12/2/09

Tips :- more useful and secure USB pen drive

USB thumb drives are one of the most commonly used ways to transfer data if you happen to work across multiple computers. Lets just make the USB drives prettier, useful and secure.

1. Add icons and labels to your drive.

Download an icon you would want to see appear when you plug in your thumb(pen) drive. Place the icon at the root of the drive. Next open notepad and type the following:

[autorun]

label = ""

icon = "yourIcon.ico"

Save the file onto the root of your thumb drive and name it "autorun.inf", be sure to put the quotes or else it will be saved as a text file. Now Safely remove your USB drive and plug back in, the icon and name should appear in Windows Explorer if your did everything right. You can also automatically launch an application. If this is not the way you prefer to work use this neat application to generate the autorun.inf file automatically

2. Add a Start Menu to your USB drive

portable appsDownload and install the Portable Apps Suite on your USB drive, it not only gives you a nice start menu for your USB drive but also gives you the ability to run some of the most popular applications (like Firefox, Putty, OpenOffice, SumatraPDF, notepad++ and many more) right from your USB drive. A must have for your USB drive1

3. Use Mojopac

mojopacMojopac gives you your operating environment right on your USB drive. You can be rest assured that you will find a familiar interface with Mojopac on any pc you plug your USB drive into, all the customization will be preserved from computer to computer. Moreover it lets you operate without leaving any trace what so ever on the computer, so you can be rest assured about your privacy and data

4. Write Protect your Drive

My USB drive has a write protect notch that prevents it from being written onto when plugged on a computer, this is important because if the computer you are plugging into is infected than it can readily infect your USB drive. However if your drive cannot be write protected then you can use thumbscrew. It makes anything connected to the USB non writeable until you are sure and want to make it writeable.

5. Make Autorun.inf read only and system file

Thumbscrew may prevent writing on USB devices but it has to be already present on the computer you want to plug your USB drive into, so if its not possible for one reason or the other then you should make sure that you have a custom autorun.inf file and that its read only and has the system file attribute set. This prevents malicious code from writing entries to your autorun.inf and thus even if your USB drive may have a virus it won’t actually run it automatically. So a little bit more protection but not fool proof by any means.


6. Hold down the shift key

If you suspect your USB drive may be infected but still you have to plug it in to scan and remove the infections, then when you plug it in hold down the shift key to prevent autorun if its not already disabled.

7. Encrypt your drive using Truecrypt

true cryptYou can encrypt all the data on your USB drive using Truecrypt. This fives you added security if you have some sensitive data on your USB drive. Simply run it and choose your USB device to encrypt. TrueCrypt is free, Open Source and efficient and gives you extra security, download it here.

8. Sync your drive.

Microsoft offers an excellent application specially to address all your syncing needs. Its called the SyncToy. If you have to work on the same files on two different computers than you want to have the latest version of all files all the time, this can be easily done with synctoy. It offers both oneway and twoway synching. Its also free to download. Download it here

9. Backup your drive

toucanBacking up is always a nice thing to do, specially when you have to use it on different computers. There is a portable app to make this very easy. Its toucan, you can install it on your USB drive and back up, sync and encrypt your data as and when you want. Or else there is this the USB Image Tool that creates an image of everything you have on your drive and saves it as one file.

10. Make it bootable

pen drive linuxYou can install and run Linux from your USB thumb drive, this is an excellent way to recover systems that won’t boot, or to just plug it into another computer and do all of your work using linux applications and surf the net without leaving any history on the host computer. For this try pendrivelinux

Hacking Gmail



I know this post will get lots of clicks, because of its name. Now for the people with mischievous intents who managed to reach here, I m sorry to say that i don’t know how to get the password of someone else’s gmail account(unless the other person is careless enough to fall traps to social engineering). This article is a collection of tips and tricks that help to increase your Gmail productivity! Thats also known as hacking by the way.



Meanings of hacking (these are not all)


Hack #1: Address
Almost everyone knows about the "." trick with gmail addresses. Okay just in case you don’t know I will quickly point out that:

* mickeymouse@gmail.com
* mickey.mouse@gmail.com
* mickeym.ouse@gmail.com
* m.i.c.k.e.y.m.o.u.s.e@gmail.com

all refer to the same address. In other words mail sent to any of the above will go to the same inbox.

