Saturday 29 June 2013

Father of java

Top 7 Ways to Avoid Cyber Attacks

Viruses and identity theft are not new issues, but recently,
individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use.

Follow these tips to protect yourself from such an attack so that you won’t be the next victim.
Anyone who uses the internet needs to be aware of basic computer security:

1. Don't click the link If you don't know who sent the email, or if it's not a trusted website, then don't click the link.
Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online.
2. Install Antivirus software Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later.
3. Use strong passwords, most of the population is still using '1234567' or their first name and last name, The problem is that there are about 20 different things that require passwords.
Also reset all your online passwords.
* Never click 'remember my password'.
* Use capitals, lower case, numbers and symbols in passwords. Don't use words in the dictionary.
* Change passwords regularly.
* Password software is good at generating strong passwords but the human brain is the best tool of all.
4. Keep software up to date, this will ensure your software has the latest security upgrades.
Attackers are always thinking up new ways to penetrate security. Don't ignore update notifications.
5. Reconfigure wireless routers, buy a router with secure wireless
encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online.
When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administration panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption.
Reconfiguring routers is easy and something people don't do properly.
Change the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router.
Also, change the default login to a unique password.
6. Encrypt email:
Learn to use email encryption for sensitive documents. Don't send emails such as a child's health resume using Gmail or Hotmail. "There was [the recent case] where a Gmail employee started going through people's email accounts."
7. Use a secure web browser Firefox or Opera are secure web
browsers.
Eliminating internet and computer
use from your life is impossible,
so be sure to practice safe
computing habits to protect
yourself from cyber attacks.

Friday 28 June 2013

Why Should We Use Encrypted Emails ?



We all know that the big corporation people can read each and every one of our emails and we can't do nothing about it. There are huge amount of people that filed cases against Gmail, Yahoo, and Hotmail because they have been reading peoples emails. There is no complete privacy while you send a email or receive one. All the big corporation have bots that look for phrases or words that they want to find more information about. They have this things searching the emails all day.

What should I do?

Well I have made a list of email websites that have their emails encrypted or you can have the words encrypted.

1) HushMail --> it’s one of the most popular. You sign up and you get an account you can send encrypted e-mails from. If the recipient hasn’t an HushMail account it will be asked to respond a secret question you decided. If the answer is correct then he/she will be able to read the email.

2) Enigmail --> it's a free extension to the email client Mozilla Thunderbird. In this case you have to install it and select “encrypt this message” in the writing box. Obviously it’s not necessary to sign up for a new account, you use the one you have already.

3) Lockbin --> it's an online service you can send encrypted emails from. Just click "Start Now" to start composing a new message, and then set a password to protect it. The recipient will receive an email from Lockbin in which he/she will find a link that leads to a Lockbin HTTPS page. In this page he/she will have to type in the password to get the email.

4) Encipher.it --> it's the most quick and simple system that protects emails with Advanced Encryption Standard (AES). It’s a bookmarklet and requires the recipient to have it too.

5) Last but not the least: send a .txt or .doc file in a ZIP/RAR password protected archive as an attachment.

25 People Who Changed the Internet Forever

1. Sir Tim Berners-Lee – World Wide Web
2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.
4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard
Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape

Thursday 27 June 2013

Hacker VS Programmer

1. A hacker beats the system.
A programmer maintains the system.

2. A hacker is trying to get in.
A programmer is trying to stop things getting in.

3. A hacker does things because he believes in them.
A programmer does what he is supposed to.

4. A hacker changes the way things are.
A programmer tries to keep the status quo.

5. A hacker is agile.
A programmer is a small cog in a big slow machine.

6. A hacker has many points of attack.
A programmer has one job.

7. A hacker has to be fast.
A programmer doesn’t.

8. A hacker is self-reliant.
A programmer relies on others.

9. A hacker finds paths that don’t exist.
A programmer guards the old ones that already do.

10. A hacker is about being interesting.
A programmer is about being perfect.

Types of Hackers

1. Black Hat Hackers

Black Hat Hackers that are also referred to as Crackers are people who enter computer systems and networks without any prior authorization. They may be the individuals who break many different reasons forexample thievery, retaliation, showing-off their skills, causing destruction or perhaps any random motive. Black Hat Hackers can be deemed the new criminals in this electronic age. Several federal laws and regulations are already enacted to curb Black Hat Hacking. The IT Act 2000 which can be then several countries have listed out several ways to cope and penalize Black Hat Hackers. Many network security agencies are formed after several hacking cases being reported. These agencies work for planning security policies and actions to protect companies and folks alikefrom getting hacked. 

