Today I am going to alert you how to protect yourself from cyber
attach.viruses and identity theft are not new issues, but recently,
individuals and companies are at a much greater risk as a result of the
unanticipated increase in internet and technology use. Follow these tips
to protect yourself from such an attack so that you won’t be the next
victim.
Foe example, you
receive an email promising a great joke if you open the attachment.
You're not sure who sent it but you feel like a laugh and open it
anyway. Big mistake.
Attackers can break into your computer by
sending you an email attachment with malware (malicious software) or
downloading malware on to your computer when you open a link on a
webpage.
They want to use personal and financial details on your
computer to steal money, buy things on your credit card or open up bank
accounts in your name.
Anyone who uses the internet needs to be aware of basic computer security:
######################
1. Don't click the link
If you don't know who sent the email, or if it's not a trusted website, then don't click the link.
Beware:
there is always an increase in email phishing scams around Christmas,
whereby scammers have a fake retail store website and capture your
credit card details when you buy online.
2. Install Antivirus software
Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later.
3. Use strong passwords
Most of the population is still using '1234567' or their first name and last name,
The
problem is that there are about 20 different things that require
passwords. The strategy now is to write them down it is a complete
U-turn and put them in your wallet [which is usually in a safe place].
If you lose your wallet, you stop your credit cards and can also reset
all your online passwords.
* Never click 'remember my password'.
* Use capitals, lower case, numbers and symbols in passwords. Don't use words in the dictionary.
* Change passwords regularly.
* Password software is good at generating strong passwords but the human brain is the best tool of all.
4. Keep software up to date
This
will ensure your software has the latest security upgrades. Attackers
are always thinking up new ways to penetrate security. Don't ignore
update notifications.
5. Reconfigure wireless routers
Buy
a router with secure wireless encryption, otherwise your information is
unprotected and can be stolen: for example, when banking or shopping
online.
When you get a new modem from a network provider, it
may not be secured to encrypt traffic. People should go to the
administration panel and configure their wireless network to WPA (Wi-Fi
Protected Access) or WPA2 encryption.
Reconfiguring routers is easy and something people don't do properly.
Change
the name of the router to something obscure, otherwise it gives
attackers information on how best to attack that router. Also, change
the default login to a unique password.
6. Encrypt email
Learn to use email encryption for sensitive documents.
Don't
send emails such as a child's health resume using Gmail or Hotmail.
"There was [the recent case] where a Gmail employee started going
through people's email accounts."
7. Use a secure web browser
Firefox or Opera are secure web browsers
"Internet Explorer is highly targeted by attackers because it is on so many machines. IE generally takes longer to patch or fix vulnerabilities."
Eliminating
internet and computer use from your life is impossible, so be sure to
practice safe computing habits to protect yourself from cyber attacks.
thanks all :)
Monday, January 20, 2014
Tutorial Malware Description and Removal Guide
Hello all this a long Tutorial but it has so much impotent info for you.Hope you guys gonna like it.Yes it does worth to read whole post.
Purpose of the Thread
Computer/Network Protection.
This Guide is dedicated to every reader of this thread!
Whats included in this thread?
Well it will include descriptions, and how to remove part outsource.
What else?
In
this thread I will quote some other threads , comments , and side notes
to make this thread much more useful. So if I somehow forget to mention
source writer please ignore it.
What are the things/ Apps causing damage to the system?
Virus
Adware
Trojan
Worm
Spyware
Malware
Types of Computer Viruses
What is a Computer Virus?
A potentially damaging computer program capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows.
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
Adware
the programs which delivers ads to your computer most in POP-UP's form.
also software that is given to the user with advertisements embedded in the application
Spyware
The programs which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal purpose. Example: Keylogger applications.
Worm
Computer worms are programs which reproduce and function independently after jumping through different computer networks. Unlike a computer virus, which depends on a host file or a boot sector, rely on its own programming.
Email Worms
Infects computers through attachments or an HTML link that will navigate readers to an infected website. If either are opened, the worm will be downloaded and infect the computer.
Instant Message Worms
Appear in IM(Instant messenger) applications and send links of infected websites / Files to your contacts
Such as Omelga Spreading
Internet Worms
An Internet worm will scan network resources using a local operating system service to find vulnerable machines, then try to connect and gain full access to those machines. They also scan for systems that have usable exploits, some of which allow the worms to send data packets or requests to install itself.
