stuck.
The whole idea of P2P is that there's never a centralized location for a file. It resides in whole on at least one computer in the sharing network and in whole or in part on all the rest. Then the people who are downloading the file can get pieces of the file from others in the network until each one has a complete copy. The more people in the network and the more people with a complete copy, the faster the sharing goes.

The main difference in the services is how they locate and trade bits of the files.
Kazaa, Limewire, Gnutella, etc... are file sharing networks. Through a series of nodes, you're interconnected to a variety of people sharing a variety of files. You send out a search request along the network and people who have files that meet your search criteria answer back that they have it. Then you pick one of the search results and start getting bits of the file who have some available bandwidth for transferring it to you.

BitTorrent, on the other hand, doesn't create such a broad-based network. It's file-focused. Someone who has a copy of the file creates a tracker and makes it available. Rather than finding that tracker by sending out search requests along a file sharing network, you find it on web sites, via recommendations in chat rooms, in links posted to mailing lists, etc.
Then everyone interested in sharing the file (either providing a copy they already downloaded or getting a copy) can use the tracker to essentially create a network dedicated to sharing just that specific file.

With less popular files or ones where there are lots of trackers splitting the network for them, BitTorrent can be slower than traditional P2P, because you may have fewer people sharing the file via the tracker you're using than you might find on LimeWire or Kazaa. But when you're downloading a popular file via a popular tracker, BitTorrent can blaze.



My fastest P2P download speed ever hit somewhere in the neighborhood of 167 kilobytes a second. My fastest BitTorrent speed was 452 kilobytes per second (though since I was downloading a DVD .iso for a Linux distribution, the download still took close to two hours).
By the way, for Windows, Shareaza is free, spyware free, and supports multiple network protocols, including eMule, Gnutella 1 & 2, and BitTorrent.

Monday, April 1, 2013

TECHNICAL INTERVIEW DEMYSTIFIED-II


In the previous article TECHNICAL INTERVIEW DEMYSTIFIED – I we have discussed about the probable questions from the most important subjects and adding to that, I would now discuss about the other important aspect of technical interview on which you would be quizzed to the extreme (at timesL).
i.e   Projects/Internships & Papers Presented (Optional)
Project is part and parcel of the curriculum for each and every engineering student and the quality of this project shows the student’s experience, expertise and exposure to various technologies and methodologies.
Now when you were asked this question,
Tell me about your projects (or) what are all the projects you have done?
Many wonder where to start, so let me clear your doubts about this here. Now before you answer this question, you should know the following basic things about your project:
  1. Your Project Name (don’t laugh this happened before and I saw people not able to pronounce their project names)
  2. Reason for choosing this project over many other projects present out there, I mean the idea behind this project.
  3.  Technologies used and your role in the project.
  4. Entire project architecture and design (includes UML diagrams and Schema)
  5. You should be able to write part of the code from your project (not certain that you will be asked about this).
  6. Problems faced during the project (if you have done your project, else use the famous words like “faced problem with requirement gathering”, “problem with some part of code which you were not able to do”) and you should also explain about how you have overcome them.
When the interviewer asks about projects , he /she knows that only 1% of the whole engineering students genuinely do the projects as many would only pay money and get the source code, having said that they would only expect you to know the basics of what every project in common has.
So, please make sure that you know the architecture/design of the project and practice well about how to demonstrate your project in an efficient way.
Papers
Not everyone would have presented papers in conferences and symposiums, but if you have done so and kept them on your resume be ready to answer some simple questions on the topics you have presented.
You may be asked to give a shorter version of that presentation which you given previously or you might be asked to assume that there is a slide show of your presentation and give a mock demo(who knows, you might be asked)
Finally, I would say this :
“In this world of uncertainty, nothing is certain and so every interview is unique in its own way and to be through the interview, prepare well for the worst possible scenario and give your best and success would follow”