2. Grey Hat Hackers

Grey Hat Hackers are hackers thathave designed their own good reasons to hack computers and networks. They're like Robin Hoods of today's age. They can be seen as a mixture of White Hatand Black Hat Hackers. Grey Hat Hackers can perform good for some individuals which enables it to even cause damage based on their approach. One example is, Grey Hat Hackers commonly hack sites they will feel is socially bad like adult and gambling sites.Some from these breed of hackers hack systems and networks, find out the weaknesses and loop holes and report them to the particular organizations or owners. This is done exclusively for getting recognition, showing-off or some of their own motives and dreams.

3. White Hat Hackers

White Hate Hackers are the type who are known as ethical hackers. These are the basic oneswho practices values, ethics, abides because of the laws yet still hack! It seems like strange, but yes, that's the actual way it is! This is one way it happens - an ethical hacker is authorized tohack computers or networks andthat he tries his best to hack it. Now the dilemma arises - why? Adistinct respond to that is that unless we have an knowledge of what is insecure in your system or network, we will never manage to protect it. An ethical hacker supplies with vulnerabilities or loop holes from the system or network through extensive usage of various hacking tactics. These weaknesses and faults are then typically fixed through restorativeand preventive measures.

Friday 7 June 2013

HOW TO READ BAR CODES…!(everyonemust know)



ALWAYS READ THE LABELS ON THE FOODS YOU BUY–NO MATTER WHAT THE FRONT OF THE BOX OR PACKAGE SAYS, TURN IT OVER AND

READ THE BACK—CAREFULLY!
With all the food and pet products now coming from China, it is best to make sure you read label at the supermarket and especially when buying food products. Many products no longer show where they were made, only give where the distributor is located. The whole world is concerned about China-made “black-hearted goods”. Can you differentiate which one is made in Taiwan or China ? The world is also concerned about GMO (Genetically Modified Organism) foods; steroid fed animals (ex: 45 days old
broiler chicken). It is important to read the bar code to track its origin. How to read Bar Codes….interesting ! If the first 3 digits of the bar code are 690, 691 or 692, theproduct is MADE IN
CHINA. 471is Made in Taiwan . If the first 3 digits of the barcode are 00-09 then it’s made or sourced in USA. This is our right to know, but the government and related departments never educate the public, therefore we have to RESCUE ourselves. Nowadays, Chinese businessmen know that consumers do not prefer products “MADE IN CHINA”, so they don’t show from which country it is
made. However, you may now refer to the barcode – remember if the first 3 digits are:

890……MADE IN INDIA
690, 691, 692 … then it is
MADE IN CHINA
00 – 09 … USA and CANADA
30 – 37 … FRANCE
40 – 44 … GERMANY
471 …….. Taiwan
49 ………. JAPAN
50 ………. UK

Wednesday 5 June 2013

Create a nameless folder in windows



1. Make a Newfolder on desktop or where ever you want.

2. Right click on this newly created folder and select rename.

3. Erase the text showing "New Folder".

4. Now keep Pressing Alt (i.e alter key) and type 255 . If you are on laptop then you need to enable your Num Lock and type
from the highlighted number keys not from those below function keys.
5. After that leave alt key and Press enter.
6. Done you just created nameless folder.\


Photo: Create a nameless folder in windows

1. Make a Newfolder on desktop or where ever you want.

2. Right click on this newly created folder and select rename.

3. Erase the text showing "New Folder".

4. Now keep Pressing Alt (i.e alter key) and type 255 . If you are on laptop then you need to enable your Num Lock and type
from the highlighted number keys not from those below function keys.
5. After that leave alt key and Press enter.
6. Done you just created nameless folder.

Exercise to Relax body From Computer Stress

Photo: Exercise to Relax body From Computer Stress —

!.......keep sharing.....

