Thursday, July 28, 2011

Increase your RAM and so system speed -SBX


1). Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don’t use the Minimize All Windows option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won’t be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

How 2 detect HIDDEN CAMERA


How 2 detect HIDDEN CAMERA in trial rooms
in malls ,showrooms etc.
In front of d trial room , take Ur mob & make
sure that d mob can make call.
Then enter into d trial room & make a call . If
u can't make a call , there is HIDDEN CAMERA .
This is due 2 interference of FIBER OPTIC
during signal transfer .
Plz tell 2 all girls 2 save them & even 2 boys 2
save their sis/frndz/family..As a Human , I hv
done my part..

Wednesday, July 27, 2011

Facebook Top Spot In U.S. Display


Facebook's U.S. advertising revenue will total roughly $2.2 billion in 2011, displacing Yahoo Inc to collect the biggest slice of online display advertising dollars, according to a new study.
Facebook's U.S. advertising revenue will give it a 17.7 percent share of the market for graphical display ads that appear on websites, according to a report released on Monday by research firm eMarketer.
Last year Facebook had 12.2 percent share of the U.S. market.
The figures underscore the growing clout of Facebook, the world's No.1 Internet social network. It has seen its valuation soar to roughly $80 billion in recent transactions for its shares on the private markets and some investors anticipate it could have an initial public offering next year.
While Facebook has grabbed the top ranking, eMarketer analyst David Hallerman said the overall market for display ads, which include banner ads, video ads and Web page sponsorships, is growing robustly enough that it is benefiting numerous companies.
"It's not a zero sum game," said Hallerman, noting that the display advertising market is experiencing rapid growth as both big international brands and small, local businesses increasingly turn to the Web to reach consumers.
Internet companies such as Yahoo, Google Inc and Microsoft Corp are competing for those advertising budgets, while new players such as online coupon company Groupon are offering marketers alternatives to traditional online display ads.
Web portal Yahoo will grow its online display business in the U.S. by 13.6 percent this year, eMarketer said. But that will lag the overall U.S. display market's growth rate of 24.5 percent.
Google's revenue from U.S. display ads will total $1.15 billion in 2011, up 34.4 percent year-over-year.

Samsung Launches New Galaxy iPad

South Korea's Samsung Electronics Co launched an upgraded version of its Galaxy tablet in its lucrative home market on Wednesday, seeking to stem the runaway success of Apple Inc's iPad.
The Galaxy Tab 10.1, the sequel of the 7-inch Tab introduced in October, is the latest push by the company to challenge the iPad. Apple's iPad sold 14 million units in the first half of this year, compared with analysts' sales estimates of about 7.5 million for the Tab for 2011, the iPad's biggest competitor.
"As our smartphone business grew very fast within a very short period of time, I believe it's just a matter of time for our tablet business to improve," J.K. Shin, head of Samsung' mobile division, told reporters.
Samsung has emerged as Apple's nearest rival in the booming mobile device industry as it leverages its cost competitiveness and access to chips and core tablet components.
It has sharply narrowed the gap with Apple in the smartphone market, but however remains a distant second in the tablet market, which Garner forecasts will surge to 108 million devices next year from an estimated 70 million in 2011.
The sale of the Tab in Korea is Samsung's fifth global launch after its U.S. debut a month ago and its sales kickoff in Indonesia, where the company says it commands a 65 percent market share. It has also launched the device in Italy and Sweden.
Pricing for the new product, slightly thinner and lighter than iPad 2, starts from $500 in the U.S. market, the same price as the iPad 2.
Blockbuster sales of the iPhone, iPad and strong Asian business again helped Apple crush Wall Street's expectations for its third-quarter results on Tuesday. Apple said concern over iPad 2 supply constraints eased and demand was still overstripping supply in some markets.
Samsung reiterated on Wednesday it aimed to boost tablet sales by more than five fold this year. It didn't provide specific numbers but analysts expect the company to have sold about 1.5 million units last year.