IRC Worms
Targets chat channels by either sending infected files or links to infected web pages to users. Unlike other worm types, this one is usually less effective, as IRC recipients must confirm the file request, save the file then open it before the worm can infect their computer.
File-Sharing Network Worms
These worms copy themselves into a shared folder and appear as a harmless name. Once the file begins to spread in the file-sharing network, so will the worm, which will continue to infect other systems in the same fashion
Source for the Worms From WikiHow
Trojan
Trojan is a program which is used to gain access to a computer by
installing a program on infected PC to open some backdoor. Trojans are
also known as Backdoors.Types of Trojan
Software Detection Killers(Botkillers/ AV killers)
As the title states this kind of trojan is used to Kill , Delete , Stop the Anti-Virus Software that is installed in your system
Password Sending Trojan / Stealers
Stealing your details such as , User logging , address lists, credit card or banking information and send to the hacker who made the trojan.
Destructive trojan
Destructive Trojans delete files. They can be instructed to automatically delete all of the core system files in an operating system, including DLL, EXE or INI files, on the host PC
Denial Of Service(DoS) Attack Trojans
Multiple PCs are infected with a zombie that is scheduled to attack specific websites simultaneously so that the heavy traffic volume will overload the site's bandwidth
Remote Access Trojans(RAT's)
Remote Access Trojans are simply every one knows in the Hacking Community i guess ,
Which can Control Almost every activity on your PC like TV but without knowing the User
Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
This Server Trojan is a Sub Title for Trojan as well , it include
FTP (File Transfer Protocol) Trojan
If you know , your computer have port to connect to the network.
this trojan open the port 21 which Transfer the FTP Datas and it can Upload or Download from it
Downloader
Downloader Trojan downloads Trojan from another system or host
Proxy/ Wingate Trojans
Proxy Trojans transform a computer into a proxy server, either making it available to all Internet users or just to the hacker. This type of Trojan is developed to create "economizers" that are then used to provide complete anonymity for illegal actions, including buying merchandise with stolen credit cards and initiating Denial of Service attacks. If the hacker's actions are tracked, they are then traced to the victim's host PC rather than the actual hacker. Legally, the computer where the attack is launched is responsible for any damage the attack causes.
^wikihow
Malware
Malware is another name for virus software which is designed to delete, block, modify or copy data, or disrupt the performance of computers or computer networks
Generally, malware includes any virus software used to automatically conduct malicious activity, such as:
- A computer virus
- A worm virus
- Adware, scareware and crimeware
- Malicious tools such as spyware and rootkits
- A trojan virus or trojan horse virus
Thats all for those and i much appreciate if Someone have better thought modify the thread
So After that what cause Critical issue to our system ?
Software Vulnerability
if you are aware of Daily Hacker News and Security News sure you do not belong to here
like Internet Explorer 7,8
, Java Vulnerbility - an attacker could use the exploit to run arbitrary code on, and remotely compromise, a vulnerable system.
Drive-by's
Commonly known to Java Drive-by most of . This is Perform a Action to User download a Infected file
Silently ,
Asking for Updates , More Video player , plugin is specified for this
freeware / file sharing site/Fake Apps / USB Stealers
Like Some People Posting on the Site saying, Auto Clicker , Crypter , such thing ,
no-longer going to give information about Spreading , since you can find more .
Hacker Have some favorite tools also otherwise above mentioned Malwares
- Binders
- Crypters
What is Binder
A tool that combines two or more files into a single file, usually for the purpose of hiding one of them. Commonly associated with Trojan horses, where the Trojan is bound to a real file, such as a text file that opens with Notepad or other program. The users believe they are opening a safe file, and that is what appears on the screen, but at the same time the file is running, the Trojan is also running, usually undetected by the user.
What is Crypter
A crypter is used to make well known hacker's viruses (Malware) undetectable by anti-virus software by changing the virus program signatures that anti virus programs have in their databases to make them easier to spread
So Now you have good Amount knowledge about how you getting infects from malware .
Let's do some clean
Lets starts with the Anti-Virus guard protection
- #1 Bit Defender Anti Virus
- #2 Kaspersky Anti-Virus
- #3 Panda Antivirus Pro
- #4 F-Secure Anti-Virus
- #5 AVG Anti-Virus
- #6 Avast! Pro Antivirus
- #7 G Data AntiVirus
- #8 BullGuard Antivirus
- #9 Avira AntiVir Premium
- #10 ESET NOD32 Antivirus
Above List has listed with 2012 Vote ratings is
Best of 2012 Antivirus site .
if you can find / buy a Key it is great , but also free versions are good with the situation ,
Note that : Don't ever Use any cracked software which saying , "Close your FF , AV before crack" or else.
and Okay , we have the virus , is it enough ? if you read above Malware description Clearly figure out Only AV is not enough
Threat Fire