Hack #2: Address
Here is what most people don’t know, If you know this already go buy yourself a beer and send me the bill! The tip is that in addition to the "." hack there is also a "+" hack which is that you can add any text to your mail address using "+". eg

* mickeymouse+minniemouse@gmail.com still is same as mickeymouse@gmail.com

Hack #3: Labels
As elementary as they can be, not many people use them somehow. If you are like them and can’t find folders to arrange you mail and always wonder what that Green rectangle is there for then this is for you. Labels are Gmail’s equivalent of folders. Infact they say labels are even better than folders as a mail can be in more than one label.

* Click on edit labels
* Enter the name of the new label and click create. I hate to say this but for the traditional minded, now you have a "folder".
* Any time you need to move a conversation to the label use the "More Actions" drop down list and choose the label name under "Apply Label:"

Hack #4: Filters
The true power of the all the above tips cannot be utilized until or unless you use filters. As the name suggests filters do nothing more than filtering email. Its when used in combination with labels and the above hacks that they prove to be one of the most useful feature that Gmail has to offer.

* Click on settings.
* Then go to the filters tab(click on filters).
* You will see a create new filter link at the bottom. Click on it.

Filters are basically a search criteria, any mail that satisfy the criteria you provide will land be caught by the filter, what you want to do with filter is another thing. You can apply a label, forward to another account, delete , archive and loads of other stuff. By using hack #1 and hack #2 you can actually avoid unwanted mail and spam. eg if while registering the site requires email address then you can give your address as mygmailid+sitename@gmail.com, this way you know that any mail addressed to mygmailid+sitename@gmail.com is from that particular site or person and you can decide what you want to do with it :)
Bonus Hack: You can also create labels on the fly by clicking on the arrow next to the reply drop down when you are viewing a message to create a filter which matches the criteria for the current mail.


Filters on the fly

Hack #5: Keyboard Shortcuts
Again not many people use keyboard shortcuts on Gmail. For lazy people like me for whom moving their hand from keyboard to mouse is too much of a job this is great, actually its very fast, believe me once you get hold of it its amazingly quick. I seldom use mouse within Gmail.

* For most people c (compose), k (next), j (previous), r (reply), a (reply to all) , enter (open conversation), x (select) would be enough but there is a complete list at Gmail help page.
* Note that you can use C and R to compose and reply in a new window

Hack #6: Send .exe files
You probably know that Gmail doesn’t allow you to send .exe, .dll, .ocx, .com or .bat files for security reasons. Come on Google all of us should not suffer only because of some stupid people with malicious intent.
Anyway to send exe files either use some other service, or change the extension of the exe file or compress it, but zip compression wont work because Gmail can detect exe files within zipped files as well so try other formats.

Hack #7: HTML Signatures
Gmail doesn’t provide facility to add HTML signatures. However, there is an easy workaround to this. Copy the code you want to use as signature. Create a notepad file and add the following:




your code here



Save the file and open it in a web browser(Firefox, Opera etc). The page will be rendered by the browser. Click and Drag the mouse to select the rendered graphic or whatever and copy it. Go to Gmail, hit compose and then press Ctrl+v, there you have it – HTML signatures in Gmail. You will have to do this every time you want to use the signature so don’t delete the file if you are going to need it in future.

Hack #8: Search
Its Google Mail and how can we not include search in this. Now you might be wondering whats great in search, actually there is. There are a number of operators(keywords) that you can combine to search mail within a label, or only read messages or only from a particular user or only from a particular date and so on. Some people complain that lack of GUI features to search with all these criteria but hey if you are a power user you don’t need a GUI plus its faster this way!!



Search using keywords

Hack #9: Bookmarks and Bookmarklets
You can use your browser to bookmark any label or message type that you see often. Suppose you often like to view all the unread messages then you can type in search "label:unread" without quotes and you will see all your unread messages, but it doesn’t end here you can save it as a bookmark and then get back to it later, not only this you can save other searches as bookmarks too. Bookmarklets are piece of JavaScript code that enhance your productivity(mostly), There is a Gmail This bookmarklet that you can add to your bookmarks toolbar, clicking on which will open up a new compose window with the link to the current page as the body and its title as the subject of the new mail.
You can even bookmark a particular mail or conversation you have to get back to frequently.

Hack #10: Chat Invisible with Gmail
This is no hack! But increases your productivity for sure (if your friends like disturbing you). Well simply mentioning this here because a lot of people dont know it yet. The much awaited invisible mode is here. You can now chat invisibly on Gmail. Yuhooo!!

How to know if someone is invisible on Gmail

As you might be knowing from quite some time you can go invisible while chatting on Gmail. The invisible status is available in Gmail Chat, Google Talk gadget, Google Talk Labs Edition and Google Talk for iPhone .

What to do if you want to know if someone in really offline or is playing Mr. Hideous or as we call here in India – "Mr. India" ?