Monday, July 25, 2011

Certified Professional Hacker NxG


Certified Professional Hacker NxG
The Certified Professional Hacker NxG is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, web applications and actual exploitation. Here are top 5 reasons why the CPH NxG is the ideal choice in comparison to other ethical hacking courses.
  1. Training executed completely by practitioners and led by our Principal Consultant and well-renowned information security expert – K. K. Mookhey
  2. Coverage of the latest trends in information security – Advanced Persistent Threats, SCADA Hacking(analysis of Stuxnet), and Mobile Hacking
  3. Heavy focus on practical aspects and usage of tools and toolkits such as Backtrack, Metasploit, Burp Suite, Kismet, Air-crack Ng,
  4. Case studies and real-life examples to explain key concepts
  5. The entire training program is designed by our Principal Consultant Mr. K K Mookhey, and we can assure you that it is aimed specifically to make you an expert in ethical hacking and a much sought-after security analyst.
Why should you attend this course?
You've heard of courses that claim to make you an ethical hacker, but what's the definition of a 'hacker'? A 'hacker' is someone who goes into the depths of any system, and tries to understand how things actually work, not just someone who runs a bunch of scripts from the Internet to try and break into systems.

One of the greatest USPs of the CPH course is that it is built by experts who do penetration testing on a regular basis. Led by K. K. Mookhey, who is the founder of one of India's leading information security firms - Network Intelligence. He has authored books on Linux Security and Metasploit Framework, and numerous articles on securityfocus.com, and other sites. He has presented at prestigious conferences such as Blackhat USA, Interop, IT Underground, and others. Read hisfull profile here.
Also, since it is built by practitioners in the field, it also happens to be regularly updated with the latest tools, techniques, and real-world scenarios.

In fact, the lab setup for the course itself is the single-most important reason to attend the course. Where else can you actually launch attacks, see the packet flows, analyze them, tweak your attacks, and get to break into systems that have been set up to create levels of challenges and hone your skills.
Who should attend this course?
Anyone looking to build a career in information security, or if you're someone who's already in this field, but want to learn the professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with a huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking.
What is the CPH NxG Mailing List?
The CPH Mailing List is a members-only, by-invitation mailing list, where all Certified Professional Hackers discuss the latest happenings in the information security world, and exchange news about tools and techniques. Membership to this list is available only to those members who successfully complete the CPH course and clear the test.
How do I get certified?
On the 5th day of the training, there will be a 60 question multiple-choice test. You may refer to the notes during the test. Scoring more than 60% on the test and practical exam assures you of the CPH NxG certificate.

Course Contents
Session One: Getting the basics right
  • Module 1: TCP/IP Fundamentals
  • Module 2: Operating System Fundamentals
  • Module 3: Web Application & Database Fundamentals
  • Module 4: Introduction to Ethical Hacking
  • Module 5: Advanced Persistent Threats
Session Two - Network Cartography
  • Module 6: Footprinting
  • Module 7: Advanced Google Hacking
  • Module 8: Nmapping the network
  • Module 9: Fingerprinting
Session Three - Exploitation
  • Module 10: Hacking networks
  • Module 11: Hacking servers
  • Module 12: Hacking databases
  • Module 13: Password Cracking – Online, Offline Attacks
Session Four - Advanced Exploitation
  • Module 14: Hacking WLANs
  • Module 15: Evading IDS, Firewalls
  • Module 16: Web Application Hacking
  • Module 17: Advanced Web Hacking
  • Module 18: Hacking Web Browsers (Firefox, IE)
Session Five - Black-belt Hacking
  • Module 19: Buffer overflows
  • Module 20: Metasploiting the universe
  • Module 21: Reverse Engineering
  • Module 22: Covert Hacking
Session Six - Social Engineering
  • Module 23: What is Social Engineering?
  • Module 24: Common Types of Attacks
  • Module 25: Online Social Engineering
Session Seven - Cryptography

  • Module 26: Introduction to Cryptography
  • Module 27: Encryption and Decryption
  • Module 28: Cryptographic Algorithms
  • Module 29: Digital Signature
  • Module 30: Cryptography Tools
  • Module 31: Cryptography Attacks
Session Eight - Honeypots
  • Module 32: What is a Honeypot?
  • Module 33: The Honeynet Project
  • Module 34: Types of Honeypots
  • Module 35: Detecting Honey Pots
Session Nine - Esoteric Hacking
  • Module 36: Hacking Mobile Phones, PDA and Handheld Devices
  • Module 37: SCADA Hacking – Stuxnet Analysis
  • Module 38: Cloud Security Hacking
  • Module 39: VoIP Hacking
  • Module 40: Botnets & Backdooring
Session Ten - Real World Hacking
  • Module 41: Web-Shell Upload
  • Module 42: Pass-The-Hash
  • Module 43: Token Impersonation
  • Module 44: Xp_cmdshell
  • Module 45: BlindSQL version enumeration
  • Module 46: LFI to RCE attacks
Session Eleven - Introduction to Digital Forensics

