Friday, December 27, 2013

HOW TO FIND SERIAL KEYS FROM GOOGLE

0 comments
steps:-

1) go to google.com

2) write the name of the software you want key and add 94FBR at the end
   Eg :- if you want to find key of IDM then write " IDM 94FBR " (without quotes)

3) search it and you will find many sites with serial keys of that softwares

DONE !!!!




You like the Post?  Then Please Share it...




Thursday, December 26, 2013

How to Hide Folders

0 comments
These tricks have more benifit..and they are consists:
> non deletable folder
> non moveable
> non renameable
> folder size will be zero (after conversion)
> folder file will be zero

following these steps...
step 1. open cmd just press CTL+R and write cmd hit enter
step 2.commond the folder location
step3.write these codes..
"cacls folder name /e /p everyone:n" (for hide)
hit enterand see folder size
folder size will be se 0 bytes

for unhide and restore file
just press these code same as.....
"cacls folder name /e /p everyone::f" (for unhide)






You like the Post?  Then Please Share it...





Tuesday, December 24, 2013

12 Type Of Servers And What They Do

0 comments
1. Real-Time Communication Servers
Also known as chat servers or IRC, and sometimes known as instant messaging (IM) servers, these servers are meant to allow huge number users to exchange information instantly.

2. FTP Servers
This is one of the oldest of the Internet services available. The FTP or File Transfer Protocol allows the users to securely transfer one or more files of any size between two computers.

3. Collaboration Servers
In many ways, collaboration software, once called 'groupware,' demonstrates the original power of the Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet or a
corporate intranet and to work together in a virtual atmosphere.

4. List Servers
List servers lets users better manage their mass mailing lists like open interactive discussions or one-way lists to deliver newsletters, announcements or advertising.

5. Telnet Servers
The Telnet server lets the users on to a host computer control and work on remote computers.

6. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP.

7. Virtual Servers
A virtual server is a web server which shares its resources with multiple users. It's another way of saying that multiple web sites share the resources of one server.

8. Proxy Servers
Proxy server is a server which acts as an intermediary for requests between the users and the servers. Client connects to the proxy server and the proxy server evaluates the requests sent by the users simplifies them and control their complexities.

9. Mail Servers
Mail servers help in moving and storing the e- mail over a network via LANs and WANs or across the Internet.

10. Server Platforms
Normally used in same context with that of operating systems, server platforms are the platforms that are under the hardware or software of a system and the hence in the engine that drives the server.

11. Open Source Servers
Similar to server platforms, Open source server are referred to the  underlying open source operating system used in the IT infrastructures of the companies.

12. Application Servers
Application servers are a type of middleware which connects the database servers and the app users.





You like the Post?  Then Please Share it...




Monday, December 23, 2013

How to see the Facebook profile picture of the stranger who has put privacy=="friends" on their picture

0 comments
Today i'll show you how u can easily see the full screen of the image which  is protected from other persons on facebook other than friends..!!


just follow these steps..!

1. right click on the image and then click on ""copy image url"".

2.open a new tab and then paste the image url into the address bar..!!

3. remove the "s160x160/" part from the url and hit enter..!


now u are done..!!
enjoy the full screen sight of the image..!!





You like the Post?  Then Please Share it...




Full names of 10 famous companies

0 comments
DHL - Dalsey Hillblom Lynn

IBM - International Business Machines

TLC - The Learning Channel\

FIAT - Fabbrica Italiana AutomobiliTorin o

HMV - His Master's Voice

TCS - Tata Consultancy Services

SAP - System Analysis and Program

Amul - Anand Milk Union Limited

IKEA - Ingvar Kamprad Elmtaryd Agunnaryd

HTC - High Tech Computer






You like the Post?  Then Please Share it...




Easy way to disable USB port

0 comments
1. Goto run

2. Type 'regedit' without quotes

3. Click on HKEY_LOCAL_MACHINE

4. goto SYSTEM

5. Click on CurrentControlSet

6. Click on services

7. Goto USBSTOR

8. Double click on 'Start' where value is 3

9. Now change the value data with 4

10. Now press ok and refresh your desktop


your USB port is disabled, to enable the usb port
replace the value 4 with 3.





You like the Post?  Then Please Share it...




Sunday, December 22, 2013

System Security For User

0 comments
1. Always use a strong password with a combination of alphabets, numbers and special characters.

2. Use Original Antivirus. Don't download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you don't use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a backup of your important files to a Hard disk or Online Servers ( like Dropbox )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.





You like the Post?  Then Please Share it...