Follow these steps:

Step 1:

Open the chat window for the contact you want to confirm is offline of invisible

Step 2:

If you see a message "The chat is off record" then proceed to step 3, else click on options in the chat window (Gmail) or the down pointing arrow (Gtalk) and choose "Go Off Record" You will now surely see that "The chat is off record"

Step 3:

Now you need to interpret what you get.

* If you get a message in red like below, this indicates that the user is really offline.

As you might be knowing from quite some time you can go invisible while chatting on Gmail. The invisible status is available in Gmail Chat, Google Talk gadget, Google Talk Labs Edition and Google Talk for iPhone .

What to do if you want to know if someone in really offline or is playing Mr. Hideous or as we call here in India – "Mr. India" ?

Follow these steps:

Step 1:

Open the chat window for the contact you want to confirm is offline of invisible

Step 2:

If you see a message "The chat is off record" then proceed to step 3, else click on options in the chat window (Gmail) or the down pointing arrow (Gtalk) and choose "Go Off Record" You will now surely see that "The chat is off record"

Step 3:

Now you need to interpret what you get.

* If you get a message in red like below, this indicates that the user is really offline.



This shows the contact is offline

* If you get nothing then the user is invisible, or any status updates in gray it means the user is online but invisible.



This shows the contact is invisible

10/25/09

Introduction to PC Components

Here you will learn computer hardware tutorials introduction, basic pc components, networking devices, ram, vga, monitor and printer etc. Computer hardware is the physical part of the computer including the digital circuits inside the computer as opposed to the software that carry out the computing instructions. The hardware of a computer is unlikely to change frequently unless due to the crash or for upgrading them. The devices that is capable of storing, executing system instructions and controlling other logical outputs.

Hardware comprises all of the physical part of the computer such as Monitor, CPU, motherboard, ram, CD-Rom, printer, scanner, hard disk, flash drive (AKA pen drive), processor, pci buses, floppy disk, power supply, VGA card, sound card, network interface card, peripherals, joystick, mouse, keyboard, foot pedal, computer fan, camera, headset and others.

On the other hard software is a logical part of a computer and is used to carry out the instructions, storing, executing and developing other software programs. A typical PC consists of a case or chassis in the desktop or tower case and these components


Motherboard
• CPU
• Computer Fan
• RAM
• BIOS
• Digital Circuitry
• Computer Fan
• PCI Slots


PC Buses
• PCI
• USB
• Hyper-transport
• AGP
• ISA
• EISA
• VLB


Media
• CD-Rom
• DVD-Rom
• Combo box
• Joystick
• BD-Rom drive

Internal storage
• Hard disk (ATA & SATA)
• Data array controller
• Floppy disk

Other Peripheral Devices
• Mouse
• Modems
• Digital Camera
• Sound, Video Cards
• Printer

Output Devices
• Printer
• Scanner
• Monitor
• Speakers
• Headset
• Video output devices


CPU (Central Processing Unit): CPU or central processing unit relates to a specific or processor. The performance of the computer is determined by the CPU chip (processor speed) and the other computer circuitry. Currently, the Pentium chip (processor) is the most popular even though there are other chips available in the market today such as AMD, Motorola and others. The clocks speed becomes most important factor in determining the performance of a computer. The motherboard contains the hardware circuitry and connections that allow the different hardware components of the PC to interact and communicate with each other. Most computer software is being developed for the latest processors so it would be difficult to use the older systems.

Hard Disk Drives – Disk drive is the mechanism to run the disks. All disks need a drive to get the information, read it and put it back to the disks. Hard disk is used to store the data permanently. Often the terms disk and drive used to describe the same thing but it should be clear that a disk is a storage device.

Modem – A modem is used for the modulation and demodulation of the data that is transferred through the modem and the telephone lines. Modem translates the data from digital to analog from analog to digital. Because on the telephone lines data can travel in the form of the analog signals and in the computer data transmits in the form of digital signals. Modems are measured by the speed which is called baud rate. The typical baud rate is 56Kb.

Keyboard – The keyboard is used to type something or input information to the computer. There are different designs and models of the keyboards in the market. The most common layout of the keyboard is QWERTY layout. A standard keyboard has 101 keys and embedded keys.

Video cards - Video cards allow computer to display video, graphics and animation. Some video cards allow computers to display television. A video card with a digital video camera allows users to produce live video. A high speed broadband internet connection is required to watch the videos on net.

Network cards: Network interface cards allow PCs to connect with each other and communicate. Every network computer is required to have a NIC card. NIC cards are required both in wired and wireless networking.