Saturday, July 23, 2011

Computer motherboard drivers


Computer tips

Computer motherboard drivers

ReferenceIssue / Question
CH000236Additional information and help with BIOS updates.
CH000504How do I find what computer motherboard I have?
CH000550How do I find the computer controller I have?
CH000634How do I find the computer motherboard chipset?
CH000834How do I install a computer driver?
Chipset companyInformationDrivers page
ALiCurrently none listedALi chipset drivers
AMDCurrently none listedAMD chipset drivers
IntelCurrently none listedIntel chipset drivers
NVidiaCurrently none listedNVidia chipset drivers
SiSCurrently none listedSiS chipset drivers
VIACurrently none listedVIA chipset drivers
Motherboard companyInformationDrivers / BIOS page
AbitCurrently none listedAbit downloads
AcerCurrently none listedAcer downloads
AlbatronCurrently none listedAlbatron downloads
AOpenCurrently none listedAOpen downloads
AsrockCurrently none listedAsrock downloads
AsusCurrently none listedAsus downloads
BiostarCurrently none listedBiostar downloads
ChaintechCurrently none listedChaintech downloads
DFICurrently none listedDFI downloads
ECSCurrently none listedECS downloads
EpoxCurrently none listedEpox downloads
FICCurrently none listedFIC downloads
GemlightCurrently none listedGemlight downloads
General StandardsCurrently none listedGeneral Standards downloads
GigabyteCurrently none listedGigabyte downloads
IntelCurrently none listedIntel downloads
IwillCurrently none listedIwill downloads
LeadtekCurrently none listedLeadtek downloads
MatsonicCurrently none listedMatsonic downloads
Micro-StarCurrently none listedMicro-star downloads
MSICurrently none listedMSI downloads
PC ChipsCurrently none listedPC Chips downloads
Sapphire TechnologyCurrently none listedSapphire Technology downloads
SBS Bit 3Currently none listedSBS Bit 3 downloads
SBS TechnologiesCurrently none listedSBS Technologies downloads
ShuttleCurrently none listedShuttle downloads
SoltekCurrently none listedSoltek downloads
SoyoCurrently none listedSoyo downloads
SupermicroCurrently none listedSupermicro downloads
TyanCurrently none listedTyan downloads
XFXCurrently none listedXFX downloads

Why is the hard disk drive the C: drive?


Computer tips

Question

Why is the hard disk drive the C: drive?

Answer

On IBM compatible computers running a Microsoft operating systemsuch as Windows or MS-DOS, the default hard disk drive is the C: drive because it is the first available drive letter for hard disk drives. The computer assigns the A: and B: drives to floppy disks and sometimes other removable media such as tape drives. As you install other hard disk drives, create new partitions, and add other drives such as CD-ROM or DVD drives, they will be assigned to other drive letters after C, such as D, E, F, G, etc.
For example, most computers today come with a floppy disk drive, hard disk drive, and CD-ROM drive or CD-R / DVD drive. With this commonconfiguration, your floppy disk drive would be assigned to the A: drive, your hard disk drive would be assigned to the C: drive, and your CD or DVD drive would be assigned to the D: drive.

How to recover missing, lost, or deleted files.


Computer tips


Issue

How to recover missing, lost, or deleted files.

Cause

Lost files can occur because of any of the below possibilities.
  1. File was mistakenly deleted.
  2. File was corrupt and deleted by scandisk.
  3. Another program deleted the file.
  4. File is password protected.

Solution

Before reviewing the below recommendations and suggestions, verify that the files have actually been deleted; in some cases the files may have been moved. You can search the hard disk drive for the files you believe to be missing by running find or search on the computer.

Recover file from backup
If the file has been backed up to floppy disk or other medium it is recommended that the file be restored from that backup if the file cannot be found.

Restore from Recycling Bin or Trash
If you are running Apple MacOS, Microsoft Windows 95, NT, 98, 2000, ME, XP, Vista, or later operating system and the file has been recently deleted it is possible that the file may still be in the Trash or Recycle Bin. If present within this area it can be recovered.
Download freeware program or purchase a program
Below is a list of freeware file recovery programs that can be used freely to recover lost data.
  1. PC Inspector File Recover
  2. Restoration
  3. Recuva
  4. Undelete Plus
  5. FreeUndelete
  6. Photorec
In addition to the above freeware programs there are also several companies who have created programs designed to recover your lost data. For example, PowerQuest makes the utility Drive Imagethat in some cases can be used to recover data from a hard drive.

