Secure Computer: Types of Cloud Computing

Secure Computer: Types of Cloud Computing

Types of Cloud Computing

There are different types of clouds ,as a home user or small business owner ,mostly use public cloud services.

cloud computing

  • Public Cloud : A public cloud can be accessed by any subscriber with an internet connection and access to the cloud space.
  • Private Cloud: A private cloud is established for a specific group or organization and limits access to just that group.
  • Community Cloud : A Community cloud is shared among two or more organizations that have similar cloud requirements.
  • Hybrid Cloud : A hybrid cloud is essentially a combination of at least two clouds, where the clouds included are a mixture of public ,private or community.

What is Cloud(Computing) ?


Secure Computer: What is Cloud(Computing) ?

What is Cloud(Computing) ?

What is Cloud(Computing) ?

 Every on know Emails . Provider Gmail, yahoo,etc. where Cloud Computing is subscription based service where you can obtain network storage space and computer resources.

cloud computing
so, Like Emails when you want to access your emails you open your web browser. go to the email client and log in. The most important part of the equation is internet access.  no like your physical computer where software installed.
You can use it anywhere .so this is how cloud computing work.little diff instead of accessing just email , you can choose what information you have to access to within the cloud.


How to install Telnet in windows 7?

How to Install Telnet in Windows 7
By default, Telnet is not installed with windows , you can install with following steps


  • Go to Control Panel and Then Click Programs.
  • Under Programs and Features, Click Turn Windows Features On or Off, If you are prompted for an administrator password or confirmation, type the password or proved confirmation.
  • In the Windows Features Dialog Box , Select The Telnet Client Check Box.
  • Click OK, the installation might take several Minutes.
if you are using windows server 2008 R2 , you should use server manager to install telnet.
What is Cloud(Computing) ?


Secure Computer: Web Application Problems

Web Application Problems

Secure Computer: Ethical Hacking

Ethical Hacking

Secure Computer: Beep Codes

Secure Computer: What is Bandwidth ?

What is Bandwidth ?

Secure Computer: What is Bandwidth ?

What is Bandwidth ?

Secure Computer: How to rip Dynamic Flash Template

How to rip Dynamic Flash Template

Secure Computer: Reasons Why Computer Crash

Secure Computer: Secure your Web Experience

Secure Computer

Secure Computer

Secure Computer: Zero Insertion Force (ZIF)

Secure Computer: Zero Insertion Force (ZIF)

Secure Computer: what is http://

Secure Computer: what is http://

Secure Computer: Window 7 revealed The hidden Truth

Secure Computer: Window 7 revealed The hidden Truth

what is http://

The Hypertext Transfer Protocol(HTTP) is an application protocol for distributed, collaborative,hypermedia information systems.


HTTP is the foundation of data communication for the world wide web.


HTTP functions as a request response protocol in the client server computing model.

In HTTP a browser an example acts as a client, while an application running on a computer hosting a website functions as a server. The client submits an HTTP request message to the server. The server which stores content, or provide resources, such as HTML files, or performs other functions on behalf of the client. returns a response message to the client.



The HTTP protocol is designed to permit intermediate network elements to improve or enable communication between clients and server.


HTTP is an application layer protocol designed within the framework of the internet protocol suite.


More about how  Internet work

TCP/IP models


Window 7 revealed The hidden Truth

How To use hidden International Wallpaper and themes


  • In the search box Or RUN , type   C:\windows\Globalization\MCT and press Enter (if your windows is installed in  C Drive else D,E,F whatever).
  • Will show you a list of subfolder like MCT-AU,MCT-CA, MCT-GB etc Each folder has wallpaper for a specific Country.
  • For any of the countries whose wallpaper and themes you want to use , then go into its theme folder  and click on
  • That will install shortcut to the theme and wallpaper in the personalization section of control panel.


Power Efficiency Report in Windows7

How to improve Battery life in laptop

  • Run a command prompt as an administrator . To do this Type CMD in the search box and when cmd icon appears, right click it and choose “ run as administrator “.
  • Command line Type “ powercfg –energy –output \folder\energy_report.html

Where folder = you want the report to be placed.

after a minute windows 7 will examine the behavior of your laptop. and you will get a report .


follow its recommendations for ways to improve power performance.

How To Run Xp Software in Windows 7

If you have Important software that no longer runs under windows7 Then you Can Use Xp Mode. 

A virtual copy of Xp that runs in a window on your windows 7 Desktop.


But Problems is  as a Xp mode only works with the system that have Hardware Virtualization (AMD Or Intel VT) Built in and turned on.


If you have Compatible CPU then this may just be matter of enabling the option in your  BIOS set up program.


