Saturday
Types of Cloud Computing
- Public Cloud : A public cloud can be accessed by any subscriber with an internet connection and access to the cloud space.
- Private Cloud: A private cloud is established for a specific group or organization and limits access to just that group.
- Community Cloud : A Community cloud is shared among two or more organizations that have similar cloud requirements.
- Hybrid Cloud : A hybrid cloud is essentially a combination of at least two clouds, where the clouds included are a mixture of public ,private or community.
What is Cloud(Computing) ?
Friday
What is Cloud(Computing) ?
so, Like Emails when you want to access your emails you open your web browser. go to the email client and log in. The most important part of the equation is internet access. no like your physical computer where software installed.
You can use it anywhere .so this is how cloud computing work.little diff instead of accessing just email , you can choose what information you have to access to within the cloud.
Thursday
How to install Telnet in windows 7?
By default, Telnet is not installed with windows , you can install with following steps
- Go to Control Panel and Then Click Programs.
- Under Programs and Features, Click Turn Windows Features On or Off, If you are prompted for an administrator password or confirmation, type the password or proved confirmation.
- In the Windows Features Dialog Box , Select The Telnet Client Check Box.
- Click OK, the installation might take several Minutes.
Wednesday
what is http://
The Hypertext Transfer Protocol(HTTP) is an application protocol for distributed, collaborative,hypermedia information systems.
HTTP is the foundation of data communication for the world wide web.
HTTP functions as a request response protocol in the client server computing model.
In HTTP a browser an example acts as a client, while an application running on a computer hosting a website functions as a server. The client submits an HTTP request message to the server. The server which stores content, or provide resources, such as HTML files, or performs other functions on behalf of the client. returns a response message to the client.
The HTTP protocol is designed to permit intermediate network elements to improve or enable communication between clients and server.
HTTP is an application layer protocol designed within the framework of the internet protocol suite.
More about how Internet work
Tuesday
Window 7 revealed The hidden Truth
How To use hidden International Wallpaper and themes
- In the search box Or RUN , type C:\windows\Globalization\MCT and press Enter (if your windows is installed in C Drive else D,E,F whatever).
- Will show you a list of subfolder like MCT-AU,MCT-CA, MCT-GB etc Each folder has wallpaper for a specific Country.
- For any of the countries whose wallpaper and themes you want to use , then go into its theme folder and click on
- That will install shortcut to the theme and wallpaper in the personalization section of control panel.
Power Efficiency Report in Windows7
How to improve Battery life in laptop
- Run a command prompt as an administrator . To do this Type CMD in the search box and when cmd icon appears, right click it and choose “ run as administrator “.
- Command line Type “ powercfg –energy –output \folder\energy_report.html
Where folder = you want the report to be placed.
after a minute windows 7 will examine the behavior of your laptop. and you will get a report .
follow its recommendations for ways to improve power performance.
How To Run Xp Software in Windows 7
If you have Important software that no longer runs under windows7 Then you Can Use Xp Mode.
A virtual copy of Xp that runs in a window on your windows 7 Desktop.
But Problems is as a Xp mode only works with the system that have Hardware Virtualization (AMD Or Intel VT) Built in and turned on.
If you have Compatible CPU then this may just be matter of enabling the option in your BIOS set up program.
In some high profile Brands (Sony vaio,) Disable the setting for security reasons. and that blocks XP mode from working too.
one solution but It’s little risky as essentially you will have to alter a byte in you laptop firmware and hope this doesn’t have any unexpected side effects.
Don’t blame on me if wrong.
Monday
What is Windows Error Reporting ?
Windows error reporting collects and offers to send post error debug information, using the internet, to the developer of an application that crashes or stops reporting on a user’s desktop. No data is sent without user confirmation.
When a error signature information reaches the Microsoft server ,its is analyzed ant a solution is sent back to the user when one is available.
If windows error reporting itshelf crashes, then an error reports that the original crashed process cannot be sent.
You can view some of Error code (Click) System Error Code
Sunday
Intel Turbo Boost Technology
Intel Turbo boost Technology Provide even more performance when needed on 2nd generation Intel Core processor .
Intel Turbo boost Technology 2.0 is activated when the operating system requests the highest processor performance state P0.
Intel Turbo boost technology depends on the workload and operating environment.(Depend on the number of active cores).
Workload :
- Number of active cores
- Estimate current Consumption.
- Estimate Power consumption.
- Processor Temperature.
when the processor is operating below these limits and the user’s workloads additional performance, the processer frequency will dynamically increase until the upper limit of frequency is reached.
Intel Turbo boost can parallel manage current, power and temperature to maximize performance and energy efficiency.
Source : Intel Turbo boost page
Monday
How to Bypass BIOS Passwords
How to Bypass BIOS Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS
What is BIOS |
DISCLAIMER
Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:
Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.
Bios Password Page |
Backdoor passwords
Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.
WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords
BIOS backdoor passwords:
AMI BIOS backdoor passwords:
Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba
TOSHIBA BIOS
Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot
IBM APTIVA BIOS
Press both mouse buttons repeatedly during the boot
Password cracking software
The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.
Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS
Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings
Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.
Removing the CMOS Battery
The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.
Intel Mother Board DP55SB |
Overloading the Keyboard Buffer
On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.
Jumping the Solder Beads on the CMOS
It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.
Intel Socket 1156 |
Thursday
Intel Original And Chipset Motherboard
A chipset usually contains several controllers that govern how information travels between the processor and other components.
so ,if we think we can
An original motherboard the entire product is manufactured by Intel. the circuit board and the IC’s which are on it.
Which one is better Intel original or Chipset motherboard ?
and chip set ‘it means some other company (mercury,asuas, D-link etc ) has designed and made the circuit board but has used the chipset provided by INTEL.
buying a chipset board is always compromise. some are good but..third party .
In an original motherboard entire products is manufactured by INTEL.Everything.
Intel original and chipset .in Intel chipset Intel makes only PCB and BIOS of the motherboard and gives to SYS,VIA or etc. vendors.
While Intel Original boards are prepared in Intel company will all other accessories
Systemctc Links More About
Tuesday
Useful Dos Commands
COPY Make a copy of file or Merge files together.
COPY original file DESTINATION FILE
where original file and destination file are file name separated by a space.
The command can be used to merge several file into one file like
COPY nj1 + nj2 systemctc
would copy nj1 and nj2 into systemctc
Note : file names used in the command must include the file extension if it exists. so if you were copying a nj.doc you need to include .doc extension in the filename.
DEL : Delete file
DEL filename
Where filename is the name of the file to be deleted.
DIR : Obtain a list of the files stored in a directory
if used without options this command will give a list of files in the current directory.including any extension and size.
if used with the option /P
as DIR /p
the same information will be displayed a page by page with the message.
if DIR/w
the listing is of names and extensions only and in a more compact format across the page.
DISKCOPY Take a security copy of your working disk
more here Free Download
Sunday
Linux ?
Operating system is what makes the hardware work together with the software.
Linux gives you a graphical interface that makes it easy to use your computer, It is only the Kernel that is named LINUX,The rest of the OS are GNU tools. some Variants Distribution Mandrake,SUSE Linux,Gentoo and Redhat .
Linux is made with one thought in mind Everything is a File.
A file is an element of data storage in a file system .File usually stored in hard drives,CD-ROMs and other media. but may also be stored in RAM or links to devices.
Organizing Our files into a system we use Folders. The lowest Possible folder is Root/ where you will find the user homes called /home/
let
/
/home/
/home/nj/
home/pj/
home/dj/
etc.
Files system Lowest folder root/ contains the following folders.
Systemctc Top of Town Now
Secure Computer: How to Bypass BIOS Passwords
Secure Computer: JTAG(Joint Test Action Group)
Secure Computer: Zero Insertion Force (ZIF)
Secure Computer: Hardware Programing ?
Secure Computer: What is Difference Between Bluetooth And NFC
Secure Computer: Windows RegistrySecure Computer: Shell
Secure Computer: Avoiding Virus Infections
Friday
JTAG(Joint Test Action Group)
Except for some of the very lowest end systems, essentially all embedded systems platforms have a JITAG support port in circuit debugging and firmware programming as well as boundary scan testing.
Zero Insertion Force (ZIF)
Its used in the design of IC Sockets and electrical connectors invented to avoid problems caused by applying force upon insertion and extraction.
A normal integrated circuits requires the IC to be pushed into sprung contacts which then grip friction.
Hardware Programming
Hardware Programing ?
For programing a circuit,its is either inserted into a socket often called ZIF. or programmers is directly connected by an adapter to the circuit board. afterward the data is transferred into the circuit by applying signals to the connecting pins.
Some circuits have a serial interface for receiving the programming data called JTAG .other require the data on parallel pins. by a programming pulse with a higher voltage for programming the data into the circuit.
Hardware programing language are
I know some of the are
C/C++
Java
ABEL
AHDL
BLUSPEC
ELLA
HML
HYDRA
LAVA
LOLA
And many more
Tuesday
DSL
Its main advantages over POTS is that it is much faster than analog modems, and it provides a permanent connection.
It allow you to make and receive regular telephone calls while you are connected to the internet.
Its main disadvantages is that its availability is limited by your proximity to the telephone company’s switching equipment.
DSL
IRC(Internet Relay Chat)
You All Are Familiar with The chat Rooms used by certain online Services.IRC is just like a chat room.
Thursday
What is Difference Between Bluetooth And NFC
- NFC and Bluetooth and NFC are both short range communication technologies
- NFC operate at slower speed than Bluetooth but consumes far less power and doesn’t require pairing.
- NFC sets up faster than standard Bluetooth.But is not faster than Bluetooth low energy.
- With NFC Two devices connect automatically.Less than a ten’s of second.
- Data Transfer rate (424 Kbit/s) slower than Bluetooth V2.1(2.1 Mbit/s) with maximum data transfer of less than 20 cm.
- NFC has short range (sometime its user becomes difficult in crowded areas)
What is NFC ?
lalalaaa ETC
Difference Between NFC and Bluetooth
What is NFC ?
NFC (Near Field Communication ) Allows for simplified Transactions,Data Exchange and wireless Connections Between Two Devices in proximity to each other,But not more than Few Centimeter.
- Tab one NFC Device to another to instantly share a contact,photo,songs, etc.
- Tap one NFC device to another to instantly share Electronic business cards or resumes
- To pay a friend, your could tap the devices and enter the amount of the payment.
- You can play a game with another NFC device(multiplayer game).
NFC can be used to high-speed wireless connection for expanded content sharing.
- Instant Bluetooth Pairing can save searching, waiting and entering codes,Touch the NFC devices togher for instant pairing.
- instant Wi-Fi configuration can configure a device to a wifi network automatically .Just Tap a NFC device to an NFC Enabled router.
What more NFC Can do ?
- Mobile Payment
- PayPal
- Ticketing
- Boarding Pass.
- Point of sale
- Coupons
- Tour Guide.
- ID Cards.
- Keycard.
- Rental Car and Hotel Keys.
ETC.