Trick to hide files and folders using Command Prompt



Press windowkey+R: Run command dialog box appears.
Now type "cmd" and hit enter. A command prompt window displays.
Now type "attrib +s +h E:\collegephotos" and hit enter.
The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)

(To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')
Photo: Trick to hide files and folders using Command Prompt..

Press windowkey+R: Run command dialog box appears.
Now type "cmd" and hit enter. A command prompt window displays.
Now type "attrib +s +h E:\collegephotos" and hit enter.
The folder "c
ollegephotos" will be hidden (Note: It cannot be viewed by any search options)

(To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')
Enjoy.... !!

How far do you know?

1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

Photo: How far do u know?

1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

- Internet Security

History of caps lock

Photo: History of CAPS LOCK !

Top 25 peoples who changed internet forever

1• Sir Tim Berners Lee – World Wide Web
2• Vint Cerf And Bob Kahn –TCP/IP
3• Larry Page and Sergey Brin – Google Inc.
4• David Filo and Jerry Yang – Yahoo! Inc.
5• Bill Gates – Microsoft
6• Steven Paul Jobs – Apple Inc.
7• Mark Zuckerberg – Facebook
8• Chad Hurley and Steve Chen – YouTube
9• Linus Torvalds – Linux
10• Jack Dorsey – Twitter
11• Kevin Rose – Digg
12• Bram Cohen – Bit Torrent
13• Mike Morhaime – Blizzard Entertainment
14• Jimmy Wales – Wikipedia
15• Jeff Preston Bezos – Amazon
16• Shawn Fanning – Napster, Rupture
17• Pierre Omidyar – eBay
18• Jack Ma – Alibaba
19• Craig Newmark – Craigslist
20• Matt Mullenweg – WordPress
21• Thomas Anderson – MySpace
22• Garrett Camp – Stumble Upon
23• Jon Postel – Internet Pioneer
24• Caterina Fake – Flickr
25• Marc Andreessen – Netscape

PC Errors & Solutions

1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short) Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOS NON-STOP BEEPING Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOSLY Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.

8. POWER LED IS OFF a. Check main power cord b. Check S.M.P.S. c. Check Mother Board connection

9. SHOWING CMOS ERROR Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart) Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE a. Check Power Cord b. Check connection of HDD c. Check Data cable d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY a. Check S.M.P.S b. RAM not functioning properly. c. Software problem (due to using pirated software) d. CPU fan not functioning properly.

13. DANCING SCREEN a. Check Display card connection b. Virus Problem c. Video Memory Problem

14. SHAKING SCREEN a. Earthing problem b. Magnetic waves comes around.

15. CPU CABINET SHOCK a. Check Earthing b. Check main power cord.

16. NON-SYSTEM DISK ERROR a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly. b. Hard Disk Partitions may not be created. c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM The System files missing namely Ie; command.com} - User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set properly. b. Operating system used for formatting is not valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE a. May some Directories or Files crash with other files. b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING a. Unstabilized power supply. b. Check for Loose Contact. c. Do not use Y Connectors for Hard Disk. d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED a. Check Power Connector b. Check Data Cables c. Check Jumpers

24. PARTITION NOT SHOWN Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.

25. MMX/DLL FILE MISSING May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH a. Configure Display Card properly with their CD. b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device. (Every Device requires driver utility to set active


Photo: PC Errors & Solutions

1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short) Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOS NON-STOP BEEPING Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOSLY Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.

8. POWER LED IS OFF a. Check main power cord b. Check S.M.P.S. c. Check Mother Board connection

9. SHOWING CMOS ERROR Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart) Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE a. Check Power Cord b. Check connection of HDD c. Check Data cable d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY a. Check S.M.P.S b. RAM not functioning properly. c. Software problem (due to using pirated software) d. CPU fan not functioning properly.

13. DANCING SCREEN a. Check Display card connection b. Virus Problem c. Video Memory Problem

14. SHAKING SCREEN a. Earthing problem b. Magnetic waves comes around.

15. CPU CABINET SHOCK a. Check Earthing b. Check main power cord.

16. NON-SYSTEM DISK ERROR a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly. b. Hard Disk Partitions may not be created. c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM The System files missing namely Ie; command.com} - User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR 
a. The type of Hard Disk in CMOS may not be set properly. b. Operating system used for formatting is not valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE a. May some Directories or Files crash with other files. b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING a. Unstabilized power supply. b. Check for Loose Contact. c. Do not use Y Connectors for Hard Disk. d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED a. Check Power Connector b. Check Data Cables c. Check Jumpers

24. PARTITION NOT SHOWN Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.

25. MMX/DLL FILE MISSING May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH a. Configure Display Card properly with their CD. b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device. (Every Device requires driver utility to set active

Most of us come across the internet errors, during browsing

Error 400 - Bad request.
Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/DNS Lookup Fail/unknwn host
Error 500-599 - Server Errors.