Cables: There are two broad types of cables internal cables, which are embedded on the mother board circuit that performs the communication between the devices and CPU. The other types of the cables are the network cables like coaxial cable, CAT 5, Ethernet cables. These cables are used for the communication purposes between the devices or computers.

Memory – Memory is the one of the important piece of the hardware. Sometimes memory chip memory is confused with the hard disk memory. Sometimes unallocated space of the hard disk is used as virtual memory also known as page file. This type of memory is a temporary memory and is used actual memory is less and requires some additional memory to perform a specific task.


RAM (Random Access Memory)
RAM is a memory that is being used by the computer to store the information temporarily. For example when some work is performed on some applications that work is temporarily stored in the RAM. More RAM in the computer more faster computer works. Today at least requirement of a modern PC is 64 RAM. RAM is in the form of a chip and different vendors have developed the RAM of different capacities.

Mouse – Every modern computer requires a mouse for faster operations. Generally a mouse has two buttons left and right to perform different functions. One type of the mouse has a round ball under the bottom. Another type of the mouse use optical system to track the movement of the mouse.

Monitors – The monitor is used to display the information on the screen. All the activities of a computer, functions and tasks are seen on the computer screen and this is called outputting information. Monitors come in many sizes and shapes, monochrome or full colors. Today most computers use LCD screens. It is light weight and consumes less power as compared to the monitors.

Printers – The printer takes the information from the PC and transfers it to the paper of different sizes, which are placed in the printer device. There are three basic types of a printer such as dot matrix, inkjet and laser.

Scanners- Scanners allow you to transfer pictures and photographs to your computer. A scanner is used to scan the images and pictures. You can then send the image to someone, modify it or take a print out of it. With optical character recognition software you can convert printed documents into the text that you can use in the word processor.
Digital camera- You can take the digital photographs with the digital cameras. The images are stored on the memory chip of the digital cameras and you can transfer them to your computer with the USB drive.

Case – Case or casing covers the whole computer’s circuitry. There are two types of casings desktop and tower casing. There is room inside the casing to add or remove components. Cases come in many sizes like desktop, mini, midi and tower. There are some additional empty slots inside the cases such as IDE, USB, ASI, PCI and firewire slots.

Cards – Cards are the hardware components that are added to the computer to increase their functionalities and capabilities.

Sound cards produce the sound like music and voice. The older cars were 8, 16 and then 32 bits.
Color cards allow computers to produce colors. Initially there were 2, 4 and then 16 bits. The main types of the graphic cards are EGA, VGA and SGA. The 32 cards are the standard to display almost billions of the colors on the monitor.

8/20/09

Install Windows Vista From USB


This is Procedure How to install Vista from USB.Before read procedure you must need this





1. DVD-ROM or DVD-RW


2. USB Pendrive 4GB (Recommended 8GB)Note:USB must Ultra Fast Speed Like Apacer 4GB Handy Steno USB Flash Drive HT203, 200X Hi-Speed USB 2.0 or Kingston DataTraveller 2.03. DVD of Windows Vista InstallationProcedure1. Insert DVD of Windows Vista Installation2. Insert USB Pendrive (Must be formatted)


3. Open Command Prompt


4. Type XCOPY E:*.* /S /E /F H:Note:E: is Source Of Windows Vista Installation, You can change Drive Letter of DVD DriveH: is Target Destination of Copy, is USB Pendrive. You can change of Drive letter of USB Pendrive


5. Wait Until Finished


6. After Finished Safely Remove USB


7. Set Target Computer (Not Installed OS,OS is Broken,or Upgrade)Note:Make Sure Motherboard Support USB Booting and Boot Priority is Set to USB Pendrive First For Example: Kingston DataTraveller 2.0


8. After Boot USB Press Enter


9. Install Now of Vista


10. Don't Enter Your Serial Number and Click Next (After Show Message Click No)


11. Select Version Of Windows Vista


12. Accept Agreement


13. Format Harddrive of C:Note:If C: is formatted and filesystem is NTFS you can click next


14. after finished installation run Windows Vista Upgrade SP1


15. Wait Until a Hour


16. After finished Run Crack

4/25/09

Wireless Networking FAQ

This wireless networking FAQ addresses common concerns about wireless networks. Learn the differences between wireless and wired networks and get an overview of the equipment you'll need for a wireless network from these frequently asked questions (FAQ).

What is a Wireless Network?
A wireless local-area network (WLAN) uses radio waves to connect devices, such as laptops, to the Internet and to your business network and applications.

How Far Does the Signal Reach?
A wireless router or access point's signal typically extends up to approximately 300 feet.

