Saturday, 29 December 2012

Top 10 Web Browsers


browser is a software application for retrieving, presenting and traversing information resources on the World Wide Web.Here the following are the top 10 web browsers available now.



1. Mozilla Firefox

2. Google Chrome

3. Internet Explorer


4.Opera

5. Safari



6. Rockmelt


7. Maxthon

8. SeaMonkey



9. Deepnet Explorer



10. Avant Browser






















Saturday, 22 December 2012

Video card buying tips



               
Purchasing a computer video card can sometimes be a very confusing and frustrating task. Before purchasing a video card, keep the below recommendations in mind.

Connection


1. PCI-E or PCI-Express  is the latest computer bus found in computers. PCI Express is designed to replace PCI and AGP and is available in several different formats: x1, x2, x4, x8, x12, x16 and x32. See the PCI Express definition for a full description and related links.

                                  


2. AGP or Advanced Graphics Port, It is something old technology.Now a days no modern motherboards come with this type of port. AGP has a direct line to the computer memory, which allows 3-D elements to be stored in the system memory instead of the video memory and is available in three different standards (1.0, 2.0, and 3.0). 





                                 



3. PCI or Peripheral Component Interconnect, it also was an old type of technology first introduced in 1992. Now days no modern high end graphic devises come with type of port. 



                                             

Other considerations


Ports : check your monitor port they are different. Remember to buy a graphic card which matches with the port on your monitor.
For example if your monitor has a VGA port, to connect with your graphic card you need the same port on your graphic card also.

Chipset - There are dozens of different video card manufacturers. However, there are only two major chipset manufacturers; Nvidiaand ATI. Although both are great manufacturers there can be great big differences between the two as far as performance. Before buying any video card it's a good idea to look up a hardware review on the video card before purchasing it if you're concerned about it's performance.

Size - If you have a smaller computer case fitting some of the new video cards in the computer many not be possible. Video cards today are much larger than older video cards because of their increased capabilities and need for cooling fans. Make sure your case is going to have room for a new video card. The only way to do this is to open the case and physically look.

Warranty - How long is the warranty and what does it cover.


Price range

The price range can vary depending on the brand of video card, amount of memory, the interface used, and other available options.

Where to purchase


For best price we often recommend that users purchase all computer hardware online. You'll be able to look at other customer reviews and get a much lower price. If you're uncomfortable buying online or want to talk to a sales rep you can always visit a local retail store and then buy online.


                                                          Click Here to visit our facebook page and like.






























Monday, 10 December 2012

Create a folder without name.





Have you seen the above folder names?
This is not a super high-tech geeky trick but it just a short and simple trick on how you can create a folder without name in Windows Operating System.  follow the steps to do so.

1. Create a folder
2. Select the folder and press F2
3. Press any of the number after pressing on the Alt Key on the keyboard.

Note: If you press Alt followed by 255 there will have anything.

Why should I use this trick? Nothing! Just for fun or maybe you can use it to amaze your friends.


                                                                           Click Here to visit our facebook page and like.

Thursday, 6 December 2012

      

                  



In Windows OS, Internet connection can be shared to other LAN or Wireless LAN.In the same way you can shere Internet using Redhat Linux 6.Follow the procedure to do so.


Step 1: 

Please open terminal or log in text mood with root user. Then apply below command.
  • # vi /etc/sysctl.conf then press enter.
Now please go to bottom in this text file and remove Hash sigh (#) from in front of below line.
  • net.ipv4.ip_forword=1.
After does this please save file.

Step 2:

 Please apply another command for DNS set. Then press below command.
  • # vi /etc/resolve.conf then press enter.
May you get this file empty. If it is empty then please write as below:
  • nameserver <your DNS server IP here>

you can
Then save and restart the network service. Use below command.
  • # service network restart or.
  • # /etc/init.d/network restart.























Wednesday, 5 December 2012

Service Pack

                                       




A service pack, often abbreviated as SP, is a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Companies often release a service pack when the number of individual patches to a given program reaches a certain (arbitrary) limit. Installing a service pack is easier and less error-prone than installing many individual patches, even more so when updating multiple computers over a network.

Service packs are usually numbered, and thus shortly referred to as SP1, SP2, SP3 etc. Windows XP has 3 service packs.

How to identify which Service Pack that you currenlty run?

If you are running Microsoft Windows Vista/7 Operating System you can follow the procedure to identify it.

1.Click Start button
2.type winver
3.Click on winver.exe

Click HERE to download Windows 7 and Windows Server 2008 R2 Service Pack 1.
 

Tuesday, 27 November 2012

Bluetooth vs Wifi

 

                                         

                                        Comparison chart

                                        

BluetoothWifi
Frequency:
 
2.4 GHz
 
2.4, 3.6, 5 GHz
 
Security:
 
It is less secure
 
It is more secure
 
standard:
 
IEEE802.15
 
IEEE802.11
 
Cost:
 
Low
 
High
 
Hardware requirement:
 
Bluetooth adaptor on all the devices connecting with each other
 
Wireless adaptors on all the devices of the network, a wireless router and/or wireless access points
 
Bandwidth:

 
Low ( 800 Kbps

 
High (11 Mbps )
 
Specifications authority:
 
Bluetooth SIG

 
IEEE, WECA

 
Year of development:
 
1994
 
1991
 
Primary Devices:

 
Mobile phones, mouse, keyboards, office and industrial automation devices

 
Notebook computers, desktop computers, servers, TV, Latest mobiles.

 
Ease of Use:


 
Fairly simple to use. Can be used to connect upto seven devices at a time. It is easy to switch between devices or find and connect to any device.

 
It is more complex and requires configuration of hardware and software.

 
Range:

 
10 meters

 
100 meters

 
Power Consumption:

 
Low

 
High

 
Latency:

 
200ms

 
150ms

 
Bit-rate:2.1Mbps600Mbps
 

Sunday, 25 November 2012

Trouble shooting Cookies related issue



Trouble shooting Cookies related issue_

What are cookies? A "cookie" is a small piece of information sent by a web server to store on a web browser so it can later be read back from that browser. This is useful for having the browser remember some specific information.

If the cookies are blocked, Internet explorer will show the following message when log on to your gmail account.



Now we can learn how to troubleshoot this issue in simple steps.



Step:1
go to tools and Internet Options



Step:2

Go to privacy options and see that the highest security "Block all Cookies" has enabled.



Step:3


Set the privacy option to "Medium" as seen on the image above and click Apply then OK.  Refresh the page by pressing F5.

                                                                
                                                                     Click Here to visit our facebook page and like.












Monday, 19 November 2012

Net share command: List / create / delete network shares from command line





We can use net share command to create, configure and delete network shares from command line .


1. List the shared created on the local computer



   net share


2. Create a network share from command line.



The syntax for creating a share is as follows.


net share sharename=folderpath /grant:username,permissions

For example to share the folder E:\Games with everyone in the domain and to give full permissions.

 net share games=E:\games /grant:everyone,full


3. Delete network share(i.e to disable sharing of the folder) from command line




net share sharename /delete

For example, to delete the share created above, the command would be as below.

net share games /delete


                                                                               Click Here to visit our facebook page and like.



Friday, 16 November 2012

Adobe CreatePDF / Word to PDF Converter

Convert Word docs to PDF without downloading new software.


The CreatePDF online service is the only Word to PDF converter that lets you turn Microsoft Word documents into Adobe PDF files by working with virtually any web browser or free Adobe Reader® software*.



Why choose Adobe CreatePDF online?

  • Upload a Word doc using your web browser and get a PDF file in just a few moments.
  • Or, convert to PDF while working in free Adobe Reader®, using CreatePDF from the Tools pane
  • Reliably convert a wide range of document and image formats to PDF, including .doc and .docx files
  • Automatically store your PDF files online

Get more...
  • Quickly merge multiple documents into one PDF file
  • Convert existing PDF files to editable Microsoft Word or Excel formats

How to convert Word docs to PDF files

Work in a web browser
  1. Sign in to your CreatePDF account online
  2. Click on Convert a File to PDF
  3. Select a Word document, and then click Open
  4. When the conversion is complete, click Download

Work in Adobe Reader
  1. Open Adobe Reader
  2. Choose Tools > Create PDF Files
  3. Click on Select File to Convert to PDF
  4. Click Convert, signing into your CreatePDF account if needed
  5. Click View PDF file in Reader
                                                                   Click HERE to do it.

                                                Click Here to visit our facebook page and like.



















Wednesday, 7 November 2012

How to Remove Genuine Notification on Windows XP




Have you ever seen the above notification in Windows XP? This is Windows Genuine Notification from Microsoft


Here is a trick on how to remove Genuine Notification from Microsoft.Just follow this procedures:

 1. Lauch Windows Task Manager.
 2. End wgatray.exe process in Task Manager.
 3. Restart Windows XP in Safe Mode.
 4. Delete WgaTray.exe from c:\Windows\System32.
 5. Delete WgaTray.exe from c:\Windows\System32\dllcache.
 6. Lauch RegEdit.
 7. Browse to the following location:
     HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
     Windows NT\CurrentVersion\Winlogon\Notify
 8. Delete the folder ‘WgaLogon’ and all its contents
 9. Reboot Windows XP.


                                           Click Here to visit our facebook page and like.


Monday, 5 November 2012

Understand DNS record types and functions



DNS records are used to direct traffic to and from your domain. These records associate a domain name with a specific IP address. The following table describes frequently used DNS records and their functions.

1. Name server record

Identifies which name servers are the authoritative name servers for a specific domain. DNS information can be cached in several name servers for a period of time, but when the cache expires, non-authoritative name servers contact the authoritative name server for updated information about a domain.

2. A record (address record)

Associates a domain name with an IP address.

3. CNAME (Alias or canonical name) record

Specifies that the domain name is an alias of another canonical domain name. When a name server looks up a domain and finds a CNAME record, it replaces the first domain name with the CNAME and then looks up the new name.

4. MX (mail exchanger) record

Identifies the server to which email is directed. It also contains a priority field so that mail can be directed to multiple servers in a prescribed order.

 

5. SPF (sender policy framework)

An email validation system designed to help prevent email spoofing and phishing.

6. SRV (service record)

Specifies information about available services. SRV records are used by Lync Online and Exchange Online to coordinate the flow of information between Office 365 services.

7. TTL (time-to-live)

The amount of time that a DNS record is retained or cached by a name server or other servers before the server does another lookup on the authoritative name server. You use this to control the number of queries made to a given name server.
                                        Click Here to visit our facebook page and like.

Thursday, 1 November 2012

How to Import from the Personal Folders (PST) File in One Profile to the Personal Folders (PST) File in a Second Profile


How to Import from the Personal Folders (PST) File in One Profile to the Personal Folders (PST) File in a Second Profile

To import from the .pst file in one profile to the .pst file in a separate profile: 

From Outlook 2010:
On the File Menu, click Info, and then click Account settings. 
1) Select Account Settings from the drop-down list. 
2) Click the Data files tab. 
3) Select Personal Folders (If you renamed your personal folder to a different name, click that name), and then click Settings. Note the path of the .pst file. 
4) Click OK, and then click Close. 
5) On the file Menu, click Open, and then click Import. 
6) In the Choose an Action to Perform list in the Import and Export Wizard dialog box, click Import From Another Program or File, and then click Next. 
7) In the Select File Type to Import From list, click Personal Folder (.pst), and then click Next. 
8) In the File to Import dialog list, type the path, or click Browse to find the .pst file that you identified in steps 1 through 4. Select the option that you want, and then click Next. 
9) In the Select the Folder to Import From list, click the Contacts folder that you want to import. Make sure that you click to select the Include Subfolders check box if it is necessary. 
10) Click Import Items Into the Current Folder, and then click Finish.
Outlook 2010 imports the Contact items to the target folder.

Saturday, 27 October 2012

Windows 8 editions



Windows 8 is the current release of the Windows operating system, produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablets, and home theater PCs.

Windows 8 has the following four editions.

1) Windows 8

Windows 8 is the basic edition of Windows for the x86 and x86-64 architectures. This edition contains features aimed at the homemarket segment and provides all of the basic new Windows 8 features including the Start screen with semantic zoom, live tiles,Windows Store, Internet Explorer 10, connected standby, Microsoft account integration, the Windows desktop and more.




2) Windows 8 Pro

Windows 8 Pro is comparable to Windows 7 Professional and Ultimate and is targeted towards enthusiasts and business users; it includes all the features of Windows 8. Additional features include operating as a Remote Desktop server, the ability to participate in a Windows Server domain, Encrypting File System, Hyper-V, and Virtual Hard Disk Booting, Group Policy as well as BitLockerand BitLocker To Go. Windows Media Center functionality will be available only for Windows 8 Pro as a free "add-on."

3) Windows 8 Enterprise

Windows 8 Enterprise provides all the features in Windows 8 Pro (except the ability to install the Windows Media Center add-on), with additional features to assist with IT organization.This edition is available to Software Assurance customers, as well as MSDN and Technet Professional subscribers, and was released on August 16, 2012.

4) Windows 8 RT

Windows RT will only be available pre-installed on ARM-based devices such as tablet PCs.It will include touch-optimized desktop versions of the basic set of Office 2013 applications to users—Microsoft Word, Excel, PowerPoint, and OneNote, and support device encryption capabilities. Several business-focused features such as Group Policy and domain support are not included.



                                          Click Here to visit our facebook page and like.


Thursday, 18 October 2012

Windows 7 Startup Repair.



Install Windows XP over Windows 7 in a dual boot.


We can install multiple operating systems in a computer. But the installation should go from lower version to higher. So that when you install Windows XP into a computer where Windows 7 is already there, its booting file ( bootmgr ) will replaced by ntldr of Windows XP. On that time after Startup repair only Windows 7 will able to load.

Windows 7 Start-up repair.

1) Insert Windows 7 DVD and boot from it
2) Wait for Windows 7 to load files.
3) Choose Windows 7 language and other settings.
4) Click on the repair your computer link.
5) Wait for System Recovery Options to locate Windows 7 on your computer.
6) Choose your Windows & installation.
7) Choose the Startup Repair Recover tool.
8) Wait for Startup repair searches for problems to repair.
9) Now Startup repair will attempt and repair your Windows 7
10) Restart your computer.

Windows 7 boot screen.


but actually we have to get the following boot menu to load both of the Operating Systems.( Windows 7 and Windows XP )

If your Windows XP cannot found after startup repair, you have to do bcd edit. This is normally do in command mode. But a simple tool is available called EasyBCD to edit BCD in a simple step.

                                                      Click here to download it.



Saturday, 13 October 2012

xcopy command in Windows


Applications of Xcopy command.

Xcopy provides an excellent tool for backing up selected folders. With appropriate switches, a variety of backup scenarios can be created. One possible backup configuration would be to copy only those files that have been changed. Here is an example command: xcopy C:\somefolder

E:\backupfolder /D /E /C /R /H /I /K /Y This command will copy all files, including those in sub-folders, that are newer in the source folder. It will copy hidden as well as read-only files and will create the destination folder and/or sub-folders if they do not already exist.

Exit codes for Xcopy

The following table can be used for troubleshooting xcopy related issues.

Exit codeDescription
0Files were copied without error.
1No files were found to copy.
2The user pressed Ctrl+C to terminate xcopy.
4Various errors including insufficient memory or disk space, an invalid drive name, or invalid syntax.
5Disk write error occurred.

                                           

                                   Click Here to visit our facebook page and like.

Monday, 8 October 2012

How to disable Windows 2008 Event Tracker.

When Shutdown Event Tracker is enabled, users cannot shut down or restart the computer without providing a reason. If the computer is shut down or restarted unexpectedly, either as a result of power interruption or hardware failure, the first member of the local Users group to log in after the restart is prompted to enter a reason in Shutdown Event Tracker.

Shutdown Event Tracker can be enabled on the local computer by editing the local computer's Group Policy settings.
Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure.


Here we will discuss, how to disable Shutdown Event Tracker.


step:1

Take Run dialog box.



step:2


Go to administrative templates.

step:3


double click on display Shutdown Event Tracker.


step:4



select disable option and press OK


step:5

take Run dialog box and type the following command.





Click Here to visit our facebook page and like.