In some high profile Brands (Sony vaio,) Disable the setting for security reasons. and that blocks XP mode from working too.


one solution but It’s little risky as essentially you will have to alter a byte in you laptop firmware and hope this doesn’t have any unexpected side effects.


Don’t blame on me if wrong.

How To Run xp Software in Windows 7


What is Windows Error Reporting ?

Windows Error Reporting (WER) is a crash reporting technology introduced by Microsoft with windows XP.
Windows error reporting collects and offers to send post error debug information, using the internet, to the developer of an application that crashes or stops reporting on a user’s desktop. No data is sent without user confirmation.

When a error signature  information reaches the Microsoft server ,its is analyzed ant a solution is sent back to the user when one is available.

If windows error reporting itshelf crashes, then an error reports that the original crashed process cannot be sent.

windows error reporing

You can view some of Error code (Click) System Error Code


Intel Turbo Boost Technology

Intel Turbo boost Technology Provide even more performance when needed on 2nd generation Intel Core processor .

Intel Turbo boost  Technology 2.0 is activated when the operating system requests the highest processor performance state P0.

Intel Turbo boost technology depends on the workload and operating environment.(Depend on the number of active cores).


Workload :


  • Number of active cores
  • Estimate current Consumption.
  • Estimate Power consumption.
  • Processor Temperature.


when the processor is operating below these limits and the user’s workloads additional performance, the processer frequency will dynamically increase until the upper  limit of frequency is reached.

Intel Turbo boost can parallel manage current, power and temperature to maximize performance and energy efficiency.


Source : Intel Turbo boost page




Bluetooth and NFC


How to Bypass BIOS Passwords

How to Bypass BIOS Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS
What is BIOS

This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.

Kabhi Kabhi Aditi ZindagiBefore attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

Bios Password Page

Backdoor passwords
Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

BIOS backdoor passwords:

589589 589721 595595 598598

AMI BIOS backdoor passwords:


PHOENIX BIOS backdoor passwords:



ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj


Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
Siemens SKY_FOX
Toshiba Toshiba


Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot


Press both mouse buttons repeatedly during the boot

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.

Intel DP55KG Extreme Series Desktop Motherboard (P55 ATX Core i7 Core i5 LGA1156)
Intel Mother Board DP55SB

Overloading the Keyboard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.

Intel Socket 1156/Intel H55/DDR3/A&GbE/ATX Motherboard, Retail BOXDH55HC
Intel Socket 1156

Click here to start trading with HY Markets


Intel Original And Chipset Motherboard

A chip set is a group of integrated circuits that can be used together to serve a single function.
A chipset usually contains several controllers that govern how information travels between the processor and other components.

so ,if we think we can
Intel DP55WG 1
An original motherboard the entire product is manufactured by Intel. the circuit board and the IC’s which are on it.
Which one is better Intel original or Chipset motherboard ?
and chip set ‘it means some other company (mercury,asuas, D-link  etc ) has designed and made the circuit board but has used the chipset provided by INTEL.
buying a chipset board is always compromise. some are good but..third party .

In an original motherboard entire products is manufactured by INTEL.Everything.

Intel original and chipset .in Intel chipset Intel makes only PCB and BIOS of the motherboard and gives to SYS,VIA or etc. vendors.
While Intel Original boards are prepared in Intel company will all other accessories

Systemctc Links More About


Useful Dos Commands

COPY    Make a copy of file or Merge files together.

                COPY original file DESTINATION FILE

    where original file and destination file are file name separated by a space.

     The command can be used to merge several file into one file like

       COPY nj1 + nj2 systemctc

       would copy nj1 and nj2 into systemctc

               Note : file names used in the command must  include the file extension if it exists. so if you were copying a nj.doc you need to include .doc extension in the filename.




DEL :   Delete file



            DEL  filename


           Where filename is the name of the file to be deleted.

DIR :   Obtain a list of the files stored in a directory

             if used without options this command will give a list of files in the current directory.including any extension and size.

           if used with the option /P



                 as  DIR /p

                 the same information will be displayed a page by page with the message.


                 if     DIR/w

                   the listing is of names and extensions only and in a more compact format across the page.


DISKCOPY      Take a security copy of your working disk


more here Free Download


Free Dos Commands E book

Fee Doc commands pdf


Linux ?

So, Linux is Operating system , Simple just like Dos,windows OS X   and Etc.
Operating system is what makes the hardware work together with the software.

Linux gives you a graphical interface that makes it easy to use your computer, It is only the Kernel that is named LINUX,The rest of the OS are GNU tools. some Variants Distribution  Mandrake,SUSE Linux,Gentoo and Redhat .