Simply it is doing When you are pressing key board key it is Crypting the key stroke so key-logger function useless with this
Goto Site and see more: Click Here
Also Key Scramble Doing the Same Job
KeyScrambler Personal promises to encrypt your keystrokes at the level of your keyboard driver and decrypt them when they reach your browser so they're visible to you
Click here to Download
Installing Anti-Malware
I have 2 suggestions Malware Byte or Super Antispyware , Just download One Application as your Opinion ,
Most users Rate Malware Byte is good ,
Click On Image to Download and more info
Note : if you need MalwareByte Pro Premium Key Post here or , Just Send me a PM
Lets goto Next Step : Installing Firewall
In the Windows , inbuilt Firewall / Windows Defender pre installed into your PC , it also a good one .
But in case we need some times much protection,
So my suggestions are Comodo Firewall
Click on the image to Download :

Last Not least : Tweaking up your PC after All .
Install Good System utilities Tool Such As Advance System Care Pro , Tune Up or CCleaner ,
and Make a Scan for your System Perform Increase , Registry Cleaning , Old Files Deleting , Etc
![]() | This image has been resized. Click this bar to view the full image. The original image is sized 804x534. |

Note : if you need Advance System Care Pro Premium Key Post here or , Just Send me a PM (Out of Stock , Use google)
![]() | This image has been resized. Click this bar to view the full image. The original image is sized 700x500. |

And When you are running Specious File Always run it inside SandiBox Or VM (Virtual Machine)
I Will Quote The 7th Sages This SandiBox Thread
![]() | This image has been resized. Click this bar to view the full image. The original image is sized 648x252. |

Introducing Sandboxie
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.

The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.
Benefits of the Isolated Sandbox
Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows.
Secure E-mail: Viruses and other malicious software that might be hiding in your email can't break out of the sandbox and can't infect your real system.
Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.
Download:
http://www.sandboxie.com/SandboxieInstall.exe
Have a NICE day!
Labels:
Tutorial
Chat/Shout Box For Your Blog
Adding a chat box or shout box to your blog is just another way to
make your blog more social. It makes you connect with your visitors even
more and makes your blog engaging. A simple chatbox might make your
blog visitor stay longer than normal. A chatbox / shoutbox can also
serve as a guestbook where visitors can leave comments and suggestions
easily without the need to create a separate page for that. If you have
an entertainment blog, then you definitely must have this.Adding a
chatbox to blogger is quite easy and you don’t need to know much HTML,
just a little copy and paste procedure and you’re done with it.
http://cbox.ws/getone.php
just go adobe link and give your information.
then they will provide you a html code.
simply copy the code and paste on a new “HTML/JavaScript” Gadget.
http://cbox.ws/getone.php
just go adobe link and give your information.
then they will provide you a html code.
simply copy the code and paste on a new “HTML/JavaScript” Gadget.
Labels:
Trick&Tips
Delete administrator Password” without any software in windows 8
Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D’nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer
Thats it.
Labels:
Trick&Tips
4 Killer Tips That Increasing Visits(Traffic) your Website or Blog
4 Killer Tips That Increasing Visits(Traffic) your Website or Blog
It is the time of competition so drive Traffic or visitor is in our
blog or website is now challenging work.If we work plan fully and
regularly we must get smart Traffic, it's no a matter .Increasing your
online business your must go to right way & use right Traffic
Tools.Top Affiliated Blogger use those tools or technique.4 Killer Tips
for increasing Traffic your blogs or website are give blog:
4 Killer Tips For Drive Traffic:
01. Article Marketing:
Now this present time article marketing is the way to drive huge visitor to your blog.
For good Article Marketing what you do?
a) 1st write 700/1000 words article.
b) 2nd you use primary keyword 3 times,other use relevant Keywords.
c) Write a article same subject.
d) Original written article only published your own website or blog.
e) Now Use Article rewriting tools and rewrite your blog article .
f) After that published your rewritten article High page rank Article publisher site.02. Social Media:
There is no way to avoid Social Media.It's not only drive traffic visitor but also help to get strong backlinks for your blog or website.
Some Important Social Media Site List are give below:
Facebook.com
Digg.com
Twitter.com
Stumbleupon.com
Propella.com
Youtube.com
Twitter.com etc
03. Blog Comment:
Blog comment is the great way to drive tariff.Blog Comment give huge traffic beside give strong visitor your blog.You must relevant blog comment because Google like relevant blog comment other wise it be spamming.you can get 50-100 visitor by 1 blog comment.
04. Forum Posting:
Forum Posting is another great way to drive visitor and strong backlinks,Un relevent Forum marketing,Spamming Forum Site is look as a Black hat way to SEO.So just create profile on Forum site give your website or blog link on your profile.(such as :Add Website,blog,Signature..etc)
Labels:
Trick&Tips
Huge E-mail List [500]
I bought you today 500 real peoples email list of USA you can use them for email marketing and other reasons
Download it
Download it
Labels:
freebies
Get Domain For Free( 1 year)
Get a free domain for 1 year....How? check bellow and u will find ur answer :)
1. go to this site>> http://gybo.com/
2. now follow one by one image step
#