Utilize a service from a company that specializes in recovering lost data
Utilize the service of a local data recovery company or an out of state data recovery company. One word of caution is that these services can sometimes be very expensive. It is only recommended they be used if the data is extremely important. Below is a listing of a few major data recovery companies.
  1. Action Front Data Recovery
  2. CBL Data Recovery Technologies Inc.
  3. Doctor Byte
  4. DriveSavers Data Recovery
  5. Lazarus Data Recovery
  6. Ontrack
  7. Virtual Data Recovery
  8. Stellar Data Recovery
  9. DataCent Professional Data Recovery
There are also several companies that specialize in the service of recovering files or documents that are password protected. Below is a listing of some of the companies that provide this service.
  1. Passwordcrackers
  2. Passwordservices.com
  3. Password Recovery software

My computer is running slow what steps can I do to fix it?


Computer tips


Issue

My computer is running slow what steps can I do to fix it?

Cause

Slow computerThis issue can be caused by any of the below possibilities.
  1. Not enough hard disk space.
  2. Left over programs and bad files.
  3. Data Corruption.
  4. Missing Windows updates / Outdated drivers.
  5. Computer is overheating.
  6. Corrupt OS.
  7. Bad Hardware.

Solution

Below are steps for Microsoft Windows users that should help speed up the computer or determine why the computer is running slow.
Reboot
If your computer has not been reboot recently make sure to reboot it before following any of the below steps.
Not enough hard disk drive space
Verify that there is at least 200-500MB of free hard disk drive space. This available space allows the computer to have room for the swap file to increase in size as well as room for temporary files.
Hard drive corrupted or fragmented
  • Run ScanDisk or something equivalent to verify there is nothing physically wrong with the computer hard disk drive.
  • Run Defrag to help ensure that data is arranged in the best possible order.
Background programs
Remove or disable any TSRs and startup programs that automatically start each time the computer boots.
Tip To see what programs are running in the background and how much memory and CPU they are using open Task Manager.  If you are running Windows 7 run Resmon to get a better understanding of how your computer is being used.
If you've got an anti-virus scanner on the computer, spyware protection program, or other security utility make sure it's not scanning your computer in the background. Often when these programs begin to scan the computer it can decrease the overall performance of your computer.
Scan for malware
Today, spyware and other malware is a big cause of many computer problems including a slow computer. Even if an anti-virus scanner is installed on the computer we recommend running a malware scan on the computer. Use the free version ofMalwarebytes to scan your computer for malware.
Hardware conflicts
Update Windows
Update your drivers
Make sure you've got the latest drivers for your computer. Especially the latest video drivers. Having out-of-date drivers can cause an assortment of issues.
Computer or processor is overheating
Make sure your computer and processor is not overheating, excessive heat can cause a significant decrease in computer performance some processors will even lower the speed of the processor automatically to help compensate for the heat related issues.
Dust, dirt, and hair can also constrict a proper air flow on your computer, which can also cause a computer to overheat. Make sure your computer case is clean and fans are not obstructed.
Memory upgrade
If you've had your computer for more than one year it's likely you're computer is not meeting the memory requirements for today. Today, we suggest at a minimum the computer have 1GB of memory.
Specific operating system basic troubleshooting
Or go through the other basic troubleshooting steps.
Run registry cleaner
We normally do not recommend registry cleaners. However, if you have followed all of the above steps and your computer is still slow try running a registry cleaner on the computer.
Erase computer and start over
If none of the above solutions resolve your issues, it is recommended that you either reinstall Windows or erase everything and then start over.
Old computer
If your computer is older than five years come to terms that it is likely the age of the computer that is causing it to be slow. Computers progress at an alarming rate as new programs and updates for programs come out their minimum requirements increase and will cause older computers to slow down. If your computer is older than five years we suggest purchasing a new computer or just realize it is going to run slow because it is old.
Hardware issues
Finally, if your computer continues to be slow after going over each of the above recommendations it's possible that your computer is experiencing a more serious hardware related issue such as a failing component in the computer. This could be a failing or bad hard driveCPURAMmotherboard, or other component.
                                                                                       

How much is 1 byte, kilobyte, megabyte, gigabyte, etc.?