Collection Of Shortcut Keys For Windows 8 !!!



1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices
7) Windows+I : Settings
Tip: When you’re ready to shut down your computer, use Windows+I and then click or tap the Power button, found on the bottom right.
Windows+Z : Show the App Bar while in any app.
9) Windows+Tab or Alt+Tab : Cycle through open apps.
10) Zoom in and out : Ctrl+- to zoom out and Ctrl++ to zoom in
11) Windows+period : Snap an app to one side of the screen : .
Tip: You’ll find that many of the traditional shortcuts you’ve always used still exist, such as Windows+L to lock and Windows+P to project to another display.
12) Start Screen : Windows Key
13) Right Shift key : If you press it for eight seconds, it turns on Filter Keys. If you press it five times in a row, it turns on Sticky Keys.
14) Ctrl+mouse wheel : When used on the desktop, it changes the size of your desktop icons. When used on the Start screen, it zooms in and out.
15) Ctrl+A : Select all.
16) Win+C : Open the charms.
17) Ctrl+C : Copy.
18) Win+D : Show the desktop.
19) Alt +D : Select the address bar in Internet Explorer.
20) Ctrl+Alt +D : Enable the Docked mode in the Magnifier tool.
21) Win+E : Open File Explorer.
22) Ctrl+E : Select the search box in File Explorer.
23) Win+F : Show Files in the Search charm.
24) Win+Ctrl+F : Open the Find Computers window, which can find computers on a network (used mostly in business networks).
25) Win+G : Cycle through desktop gadgets.
26) Win+H : Open the Share charm.
27) Win+I : Open the Settings charm.
28) Ctrl+Alt +I : Invert colors in the Magnifier tool.
29) Win+J : Switch the focus between snapped apps and larger apps.
30) Win+K : Open the Devices charm.
31) Win+L : Lock the computer and display the Lock screen.
32) Ctrl+Alt +L : Enable Lens mode in the Magnifier tool.
33) Win+M : Minimize all the windows on the desktop.
34) Ctrl+N : Open a new File Explorer window.
35) Ctrl+Shift +N : Create a new folder in File Explorer.
36) Win+O : Change the Lock screen orientation.
37) Win+P : Open the project options for a second screen.
38) Win+Q : Open the Search charm.
39) Win+R : Open the Run window.
40) Ctrl+R : Refresh.
41) Win+T : Set the focus on the taskbar and cycle through the running desktop apps.
42) Win+U : Launch the Ease of Access Center.
43) Win+V : Cycle through notifications.
44) Win+Shift +V : Cycle through notifications in backward order.
45) Ctrl+V : Paste.
46) Win+W : Open Settings in the search charm.
47) Ctrl+W : Close the current window. It works only in desktop apps.
48) Win+X : Open the hidden system menu.
49) Ctrl+X : Cut.
50) Ctrl+Y : Redo.

Photo: Collection Of Shortcut Keys For Windows 8 !!!

1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices
7) Windows+I : Settings
Tip: When you’re ready to shut down your computer, use Windows+I and then click or tap the Power button, found on the bottom right.
Windows+Z : Show the App Bar while in any app.
9) Windows+Tab or Alt+Tab : Cycle through open apps.
10) Zoom in and out : Ctrl+- to zoom out and Ctrl++ to zoom in
11) Windows+period : Snap an app to one side of the screen : .
Tip: You’ll find that many of the traditional shortcuts you’ve always used still exist, such as Windows+L to lock and Windows+P to project to another display.
12) Start Screen : Windows Key
13) Right Shift key : If you press it for eight seconds, it turns on Filter Keys. If you press it five times in a row, it turns on Sticky Keys.
14) Ctrl+mouse wheel : When used on the desktop, it changes the size of your desktop icons. When used on the Start screen, it zooms in and out.
15) Ctrl+A : Select all.
16) Win+C : Open the charms.
17) Ctrl+C : Copy.
18) Win+D : Show the desktop.
19) Alt +D : Select the address bar in Internet Explorer.
20) Ctrl+Alt +D : Enable the Docked mode in the Magnifier tool.
21) Win+E : Open File Explorer.
22) Ctrl+E : Select the search box in File Explorer.
23) Win+F : Show Files in the Search charm.
24) Win+Ctrl+F : Open the Find Computers window, which can find computers on a network (used mostly in business networks).
25) Win+G : Cycle through desktop gadgets.
26) Win+H : Open the Share charm.
27) Win+I : Open the Settings charm.
28) Ctrl+Alt +I : Invert colors in the Magnifier tool.
29) Win+J : Switch the focus between snapped apps and larger apps.
30) Win+K : Open the Devices charm.
31) Win+L : Lock the computer and display the Lock screen.
32) Ctrl+Alt +L : Enable Lens mode in the Magnifier tool.
33) Win+M : Minimize all the windows on the desktop.
34) Ctrl+N : Open a new File Explorer window.
35) Ctrl+Shift +N : Create a new folder in File Explorer.
36) Win+O : Change the Lock screen orientation.
37) Win+P : Open the project options for a second screen.
38) Win+Q : Open the Search charm.
39) Win+R : Open the Run window.
40) Ctrl+R : Refresh.
41) Win+T : Set the focus on the taskbar and cycle through the running desktop apps.
42) Win+U : Launch the Ease of Access Center.
43) Win+V : Cycle through notifications.
44) Win+Shift +V : Cycle through notifications in backward order.
45) Ctrl+V : Paste.
46) Win+W : Open Settings in the search charm.
47) Ctrl+W : Close the current window. It works only in desktop apps.
48) Win+X : Open the hidden system menu.
49) Ctrl+X : Cut.
50) Ctrl+Y : Redo.

ANDROID VERSION HISTORY

ANDROID 4.2 -------------------->JELLY BEAN MR1
ANDROID 4.1, 4.1.1 ------------>JELLY BEAN
ANDROID 4.0.3, 4.0.4----------->ICE CREAM SANDWICH MR1
ANDROID 4.0, 4.0.1, 4.0.2------>ICE CREAM SANDWICH
ANDROID 3.2--------------------->HONEYC ¬OMB MR2
ANDROID 3.1x-------------------->HONEYC ¬OMB MR1
ANDROID 3.0x-------------------->HONEYC ¬OMB
ANDROID 2.3.4, 2.3.3------------>GINGERBREAD MR1
ANDROID 2.3.2, 2.3.1, 2.3------->GINGE ¬RBREAD
ANDROID 2.2x--------------------->FROYO
ANDROID 2.1x-------------------->ECLAIR ¬ MR1
ANDROID 2.0.1------------------->ECLAIR ¬_0_1
ANDROID 2.0--------------------->ECLAIR
ANDROID 1.6--------------------->DONUT
ANDROID 1.5--------------------->CUPCAK ¬E
ANDROID 1.1--------------------->BASE1_ ¬1(PETIT FOUR)
ANDROID 1.0--------------------->BASE

Languages Used....

1. Google – Java (Web), –C (indexing).
2. Facebook – PHP.
3. YouTube- Flash, Python, Java.
4. Yahoo– PHP and Java.
5. MicrosoftLive.com–.NET
6. Baidu – Unknown
7. Wikipedia – PHP
8. Blogger – Java
9. MSN – .NET
10.Twitter – Ruby on Rails, Scala, Java.

Why internet is slow?



At some point in time, everyone experiences a slow or dragging Internet connection. It can be extremely frustrating when browsing the information superhighway at a slow stagger. Rest assured, there are actions that you can take to prevent your Internet connection from slowing down. These elements are standard maintenance and should be performed regularly for the best results. So, I have tried to list down the points which could help you speed up your internet connection .

1. Check Your Connection: It may sound simple, but most Internet slow downs are caused by an incorrect connection to your network or Internet Service Provider. The poor souls who are stuck using dial-up Internet can try to use a different access number that has fewer people trying to connect. Most of the time, using a different access number will speed you up especially during peak Internet traffic hours. If you are using a broadband connection, be sure which network you are using. Many times, your computer will latch on to any available network in your area. You can be connected to the network of your neighbor and not even know it. You could be receiving low signal strength that can really slow down your connection.