#

#

#

#

#

#

#

#

#

#

#

note: uncheck "Domain Privacy"
#

note: they are not going to charge fom u dit card so don't worry
*you can use VCC too*
Thats it (Y)
You will get ur domain in 24 hours :)
thanks all for reading
1. go to this site>> http://gybo.com/
2. now follow one by one image step
#

#

#

#

#

#

#

#

#

#

#

#

note: uncheck "Domain Privacy"
#

note: they are not going to charge fom u dit card so don't worry
*you can use VCC too*
Thats it (Y)
You will get ur domain in 24 hours :)
thanks all for reading
Labels:
freebies
More than 100 Keyboard Shortcuts
Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Restore)
5. DEE্
6. SHIFT+DELETE (delet item sirectly,will not be store in Recycle bine)
7. CTRL while dragging an item (Select all of the items to be copied)
8. CTRL+SHIFT while dragging an item (made shortcut of Selected items)
9. F2 key (Rename the selected item)10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box – Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
2. LEFT ARROW (Move to the left orto the end of the previous line)
3. UP ARROW (Move up one row)
4. DOWN ARROW (Move down one row)
5. PAGE UP (Move up one screen at a time)
6. PAGE DOWN (Move down one screen at a time)
7. HOME (Move to the beginning of the line)
8. END (Move to the end of the line)
9. CTRL+HOME (Move to the first character)
10. CTRL+END (Move to the last character)
11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts
1. CTRL+O (Open a saved console)
2. CTRL+N (Open a new console)
3. CTRL+S (Save the open console)
4. CTRL+M (Add or remove a console item)
5. CTRL+W (Open a new window)
6. F5 key (Update the content of all console windows)
7. ALT+SPACEBAR (Display the MMC window menu)
8. ALT+F4 (Close the console)
9. ALT+A (Display the Action menu)
10. ALT+V (Display the View menu)
11. ALT+F (Display the File menu)
12. ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
1. CTRL+P (Print the current page or active pane)
2. ALT+Minus sign (-) (Display the window menu for the active console window)
3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
4. F1 key (Open the Help topic, if any, for the selected item)
5. F5 key (Update the content of all console windows)
6. CTRL+F10 (Maximize the active console window)
7. CTRL+F5 (Restore the active console window)
8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
9. F2 key (Rename the selected item)
10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)
I hope it will help u
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Restore)
5. DEE্
6. SHIFT+DELETE (delet item sirectly,will not be store in Recycle bine)
7. CTRL while dragging an item (Select all of the items to be copied)
8. CTRL+SHIFT while dragging an item (made shortcut of Selected items)
9. F2 key (Rename the selected item)10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box – Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
2. LEFT ARROW (Move to the left orto the end of the previous line)
3. UP ARROW (Move up one row)
4. DOWN ARROW (Move down one row)
5. PAGE UP (Move up one screen at a time)
6. PAGE DOWN (Move down one screen at a time)
7. HOME (Move to the beginning of the line)
8. END (Move to the end of the line)
9. CTRL+HOME (Move to the first character)
10. CTRL+END (Move to the last character)
11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts
1. CTRL+O (Open a saved console)
2. CTRL+N (Open a new console)
3. CTRL+S (Save the open console)
4. CTRL+M (Add or remove a console item)
5. CTRL+W (Open a new window)
6. F5 key (Update the content of all console windows)
7. ALT+SPACEBAR (Display the MMC window menu)
8. ALT+F4 (Close the console)
9. ALT+A (Display the Action menu)
10. ALT+V (Display the View menu)
11. ALT+F (Display the File menu)
12. ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
1. CTRL+P (Print the current page or active pane)
2. ALT+Minus sign (-) (Display the window menu for the active console window)
3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
4. F1 key (Open the Help topic, if any, for the selected item)
5. F5 key (Update the content of all console windows)
6. CTRL+F10 (Maximize the active console window)
7. CTRL+F5 (Restore the active console window)
8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
9. F2 key (Rename the selected item)
10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)
I hope it will help u
Labels:
Trick&Tips
Speed Up Internet [Working Trick]
Speed Up Internet [Working Trick]
Hello guys, here's a tutorial how to speed up your internet connection with command prompt!Note: Already worked on Windows 7 but I didn't test it on Windows XP or Vista.
Here it is:
#First go on: speedtest.net and check how faster is your connection internet! (And save an screenshot after you did the test!)Just to see the difference!
#Second: Go Start > CMD ( Run as administrator)
#Third: netsh interface tcp set global autotuning=disabled write this on command prompt window and press enter!Screenshot:

Labels:
Trick&Tips
SEO Tips For Beginners
Now a days SEO is one of the important parts of a site. It will help you
to get a better traffic every day. It will also increase your site’s
ranking. Although, SEO is the most essential but it is the most
difficult work. Let know few SEO tricks to make it easy.
What I should know?
Before
Search engine optimization you have to know that, SEO is a slowly
method. Please never try to make it in a day. Try to make it slowly and
gradually. Try to be create your back-links from high PR sites/blogs. Do
not try to create more than 30 back links in a day.. It appears spam.
It is just tips for Beginners,so if u r new to SEO then i hope it is going to help u
thanks
What I should know?
Tips To Know??
- At first choose your keyword, use “Google Adwords”, or any other tools (See Tips For Picking out The Right Keyword).
- When you go to make a comment in another site, fill your name space with your keyword. Then put email and your site url.(See Comment Making Fantastic Process).
- You should always try to make a comment from high page rank site, if you want to check it manually it is really to hard. So that you can install Alexa toolbar in your browser. You also can download Google Page Rank ads-on on Firefox. They will automatically show the PR when you visit any site.
- Then Select 3-5 forum site that relate your keywords. You can also do it by search ; such as this format “High page rank (your keyword) forum” in any search engine.
- Then Select 3-5 forum site that relate your keywords. You can also do it by search ; such as this format “High page rank (your keyword) forum” in any search engine. Then make your signature in the forum with your keyword. Create 5 post in each forum site regularly and make comment in other article. By these method you can build 30 high quality backlinks everyday.
- Never use any software or plugin to make backlinks. Software generally make comment in other site with weak comment text. The Website owner of that site, make these types of comments spam. So, Be careful.
It is just tips for Beginners,so if u r new to SEO then i hope it is going to help u
thanks
Labels:
SEO Tips
Is you antivirus working perfect ?
This trick will let you detect whether your antivirus software is
working or is just a waste. it will create a file which every antivirus
sofware will detect as virus but dont worry it is harmless and will not
harm your computer.
First open Notepad and copy below code into it:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
First open Notepad and copy below code into it:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
- Save the file as virus.exe.
- As soon as you will run this file you antivirus will detect it as software. If not then you need to change your program.

Labels:
Trick&Tips
Some Tips To Keep Your PC Faster
Follow Below Steps

Audio- and video-based computers thrive on speed, so who doesn’t want a faster computer? But you might not need to buy a faster machine if you follow these tips. Most are for Windows XP, but also apply to Windows Vista™.
Turn off the programs that load into RAM on startup. Go Start > Run, type MSCONFIG in the “Open” field, then click on OK. Click on the Startup tab, and uncheck anything that’s not essential. Do you really need “iTunes Helper”? Don’t be afraid to uncheck functions, as Windows will open anything it really needs.
Optimize USB and FireWire external hard drives for performance. Go Start > Settings > Control Panel. Double-click on System, click on the Hardware tab, and click on Device Manager. Click on the + symbol next to Disk Drives, right-click on your external drive, and select Properties. Click on the Policies tab, and choose “Optimize for Performance” (Fig. 1) There is a tradeoff, though; to avoid potential data loss, use the “Safely Remove Hardware” option in the system tray (the button with the green arrow) when disconnecting the drive.
Optimize internal drives for performance. Follow the same steps as above, but right-click on an internal drive instead of an external one. Select Properties, click on the Policies tab, and choose “Enable Write Caching on the Disk.”

Enabling write caching on external drives can improve performance.
Use ReadyBoost. This is the only tip that isn’t free, but with Windows Vista you can insert a USB thumb drive (up to 4GB) and when you do, you’ll be prompted as to whether you want to enable ReadyBoost (Fig. 2). This adds more memory to your system; it isn’t the same as adding more system RAM, but is more like having a really good disk cache. The improvement in speed is noticeable for just about anything other than continuous streaming of data. You do need a fast USB drive; if it isn’t fast enough, Windows Vista will notify you that it’s not suitable.

ReadyBoost is a great way for Windows Vista users to speed up data transfers.
Be careful about automatic updates. Windows Automatic Update is worth leaving on, as security patches for Internet Explorer are relatively frequent. But some automatic updates essentially take over your computer while they do their job, which can interfere with your work. Most automatic updates have an option where you can ask to be notified of updates, which lets you decide whether to install them immediately or wait. Another option is to schedule updates for when you’re not using your computer.
For your audio interface, use ASIO instead of MME or WDM drivers with Sony Creative Software applications. Most interfaces have drivers for all three, but MME and WDM are much slower. And never use any driver that’s “emulated.”
With ASIO, give priority to Background Services. Sony’s programs support the low-latency ASIO protocol, but for best results, go Start >Settings > Control Panel. Double-click on System, click on the Advanced tab, and under Performance, click on Settings (Fig. 3). When the Performance Options window opens, click on the Advanced tab and for Processor Scheduling, choose “Background Services.”

Giving priority to background services helps ASIO work more efficiently.
Check periodically for new drivers for hardware. New drivers often result in better performance. And don’t forget your graphics card; graphics performance often affects audio.
Defragment your drives periodically. This isn’t as important as it once was, but a really fragmented drive can slow things down.
Don’t disable System Restore. Some people claim disabling System Restore improves performance, but it’s worth taking the teeny (if any) performance hit in exchange for being able to return to a restore point when needed.
Enjoy :)

Audio- and video-based computers thrive on speed, so who doesn’t want a faster computer? But you might not need to buy a faster machine if you follow these tips. Most are for Windows XP, but also apply to Windows Vista™.
Turn off the programs that load into RAM on startup. Go Start > Run, type MSCONFIG in the “Open” field, then click on OK. Click on the Startup tab, and uncheck anything that’s not essential. Do you really need “iTunes Helper”? Don’t be afraid to uncheck functions, as Windows will open anything it really needs.
Optimize USB and FireWire external hard drives for performance. Go Start > Settings > Control Panel. Double-click on System, click on the Hardware tab, and click on Device Manager. Click on the + symbol next to Disk Drives, right-click on your external drive, and select Properties. Click on the Policies tab, and choose “Optimize for Performance” (Fig. 1) There is a tradeoff, though; to avoid potential data loss, use the “Safely Remove Hardware” option in the system tray (the button with the green arrow) when disconnecting the drive.
Optimize internal drives for performance. Follow the same steps as above, but right-click on an internal drive instead of an external one. Select Properties, click on the Policies tab, and choose “Enable Write Caching on the Disk.”

Enabling write caching on external drives can improve performance.
Use ReadyBoost. This is the only tip that isn’t free, but with Windows Vista you can insert a USB thumb drive (up to 4GB) and when you do, you’ll be prompted as to whether you want to enable ReadyBoost (Fig. 2). This adds more memory to your system; it isn’t the same as adding more system RAM, but is more like having a really good disk cache. The improvement in speed is noticeable for just about anything other than continuous streaming of data. You do need a fast USB drive; if it isn’t fast enough, Windows Vista will notify you that it’s not suitable.

ReadyBoost is a great way for Windows Vista users to speed up data transfers.
Be careful about automatic updates. Windows Automatic Update is worth leaving on, as security patches for Internet Explorer are relatively frequent. But some automatic updates essentially take over your computer while they do their job, which can interfere with your work. Most automatic updates have an option where you can ask to be notified of updates, which lets you decide whether to install them immediately or wait. Another option is to schedule updates for when you’re not using your computer.
For your audio interface, use ASIO instead of MME or WDM drivers with Sony Creative Software applications. Most interfaces have drivers for all three, but MME and WDM are much slower. And never use any driver that’s “emulated.”
With ASIO, give priority to Background Services. Sony’s programs support the low-latency ASIO protocol, but for best results, go Start >Settings > Control Panel. Double-click on System, click on the Advanced tab, and under Performance, click on Settings (Fig. 3). When the Performance Options window opens, click on the Advanced tab and for Processor Scheduling, choose “Background Services.”

Giving priority to background services helps ASIO work more efficiently.
Check periodically for new drivers for hardware. New drivers often result in better performance. And don’t forget your graphics card; graphics performance often affects audio.
Defragment your drives periodically. This isn’t as important as it once was, but a really fragmented drive can slow things down.
Don’t disable System Restore. Some people claim disabling System Restore improves performance, but it’s worth taking the teeny (if any) performance hit in exchange for being able to return to a restore point when needed.
Enjoy :)
Labels:
Tech Tips
Block Youtube Ads
Bored to seen ads when playing youtube videos ?
Now, Its Time to say “GOOD BYE” to those boring ads.Block Youtube Ads For Free.
1st download below software called “Youtube Ads Blocker”
Size = 0.6 mb only
Install downloaded software and just restart your browser.
Now you can successfully Blocked Booooooring Ads.
Enjoy !!!
Labels:
Tech Tips
Update Your Facebook Status Via Anything
want to update your status via anything like this > iphone ,or via anything.,,,,
just click on below names for update your status via anything
- Via iOS
- Via iPhone 5
- Via Blackberry
- Via BlackBerry Z10
- Via Battlefield 3
- Via iPad Mini
- Via iPad 2
- Via HTC One
- Via Akash Tablet
- Via Samsung Galaxy SIII
- Via Samsung Galaxy Grand
- Via xperia™
- Via xperia Z
- Toaster
- Via Blackberry Playbook
- Via Calculator
- Via Blackberry Touch
- via iPhone
- via Android (official)
- via Windows Phone (official)
- via SonyEricsson
- Via iPhone 4
- Via iPhone
- Via iPad 3
- Via iPad Mini
- Via iPhone 6
- Via Apple iMac 27-inch
- Via Ipin
- via Ovi by Nokia
- via Google+
- via PlayStation 3
- via Mafia Wars Game
- via Selective Tweets
- via HTC Sense
- via My INQ Mobile
- via Facebook for Camera EOS 50D
- via Tasha’s iMac i7
- via A Potato
- via Toilet
- via The Moon
- via Refrigerator
- via Your Mom’s Computer
- via Pizza Hut
- via My Bedroom
- via Eye Phone
- via Fedex
- via Friendster
- via Accident
- via Magic
- via Hell
- via Heaven
- via NASA Satellite
Labels:
Tech Tips
Why Do I Need A Web Site? What is Web Hosting?
Everyone is on facebook and twitter, does my business really need a web site? Isn’t facebook really my web site these days?
These questions are common for businesses that have been starting up the last couple of years – especially businesses that focus on a non-online basis (say a local retail store). Facebook and other social mediums like LinkedIn, MySpace, and Twitter – all give you a little space to publish your message. Think of it as a small bill board that you get for free with facebook and other social media sites. But if you want to provide a branded and interactive experience that drives business to you – then having your owb web site is crucial.
Think you don’t need a web site – because you just have local clients who come to your shop? You can get more local clients aware of your buisness by having a web site, combined with using the social media tools. But having your own web site lets you setup email news letters (so you can re-announce to your current clients to come back in during promotional periods), as well as sell direct to people outside your region. Any business can use more business – opening your self up to the world for client with a strong web site can only help (it never hurts!). Even if you are a local retailer, focused on walk in sales only – a web site won’t hurt you, it will only help promote more people to come in and check you out!
First, we need to define what is web hosting.
A web hosting service is a type of Internet hosting service that
allows individuals or organizations to make their website visible on
the Internet. This can very greatly from a simple Static web page to
a trully interactive video rich experience that drives sales through an online e-commerce shopping cart. Web hosting companies provide
space on a server owned or leased for use by clients that typically
includes internet connectivity housed in a datacenter. Web hosts can
also provide data center space and connectivity for other advanced needs beyond just web site hosting, such as an office’s central file server, mail server, or even virtual desk tops. Web Hosting is the most common and basic form of what commonly today is refered to as “Cloud Hosting”, or “The Cloud” since your web site resides out on the internet, allowing anyone to access the information you want publicized.
How do you get your own web site and start web hosting?
You would contact a hosting provider such as TOS HOST. You
would then decide on whether you’re looking for a quick and easy web site to build, or perhaps something more involved that might include your own shopping cart to sell products online, an email newsletter to promote recurring businesses, and even your own blog to publish content to attract new visitors.
If you’re looking to start up your own hosting company, reseller hosting is the way to go. However, if you’re like most people, you’re attempting to host your website so that you can
bring traffic to your business. You could accomplish your goals by
purchasing a cPanel web hosting account. A cPanel account allows you to have a
location where you store your files, setup email along with a myriad
of tools.
These questions are common for businesses that have been starting up the last couple of years – especially businesses that focus on a non-online basis (say a local retail store). Facebook and other social mediums like LinkedIn, MySpace, and Twitter – all give you a little space to publish your message. Think of it as a small bill board that you get for free with facebook and other social media sites. But if you want to provide a branded and interactive experience that drives business to you – then having your owb web site is crucial.
Think you don’t need a web site – because you just have local clients who come to your shop? You can get more local clients aware of your buisness by having a web site, combined with using the social media tools. But having your own web site lets you setup email news letters (so you can re-announce to your current clients to come back in during promotional periods), as well as sell direct to people outside your region. Any business can use more business – opening your self up to the world for client with a strong web site can only help (it never hurts!). Even if you are a local retailer, focused on walk in sales only – a web site won’t hurt you, it will only help promote more people to come in and check you out!
First, we need to define what is web hosting.
A web hosting service is a type of Internet hosting service that
allows individuals or organizations to make their website visible on
the Internet. This can very greatly from a simple Static web page to
a trully interactive video rich experience that drives sales through an online e-commerce shopping cart. Web hosting companies provide
space on a server owned or leased for use by clients that typically
includes internet connectivity housed in a datacenter. Web hosts can
also provide data center space and connectivity for other advanced needs beyond just web site hosting, such as an office’s central file server, mail server, or even virtual desk tops. Web Hosting is the most common and basic form of what commonly today is refered to as “Cloud Hosting”, or “The Cloud” since your web site resides out on the internet, allowing anyone to access the information you want publicized.
How do you get your own web site and start web hosting?
You would contact a hosting provider such as TOS HOST. You
would then decide on whether you’re looking for a quick and easy web site to build, or perhaps something more involved that might include your own shopping cart to sell products online, an email newsletter to promote recurring businesses, and even your own blog to publish content to attract new visitors.
If you’re looking to start up your own hosting company, reseller hosting is the way to go. However, if you’re like most people, you’re attempting to host your website so that you can
bring traffic to your business. You could accomplish your goals by
purchasing a cPanel web hosting account. A cPanel account allows you to have a
location where you store your files, setup email along with a myriad
of tools.
Labels:
Knowledge
Delete Undeletable File Or Virus
Sometimes some of our pc files are become undeletable that means when you want to delete those file it shows many errors.
Follow below steps for Delete This type files.
Follow below steps for Delete This type files.
- Open Notepad From Program Files.
- Click File>>Save As >>
- You should see a popup box.
- Now locate the folder where ur undeletable file is.
- Choose ‘All files’ from the file type box .
- click once on the file u wanna delete so its name appears in the ‘filename’ box .
- put a ” at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it). - Click save and Save file (It should ask u to overwrite the existing file, choose yes and u can delete it as normal) .
- Now Delete This File.
- Enjoy !!!
Labels:
Tech Tips
Samsung Galaxy S3 Camera Tricks and Tips

By looking at the Samsung Galaxy S3 Review and Full Phone Specification,
we were quite Impressed by the High Resolution Camera. The all new
Samsung Galaxy S3 has the same Lens and Sensor as the Galaxy S2 but it
seems that Samsung has Optimized the Software and has Improved the
Picture Quality and added many New Features.
Looking forward to
the great Camera of Samsung Galaxy S3, we here today provide you with
some of the Tricks and Tips to get the Maximum Best possible out of your
Samsung Galaxy S3′s Camera. So just read on.
Reduce the Resolution
The
Samsung Galaxy S3 let us Capture Photographs in Six Different
resolutions, i.e. from 0.3 Mega-Pixels to 8 Mega-Pixels. As we all know
that High Resolution Photograph are big in size and it takes longer to
Process and Upload to any Service Like Facebook etc. So alternatively we
can Drop down the Camera’s Resolution to 3.2 Mega-Pixels which will
make our Uploading process fast.Not only the Uplaoding goes Fast, but this Tip also takes and Occupy less space on our Internal Memory or the Micro-SD Card. The same Tip can be applied while shooting the Videos. As the Samsung Galaxy S3 can Shoot Videos and Movies at Full HD Resolution ( i.e. 1080p ), so we can drop its resolution to 720p instead and it will also look Fantastic while viewing and we can even send the 720p recorded movie via MMS.
Customize the interface
We
can use this Tip to Customize the Interface of our Galaxy Camera. There
are the Four Icons Running Down the Side of the Screen in the Camera.
Press and Hold any one of them. After that a Grid appears, simply Drag
those you use most Frequently onto the Bar to Replace the Defaults.
Use the FlashThe Samsung Galaxy S3 has an Impressive LED Flash, which we do not have to Reserve for Dim Light Conditions, it can also be used to great effect in Daylight to Counter Act Dark Shadows as a ” Fill Flash ” when you take Photographs and Videos.
The Samsung Galaxy S (like all modern cameraphones), doesn’t include an Optical Zoom so as to keep the Cost down, instead there is a Digital Zoom, but by using this, it enlarges the Pixels thus Reducing the Quality Significantly.
Use Scene Modes
The Galaxy S3 does not let us set the shutter manually like provided in some other Dedicated Cameras, but Slow and Fast Shutter Commands are Included as Scene Modes. We can select Sports for a Fast Shutter to Capture Fast Moving Action and Night Mode for Occasions when we want a Slower Shutter.
There is also a Metering Mode that determines the Exposure ( i.e. Brightness ) of the Photo. If the Metering is Wrong, Elements of Photo can be Too Dark or the Sky can look Bleached Out.
There are 3 options available in Galaxy S3 :
- Center Weighted : Where the Light is measured from the middle of the picture.
- Spot : Where the Light is measured from a Small Area.
- Matrix : Where the Light is measured at several different points and an average is used.
HDR
HDR stands for High Definition Range and this option is located in the Camera Settings. It is Useful for Situations with High and Low Contrast areas. This works by taking a Series of Photographs at different Exposure Settings and combining them in Camera, Retaining Shadow and Highlighting the details.
Remember to keep the Camera as still as possible in HDR mode.
Photo Editor

Photo Editor is a Best Application to tweak the Pictures, available for Free to Download.
Rule of Thirds
This option, also known as Guidelines is located in the Camera Settings of the Galaxy S3. We can use to Compose our own Pictures. It replicates the Rule of Thirds Grid used in Photography, by overlaying a Grid on the Screen.
Auto Sync
This option is Turned ON by Default when we Set Up our Gmail Account on the Smasung Galaxy S3. This feature automatically Upload our Pictures to Google Plus.
We can Turn this OFF by going to :
- Settings
- Accounts and Sync
- Click on your Email Address
- Untick ” Sync Google Photos “.
Hope you find these Tricks and Tips useful.
Labels:
Tech Tips
Subscribe to:
Posts (Atom)