Below is a listing of each of the commonly accepted disk drive space values. It is important to realize that not all manufacturers and developers use these values. For example, a manufacturer may consider a gigabyte as 1,000,000,000 and not 1,073,741,824 bytes, we've listed the commonly accepted values in their binary base 2 values.
Note: All values expressed below are whole numbers. This means that a GB may show that it can only contain one 650MB CD but in reality 1GB could hold 1.5753... of a 650MB CD. Since we've created this document to illustrate how much each value can contain in whole, no decimal values are shown. In other words you can only fit one complete 650MB CD on a 1GB drive since two 650MB complete discs would exceed 1GB.


Bit
Bit is a value of either a 0 or 1.


Nibble
Nibble is 4 bits.


Byte
Byte is 8 bits.


Kilobyte (KB)
Kilobyte is 1,024 bytes.


Megabyte (MB)
Megabyte is 1,048,576 bytes or 1,024 Kilobytes
  • 873 pages of plaintext (1,200 characters)
  • 4 books (200 pages or 240,000 characters)


Gigabyte (GB)
Gigabyte is 1,073,741,824 (230) bytes. 1,024 Megabytes, or 1,048,576 Kilobytes.
  • 894,784 pages of plaintext (1,200 characters)
  • 4,473 books (200 pages or 240,000 characters)
  • 341 digital pictures (with 3MB average file size)
  • 256 MP3 audio files (with 4MB average file size)
  • 1 650MB CD


Terabyte (TB)
Terabyte is 1,099,511,627,776 (240) bytes, 1,024 Gigabytes, or 1,048,576 Megabytes.
  • 916,259,689 pages of plaintext (1,200 characters)
  • 4,581,298 books (200 pages or 240,000 characters)
  • 349,525 digital pictures (with 3MB average file size)
  • 262,144 MP3 audio files (with 4MB average file size)
  • 1,613 650MB CD's
  • 233 4.38GB DVD's
  • 40 25GB Blu-ray discs


Petabyte (PB)
Petabyte is 1,125,899,906,842,624 (250) bytes, 1,024 Terabytes, or 1,048,576 Gigabytes.
  • 938,249,922,368 pages of plaintext (1,200 characters)
  • 4,691,249,611 books (200 pages or 240,000 characters)
  • 357,913,941 digital pictures (with 3MB average file size)
  • 268,435,456 MP3 audio files (with 4MB average file size)
  • 1,651,910 650MB CD's
  • 239,400 4.38GB DVD's
  • 41,943 25GB Blu-ray discs


Exabyte (EB)
Exabyte is 1,152,921,504,606,846,976 (260) bytes, 1,024 Petabytes, or 1,048,576 Terabytes.
  • 960,767,920,505,705 pages of plaintext (1,200 characters)
  • 4,803,839,602,528 books (200 pages or 240,000 characters)
  • 366,503,875,925 digital pictures (with 3MB average file size)
  • 274,877,906,944 MP3 audio files (with 4MB average file size)
  • 1,691,556,350 650MB CD's
  • 245,146,535 4.38GB DVD's
  • 42,949,672 25GB Blu-ray discs


Zettabyte (ZB)
Zettabyte is 1,180,591,620,717,411,303,424 (270) bytes, 1,024 Exabytes, or 1,048,576 Petabytes.
  • 983,826,350,597,842,752 pages of plaintext (1,200 characters)
  • 4,919,131,752,989,213 books (200 pages or 240,000 characters)
  • 375,299,968,947,541 digital pictures (with 3MB average file size)
  • 281,474,976,710,656 MP3 audio files (with 4MB average file size)
  • 1,732,153,702,834 650MB CD's
  • 251,030,052,003 4.38GB DVD's
  • 43,980,465,111 25GB Blu-ray discs


Yottabyte (YB)
Yottabyte is 1,208,925,819,614,629,174,706,176 (280) bytes, 1,024 Zettabytes, or 1,048,576 Exabytes.
  • 1,007,438,183,012,190,978,921 pages of plaintext (1,200 characters)
  • 5,037,190,915,060,954,894 books (200 pages or 240,000 characters)
  • 384,307,168,202,282,325 digital pictures (with 3MB average file size)
  • 288,230,376,151,711,744 MP3 audio files (with 4MB average file size)
  • 1,773,725,391,702,841 650MB CD's
  • 257,054,773,251,740 4.38GB DVD's
  • 45,035,996,273,704 25GB Blu-ray discs
                                                                               Computer tips