Friday, November 26, 2010

IP Version 4 Coming to end and Start using IP Version 6


The IPv6 address size is 128 bits. The preferred IPv6 address representation is:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where each x is a hexadecimal digit representing 4 bits. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 toffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff.

For more information please click below image

Thursday, November 25, 2010

What to Trace the Unknown Number's ?

Trace the Numbers
By using this information, you can only know “where” the call is from and not “who” the caller is.

Please click below image  for domestic number's  

Please click Below image for International number's

Sunday, November 21, 2010

Know your IP Address and Location

Know your IP

What to know your IP address . Please click Here

and for Location click below image.

Differences between Windows XP and Windows 7

Windows XP N Windows 7
Windows 7 is the latest operating system released by Microsoft but still the major market share is ruled by Windows XP. Windows XP which was till yet dominating the Client Operating System Market was given a push back by Microsoft Windows Vista.As Windows Vista was not a major success in the market,That why Microsoft introduce new operating system Window 7. 

Differences between Windows XP and Windows 7

1. One of the major difference between both the operating system is User Access control . Where Windows XP doesn't have any UAC on other side Windows 7 enables the UAC feature which was introduced in Windows Vista.

2. Windows 7 supports DirectX 11 where Windows XP support Directx 9.

3. One major difference is regarding the graphics , where Windows XP lacks them on other hand Windows 7 is known for its visual appearance

4. Their is a difference in speed of both the operating system where Windows 7 boots quicker than Windows XP

5. Networking features like Direct access and VPN reconnect which were not available in Windows XP but are introduced in Windows 7 also adds a point to this list of differences between Windows XP and Windows 7.

Run Commands Gallary

Run Commands Lists
Type the following commands in your Run Box (Windows Key + R) or Start Run

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another.
CD Change Directory - move to a specific Folder.
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen.
CLUSTER Windows Clustering
CMD Start a new CMD shell

colors of the CMD window.
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
DATE Display or set the date•
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress files
EXTRACT Uncompress CAB files
FC Compare two files
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations•
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line•
HELP Online Help
iCACLS Change file and folder permissions
IF Conditionally perform a command•
IFMEMBER Is the current user in an NT Workgroup
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd)

MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD•
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
QGREP Search file(s) for lines that match a given pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
SET Display, set, or remove environment variables•
SETLOCAL Control the visibility of environment variables•
SETX Set environment variables permanently
SHIFT Shift the position of replaceable parameters in a batch file•
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window•
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file•
USRSTAT List domain usernames and last login
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file and folder permissions

Most Dangerous Computer Viruses History

Computer Viruses
Computer viruses have a relatively short history, but the damages caused by some of them pushed cyber-experts to opening a new chapter on computer viruses. Some viruses led to serious damages and affected a large number of companies, universities and even governments.

Jerusalem - 1987
This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and companies worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the Jerusalem University.
Along with a number of other computer viruses, including "Cascade""Stoned" and "Vienna" the Jerusalem virus managed to infect thousands of computers and still remain unnoticed.

Morris (a.k.a. Internet Worm) - November 1988
This computer virus infected over 6,000 computer systems in the United States, including the famous NASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions.
To be able to spread, the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. The virus could also pick user passwords.

Solar Sunrise - 1998
A decade later the situation didn't change, in fact it even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

Melissa - 1999
For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down the Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after overloading the servers, it led to serious problems. For the first time it spread in the Usenet discussion group Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.
Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest was made by a team of representatives from FBI, New Jersey State Police and Monmouth Internet.
Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as on Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 and Outlook 98.

I Love You - May 2000
Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world overnight. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty.

The Code Red worm - July 2001
This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT and Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.
Nimda - 2001
Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having 5 different methods of infecting computers systems and being able to duplicate itself.

Downadup - 2009
The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across the Web, because it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.

How to speedup your Mozilla Browser

Mozilla Browser

  •  Type "about:config" into the address bar and hit enter. Scroll down and look for the following entries:
  • Alter the entries as follows:                                                                                                                                         Set "network.http.pipelining" to "true"Set "network.http.proxy.pipelining" to "true"                                                     Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
  • Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves

Friday, November 19, 2010

Google AdSense Gets a New and More Efficient Look

New user interface is designed to give Web publishers who use AdSense better controls and easier access to features.

Advertising, the life-blood of so many websites, is not nearly as effective if it's not managed and placed to optimal effect. Google's AdSense is one of a number of services that help websites manage ad traffic at their sites as well as the revenue that comes from those ads.

Now, as Ecommerce Guide reports, Google's redesigned AdSense sports a new user interface, giving customers easier access to features and better control over what ads appear and when.

Google has unveiled a new interface to its AdSense service for Web publishers that the company says is easier to use and adds a number of control and management features.
The updated AdSense is being rolled out today -- in more than 30 languages 

Source :

Thursday, November 18, 2010

Adobe launches new version 'sandboxed' Reader X

Adobe today released Reader X, the next version of its popular software that includes a "sandbox" designed to protect users from PDF attacks.
Reader X on Windows features Protected Mode, a technology that isolates system processes, preventing or at least hindering malware from escaping the application to wreak on the computer.

Tuesday, November 16, 2010

Facebook Valued Higher Than eBay, Now Third Largest Web Company

Facebook is  ranked as the third largest web company, with an estimated valuation of USD 41 billion which is greater than EBay.

According to Bloomberg, the social network slatest valuation, based on the selling price of shares on SecondMarket, an exchange for privately held companies, makes it the country's third-largest online business after Google  (USD 192.9 billion) and Amazon (USD74.4 billion).

Monday, November 15, 2010

Some Investments for NRI in india

NRI Investments
Citizens of India who have the NRI status (Non-Resident Indian) can invest in India.

Basic Requirements

As an NRI there are a few additional requirements in the form of documentation that a citizen has to comply with while investing in India. As any other citizen, documents such as a PAN card, ID Proof and Address Proof (the passport will suffice to be the single document for both), a KYC certificate (Know-Your-Client Certificate) for Mutual Fund investment above Rs.50,000/- and Passport size Photographs are required.
Apart from this an NRE (Non-Resident External Account – Dollar Account), and / or an NRO (Non-Resident Ordinary Account – Rupee Account) is/are required. The difference between these accounts is that the investments made and the returns got from those investments, using the NRE account can be repatriated to other countries.

Investment in Mutual Funds
NRIs can directly invest in any mutual fund from their NRE/NRO account. For investment above Rs.50,000/- the KYC documentation is required. Investment can be in any mode – only once, regular (monthly (SIP), quarterly, etc). The NRI investment returns in Mutual funds can fully be repatriated.
To make the investment the KYC forms given at any of the “Service Points” listed on the AMFI website. This will take about 4 days. A letter is sent back to the address for communication stating that the investor is verified. A copy of this letter has to be attached will all the mutual fund investment / withdrawals above Rs.50,000/-.
The investments will require forms to be signed but can be downloaded from any of the respective Asset Management Company (Mutual Fund) websites. So the NRI could sign, fill and have the forms sent directly to the Mutual Fund Company or to a relative / friend / financial advisor who could then give it to the Fund Office.
Investment in Shares
NRIs can invest in shares using a Demat (Dematerialised Format) account. However RBI approval has to be got for each transaction.
This is a cumbersome process unless the investment is large (>Rs.1 crore) and/or to acquire significant stock holding in a company.
The better way is thus to use the mutual fund route for exposure to the stock market.
Investment in Real Estate
Investment in land and buildings (housing and commercial) can be done by NRIs with the same rules as for the Resident Indians. However since buying land is a long drawn process, giving a Power of Attorney to a close relative (normally the parents) for executing the purchase / sale process may be advisable.
One limitation to the investment in real estate is that only the original money invested in the land can be repatriated even if invested from the NRE account.
For example if Rs.50,00,000/- was invested in a house and it was sold after 4 years for Rs.1 crore, the capital gain of Rs.50 lakhs will need to be taxed and reinvested in India itself. Only the initial investment of Rs.50 lakhs can be taken back out of the country by the NRI (if the investment was made from the NRE account).
Investment in Gold and Jewellery
Here again the investment is as per the norms for normal resident Indians.
A point to note for even the resident Indians is that gains made from buying and selling gold and gold jewellery is subject to capital gains tax.
So keep the receipts safely while making gold purchases.
Becoming a Partner in a Business
Here again approval from RBI has to be sought as becoming a partner is akin to buying shares in the business.
Bank Fixed Deposits
An NRI can invest in all the bank deposits. The interest is taxable and is generally subject to TDS unless a request from for not deducting tax at source is submitted.
Postal Deposits
Most or all of the postal deposits are out of bounds for the NRI. They cannot invest in the National Savings scheme, Kisan Vikas Patra, Monthly Income Scheme nor the Public Provident Fund.
Typically these schemes are coming under the Small Savings Schemes and the NRIs are expected to save BIG!!!!.
However schemes that were started before one becomes an NRI can be continued till the end of the scheme. They cannot be renewed at the end of the term if the NRI status continues at that time.

Source: Economic Times

Sunday, November 14, 2010

What do you mean by GOLD EFT ?

Gold EFT
If you will notice that the gold prices always goes up. It may come down for some time but agian will go to the new highest point. According to the statistics, India is the largest consumer for the precious yellow metal Gold. That is the reason gold market is always doing good in India. This article explores few basic idea on how to trade the gold as like in the share market. That is called as Gold Exchange Traded Fund(ETF). It will be useful for the investors who want the highest returns for their investment.

How to buy Gold Eft ?

It is same like you are trading the shares in the stock market, you will be trading the gold using the demat account in online. Instead of buying the physical gold, you will be buying the gold in papers.
To trade gold ETF, you must have an demat account. How you are buying the shares, in the same way you will buy the gold in units. For example, if you are investing Rs.20000, then the gold will be alloted in units for Rs.20000. Here each unit represents one gram of gold. It will be alloted in the current market value of the gold.

Google introducing new Image format called WEBP

.Webp is new image format which is introducing by Google. WebP offers compression that has shown 39.8% more byte-size efficiency than JPEG for the same quality in a large scale study of 900,000 images on the Web.

Facebook launch E-Services

Facebook is a social network service, are going to launch E-mail services soon like Google,Yahoo and Microsoft.It will look like