2. Secure Your Network: Internet users who make the jump from dial-up to broadband are in such a hurry that they do not think to secure their network router from outside access. Anyone can access an unsecured network if their computer is in range of it by using Wi-Fi. This network sharing method steals your available bandwidth without you ever knowing it. Your router could be giving away free IP addresses to anyone that makes requests. In your router configuration settings, disable network sharing and secure your network with a password or passphrase. This way, anyone who attempts to connect to your network must enter your secret password. If they do not know the password, they cannot steal your connection. This will greatly improve your Internet speed.

3. Clear Your DNS Cache: Each time that your computer makes a request to visit a website, it secretly traces the IP address from the host name. This IP trace may be requested by thousands of users at the same time. Therefore, your local computer creates its own log file for IP address information known as DNS cache. This may not sound like a big deal, but you can easily visit hundreds of websites in a short time. This log data is used by your computer when trying to access a website. Instead of relying on third party DNS servers, your computer searches its own log file. This log file can hold large amounts of data or even become corrupted. Clearing this file often will speed up your Internet connection and keep the log file from becoming a problem.

4. Delete Temporary Files: Your computer stores every byte of information from each website that you visit. This information is stored in temporary data files on your computer for faster access to the websites in the future. The theory is that this method makes pages load faster since the information has already been stored on your computer. While this is true, it can also slow down your Internet connection if you do not delete the files you do not need. Regularly deleting unused temporary files will speed up your Internet connection and save valued storage space on your hard drive.

5. Turn Off Virus Protection [Potentially Harmful]: Modern virus scanning software constantly operates in the background. Most do a fantastic job of scanning files and folders for possible attacks. However, it also is using your bandwidth to send and receive data updates from the software company web server. By simply disabling your virus software while browsing the Internet, your bandwidth will increase and your Internet connection will be faster. When you need a virus protection scan in the future, enable the program for scanning.

Learning how your Internet connection can be misused is the first step to making it faster. Adhering to these tips will keep your Internet connection safe and fast.

World Environment Day

World Environment Day ('WED') is celebrated every year on 5 June to raise global awareness of the need to take positive environmental action. It is run by the United Nations Environment Programme (UNEP).
It was the day that United Nations Conference on the Human Environment began. The United Nations Conference on the Human Environment was from 5–16 June 1972. It was established by the United Nations General Assembly in 1972.[1] The first World Environment Day was in 1973. World Environment Day is hosted every year by a different city with a different theme and is commemorated with an international exposition in the week of 5 June. World Environment Day is in spring in the Northern Hemisphere and fall in the Southern Hemisphere.
"Stockholm was without a doubt the landmark event in the growth of international environmentalism", writes John McCormick in the book Reclaiming Paradise. "It was the first occasion on which the political, social and economic problems of the global environment were discussed at an intergovernmental forum with a view to actually taking corrective action."
World Environment Day is similar to Earth Day

How to disable right click menu in blog and website

How To Disable Right Click On Your Website Or Blog ?

If you own a blog or a website then you always want to prevent other malicious bloggers from copying the content from your blog. You might have written an article with great efforts and lots of research and other just copy/paste it on their blog. To prevent such users from copying content from your blog i will show you Javascript Trick to disable right click on your blog.

1. Got to your blogger Dashboard and then Click on Layout.

2. Now Click on Add Gadget and select Html/Javascript.

3. Now paste code given below in the pop up window.

<!--MBW Code-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function ("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>

4. Save it and done. Now users will not be able to right click on your website.

Photo: How To Disable Right Click On Your Website Or Blog ?

If you own a blog or a website then you always want to prevent other malicious bloggers from copying the content from your blog. You might have written an article with great efforts and lots of research and other just copy/paste it on their blog. To prevent such users from copying content from your blog i will show you Javascript Trick to disable right click on your blog.

1. Got to your blogger Dashboard and then Click on Layout.

2. Now Click on Add Gadget and select Html/Javascript.

 3. Now paste code given below in the pop up window.

<!--MBW Code-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function ("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>

4. Save it and done. Now users will not be able to right click on your website.