What is a Wired Network?
A wired network connects devices to the Internet or other networks using cables. Some believed wired networks were faster and more secure than WLANs. But continual enhancements to WLAN standards and technologies have largely erased those differences.

Who Uses WLANs?
WLANs are frequently offered in public places such as cafes, hotels, and airport lounges. In addition, many businesses have wireless networks throughout their office buildings or campuses for employee and guest use.

What Equipment Do I Need?
Many routers act as WLAN access points. They connect multiple computers (and wireless-capable printers) to a single WLAN and to the Internet.
You can extend WLANs throughout an area by placing additional wireless access points in various locations. The access points extend the wireless signal's range and strength.
Most laptops have built-in wireless networking. If yours doesn't, you'll need a wireless network adapter card, which is typically inexpensive and easy to install.

How Can I Secure a WLAN?
There are many ways to secure your WLAN, including:
Data encryption, which only gives authorized users access to information over your wireless network
User authentication, which identifies computers trying to access the network
Secure access for visitors and guests
Control systems, which protect the laptops and other devices that use the network.

What are the Benefits of a WLAN?
Small businesses can experience many benefits from a WLAN. A few examples:
You can access network resources from any location within the wireless network's coverage area.
Wireless access to the Internet and to company resources help your staff be more productive and collaborative.
You don't have to string cables, as you do with wired networks. Installation can be quick and cost-effective.
You can easily expand WLANs where and as needed, because no wires are involved.
By eliminating or reducing wiring expenses, WLANs can cost less to operate than wired networks.

How Does a Network Switch Work?

How does a network switch work? How does it compare to a hub or router? The following is a brief overview that explains the differences between these essential pieces of network hardware.
How Does a Network Switch Work?: The Basics
How does a network switch in conjunction with other hardware? For starters, switches are a key component of many business networks. They connect multiple PCs, printers, servers and other hardware. Switches allow you to send information, such as email, and access shared resources, including printers, in a smooth, efficient, and transparent manner.
How Does a Network Switch Work?: Unmanaged Switches
An unmanaged network switch works right out of the box. But it's not designed to be configured. Usually, you'll find unmanaged switches in home networking equipment.
How Does a Network Switch Work?: Managed Switches
A managed switch gives you greater flexibility because it can be configured. For example, you can monitor a managed network switch and adjust it locally or remotely. This gives you control over network traffic and who has access to the network.
How Does a Network Switch Work as Compared to a Hub?
In the most basic networks, devices are connected with hubs. But there's a limit to the amount of bandwidth users can share on a hub-based network. The amount of time data takes to get to its destination increases on hub networks as more devices are added. A switch avoids these and other limitations of hub networks.
How Does a Network Switch Work as Compared to a Router?
Just as switches allow different devices on a network to communicate, routers allow different networks to communicate. A router also connects networked computers to the Internet, allowing multiple users to share a connection. And a router acts as a dispatcher. It chooses the best route for information to travel, so that it's transmitted as efficiently as possible.
Not sure what you need? Talk to a local Cisco reseller who understands your specific requirements. Your reseller can design, install, and help you maintain your network. You'll get a secure, reliable, affordable network backed by Cisco and customized to meet your needs today--giving you a clear path to tomorrow.

4/11/09

how to USE Laptop's in Traval

1. Use a well-made, well-padded case to carry your laptop in. Never check it as checked baggage during air travel.

2. Make sure security applications and software updates are current — anti-virus, firewall, anti-spyware.

3. Limit confidential information transmission, such as any credit purchases and reservations or anything with a Social Security number. Unfamiliar networks are always potentially dangerous.

4. Set up a remote Web mail account to enable e-mail access from any browser, such as Gmail, Yahoo! Mail or MSN Hotmail.

5. Bring an Ethernet (Cat5) cable with you on your trip, in case there is no wireless connection available and you have to hook up to that little box next to the phone that you'll find in most hotel rooms.

6. Use a system password on your laptop to help slow down the novice thief.

7. Use file passwords when available on confidential files.

8. Do not set your computer down and leave it out of sight (especially in the airport bathroom).

9. If you must leave your laptop unattended in a car, put it in the trunk where it can't be seen. But remember that extreme temperatures are not good for electronic devices.
10. Don't send your laptop through the airport X-ray conveyor belt until it's your turn to walk through the metal detector. That way you'll be able to pick it up promptly when it comes out the other end and prevent anyone else from walking away with it.

Basics Of Dual-Core Process Computer




The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too.

The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip).
The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time.

The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned.

By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory.

Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`.

More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines.

Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart.

The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems.