Showing posts with label Did You Know ?. Show all posts
Showing posts with label Did You Know ?. Show all posts

Friday, February 25, 2011

50 Interesting Facts

1. If you are clever, they tend to chew your food on your right. If you are left handed, they tend to chew your food on your left side.

2. If you stop being thirsty, drink more water. For when a human body is dehydrated, its thirst mechanism shuts off.

3. Chewing gum while peeling onions will keep you mourn.

4. Your tongue is germ free only if it is pink. If white is not a thin film of bacteria on it.

5. The Mercedes-Benz motto is "Das Beste oder Nichts" meaning "nothing or better."


6. The Titanic was the first ship to use the SOS signal.

7. The pupil of the eye expands as much as 45 percent when a person looks at something pleasing.

8. The average person who stops smoking requires one hour less sleep per night.

9. Laughing lowers levels of stress hormones and strengthens the immune system. Six years old laugh an average of 300 times a day. Adults only laugh 15 to 100 times a day.

Wednesday, February 23, 2011

Top 10 Global Mobile Telecom Firms

This is a top 10 global list of mobile phone network operators. For a more comprehensive list of UMTS and GSM operators :

  • China Mobile  :  Formerly owned by China, now still controlled by the state, one of the two mobile phone monopolies throughout China. China Mobile Limited provides wireless voice and multimedia services through its national mobile telecommunications network, the largest of its kind in the world. While a state-owned company, listed on both the NYSE and stock exchanges in Hong Kong. In addition to the largest network of world's mobile phone, China Mobile also has the largest number of mobile subscribers. 

Thursday, February 17, 2011

Did You Know How To Recover Deleted Data ?

Many times it happens that they accidentally delete some important information from our computer. In such cases information recovery softwares are  helpful but most of them are paid softwares. There's only few Free information recovery softwares available on the the net and one of them is FreeUndelete.

Before you use FreeUndelete I counsel you not to transfer any information to that particular drive from which you want to recover information as it can reduce your chances of information recovery.

In today's post I'll give you download link for FreeUndelete software and also highlight some of its main features.


Wednesday, January 5, 2011

20 Web Services to send fax free online no fax machine required

Send free Fax 
This is the list of 20 free Web service that allows users to send faxes over the Internet. Most Internet fax services for free. However, some services are supported by advertising on the front of the fax sent, because faxes can look unprofessional.


1) FaxZero 

FaxZero 20 Web Services to send fax fax free online without MachineFaxZero is an online fax service that allows users to send free faxes as PDF files and Word documents to any fax machine across the U.S. and Canada. This fax service requires no fax machine, but a valid email address is required. FaxZero limits of their online fax services to their users by allowing them to fax twice in one day and each time the fax can be a maximum of three pages. FaxZero Another disadvantage is that is supported by ads displayed on the front pages of faxes that are sent free. Printed an advertisement in the fax cover sheet, but leaves the main uncorrupted. 


Friday, December 31, 2010

Facebook surpassed Google for the first time as the most visited website in the United States for most of 2010

The social networking site surpassed Google.com with 8.9 percent of all visits to U.S. between January and November 2010, while Google.com was second with about 7.2 percent of all visits, according to measurement service Hitwise Experian online.

Seven major corruption scandals in India

corruption scandals in India
India has been shaken this year by a series of corruption scandals that have embarrassed the ruling Congress Party, jittery markets and delayed the reform bill as the opposition parliamentary seats.

The country, ranked 87 in Transparency International on the basis of perceived levels of corruption, is no stranger to scandals. 

Here are some of the largest in the last two decades:

Monday, December 27, 2010

Domain Availability Check

domain-registration







Discover the domains accessible to register. This apparatus suggests  accessible domains. This apparatus is actual advantageous for those who are consistently attractive for new domains.


Domain name:

.

(eg. iwebtool)
Recommend
additional domains

Friday, November 26, 2010

IP Version 4 Coming to end and Start using IP Version 6

IPv6

The IPv6 address size is 128 bits. The preferred IPv6 address representation is:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where each x is a hexadecimal digit representing 4 bits. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 toffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff.




For more information please click below image


Thursday, November 25, 2010

What to Trace the Unknown Number's ?

Trace the Numbers
By using this information, you can only know “where” the call is from and not “who” the caller is.


Please click below image  for domestic number's  



Please click Below image for International number's







Sunday, November 21, 2010

Know your IP Address and Location

Know your IP




What to know your IP address . Please click Here


and for Location click below image.






Differences between Windows XP and Windows 7

Windows XP N Windows 7
Windows 7 is the latest operating system released by Microsoft but still the major market share is ruled by Windows XP. Windows XP which was till yet dominating the Client Operating System Market was given a push back by Microsoft Windows Vista.As Windows Vista was not a major success in the market,That why Microsoft introduce new operating system Window 7. 


Differences between Windows XP and Windows 7


1. One of the major difference between both the operating system is User Access control . Where Windows XP doesn't have any UAC on other side Windows 7 enables the UAC feature which was introduced in Windows Vista.

2. Windows 7 supports DirectX 11 where Windows XP support Directx 9.

3. One major difference is regarding the graphics , where Windows XP lacks them on other hand Windows 7 is known for its visual appearance


4. Their is a difference in speed of both the operating system where Windows 7 boots quicker than Windows XP

5. Networking features like Direct access and VPN reconnect which were not available in Windows XP but are introduced in Windows 7 also adds a point to this list of differences between Windows XP and Windows 7.







Run Commands Gallary

Run Commands Lists
Type the following commands in your Run Box (Windows Key + R) or Start Run


A
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
B
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
C
CACLS Change file permissions
CALL Call one batch program from another.
CD Change Directory - move to a specific Folder.
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen.
CLUSTER Windows Clustering
CMD Start a new CMD shell

colors of the CMD window.
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
D
DATE Display or set the date•
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
E
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress files
EXTRACT Uncompress CAB files
F
FC Compare two files
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations•
G
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line•
H
HELP Online Help
I
iCACLS Change file and folder permissions
IF Conditionally perform a command•
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
K
KILL Remove a program from memory
L
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
M
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd)

MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
N
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
P
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD•
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
Q
QGREP Search file(s) for lines that match a given pattern.
R
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
S
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
SET Display, set, or remove environment variables•
SETLOCAL Control the visibility of environment variables•
SETX Set environment variables permanently
SHIFT Shift the position of replaceable parameters in a batch file•
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window•
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
T
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file•
U
USRSTAT List domain usernames and last login
V
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
W
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
X
XCACLS Change file and folder permissions

Most Dangerous Computer Viruses History



Computer Viruses
Computer viruses have a relatively short history, but the damages caused by some of them pushed cyber-experts to opening a new chapter on computer viruses. Some viruses led to serious damages and affected a large number of companies, universities and even governments.


Jerusalem - 1987
This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and companies worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the Jerusalem University.
Along with a number of other computer viruses, including "Cascade""Stoned" and "Vienna" the Jerusalem virus managed to infect thousands of computers and still remain unnoticed.

Morris (a.k.a. Internet Worm) - November 1988
This computer virus infected over 6,000 computer systems in the United States, including the famous NASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions.
To be able to spread, the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. The virus could also pick user passwords.


Solar Sunrise - 1998
A decade later the situation didn't change, in fact it even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.


Melissa - 1999
For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down the Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after overloading the servers, it led to serious problems. For the first time it spread in the Usenet discussion group alt.sex. Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.
Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest was made by a team of representatives from FBI, New Jersey State Police and Monmouth Internet.
Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as on Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 and Outlook 98.


I Love You - May 2000
Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world overnight. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty.


The Code Red worm - July 2001
This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT and Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.
Nimda - 2001
Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having 5 different methods of infecting computers systems and being able to duplicate itself.

Downadup - 2009
The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across the Web, because it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.