Linux is made with one thought in mind Everything is a File.
A file is an element of data storage in a file system .File usually stored in hard drives,CD-ROMs and other media. but may also be stored in RAM or links to devices.

linux logo
Organizing Our files into a system we use Folders. The lowest Possible folder is Root/ where you will find the user homes called /home/


Files system Lowest folder root/ contains the following folders.

/bin          Essential user command binaries (for use by all users)

/boot       Static files of the boot loader,only used at system startup.

/dev         Device files,links to your hardware \nj\sound\,       /nj/input/js0(joystic).

/etc          Host specific system configuration.

/home    user home directories.Your personal files.

/lib         Essentail shared libraries and kernel modules.

/mnt     mount point for a temporarily mounted file system like      /mnt/cdrom

/opt       add on software pakages

The only folder a normal user need to use is /home/nj/  ……. this is where you keeping all your files/documents.


/home/nj/Music/Michal Jackson

Files are case sensitive ,   if  “myMusic” and   “Mymusic” are two different files

More soon , Thank you for visit .

Systemctc Top of Town Now


JTAG(Joint Test Action Group)

JTAG is used for IC debug ports. All modern processors support JTAG  when they have enough pins. Perform operation like single stepping and break pointing..

Except for some of the very lowest end systems, essentially all embedded systems platforms have a JITAG support port in circuit debugging and firmware programming as well as boundary scan testing.

Zero Insertion Force (ZIF)

Its used in the design of IC Sockets and electrical connectors invented to avoid problems caused by applying force upon insertion and extraction.

A normal integrated circuits requires the IC to be pushed into sprung contacts which then grip friction.
Hardware Programming

Hardware Programing ?

Well , Everyone know Hardware ,but you know that hardware is group of EPROM,EEPROM,Flashs,PAL,FPGA ,or programmable logic circuits all are non volatile .called hardware.

For programing a circuit,its is either inserted into a socket often called ZIF. or programmers is directly connected by an adapter to the circuit board. afterward the data is transferred into the  circuit by applying signals to the connecting pins.

Some circuits have a serial interface for receiving the programming data called JTAG .other require the data on parallel pins. by a programming pulse with a higher voltage for  programming the data into the circuit.
Hardware programing language are
I know some of the are
        And many more



Digital Subscriber Line is a method of sending large amounts of information over the wires that already exist for the pots.
Its main advantages over POTS is that it is much faster than analog modems, and it provides a permanent connection.

It allow you to make and receive regular telephone calls while you are connected to the internet.
Its main disadvantages is that its availability is limited by your proximity to the telephone company’s switching equipment.

Technorati Tags:

IRC(Internet Relay Chat)

Imagine you Can chat with Your Friend on Facebook.That’s it . Internet Relay Chat is where the unregulated nature of the internet is most clearly Expressed.

You All Are Familiar with The chat Rooms used by certain online Services.IRC is just like a chat room.
Technorati Tags: ,


What is Difference Between Bluetooth And NFC

  • NFC and Bluetooth and NFC are both short range communication technologies
  • NFC operate at slower speed than Bluetooth but consumes far less power and doesn’t  require pairing.
  • NFC sets up faster than standard Bluetooth.But is not faster than Bluetooth low energy.
  • With NFC Two devices connect automatically.Less than a ten’s of second.
  • Data Transfer rate (424 Kbit/s) slower than Bluetooth V2.1(2.1 Mbit/s) with maximum data transfer of less than 20 cm.
  • NFC has short range (sometime its user becomes difficult in crowded areas)

What is NFC ?
lalalaaa ETC
Difference Between NFC and Bluetooth
Technorati Tags:

What is NFC ?

NFC (Near Field Communication ) Allows for simplified Transactions,Data Exchange and wireless Connections Between Two Devices in proximity to each other,But not more than Few Centimeter.

  • Tab one NFC Device to another to instantly share a contact,photo,songs, etc.
  • Tap one NFC device to another to instantly share Electronic business cards or resumes
  • To pay a friend, your could tap the devices and enter the amount of the payment.
  • You can play a game with another NFC device(multiplayer game).

NFC can be used to high-speed wireless connection for expanded content sharing.

  • Instant Bluetooth Pairing can save searching, waiting and entering codes,Touch the NFC devices togher for instant pairing.
  • instant Wi-Fi configuration can configure a  device to a wifi network automatically .Just Tap a NFC device to an NFC Enabled router.

What more NFC Can do ?
  • Mobile Payment
  • PayPal
  • Ticketing
  • Boarding Pass.
  • Point of sale
  • Coupons
  • Tour Guide.
  • ID Cards.
  • Keycard.
  • Rental Car and Hotel Keys.



Wolf - 150 x 150