Archive for 07/10

Create A Keyboard Shortcut To Open A Folder


Do you have a folder that you'd like to be able to open quickly and easily whenever you want? If you create a keyboard shortcut for that folder, you can open it anytime by pressing a key combination, no matter which other programs you have open.

To create a keyboard shortcut to open a folder

1.
Click on StartAll ProgramsAccessories, and then click Windows Explorer.
2.
In Windows Explorer (the program that appears when you open folders such as My Computer, My Documents, My Pictures, or My Music), right-click the folder to which you want instant access, click Send To, and then click Desktop.
Folder selected in My Documents folder, with Send To and then Desktop selected on right-click menu
3.
On your desktop, right-click the new shortcut, and then click Properties.
Shortcut selected, with Properties selected on right-click menu


Posted by Abhishek Vohera

Which Browser Are You Using ?

In today's world, more and more people jump on to their computers for the single reason to use the Internet. The internet connects us with millions of different people worldwide. But do you know what browser you are using to browse with?
From statistics about FreePCTech.com, a majority of users use Internet Explorer 6, which is an out of date version of Microsoft's legendary web browser. Internet Explorer 6 dosen't have the support for the latest innovations the internet has to offer. Microsoft has released two major updates, Internet Explorer 7 and 8. Which both are good web browsers to use in today's world wide web. But did you know that there are more web browsers than Internet Explorer?



http://www.heartinternet.co.uk/blog/wp-content/uploads/2009/03/web_browser_logos.jpg


All a web browser does is opens pages on the internet, and the web browsers job is to connect to the website and display the web page correctly so you the user can interact or experience the web. Back in 1994, Netscape became a large competitor in the Web Browser industry. Offering a more secure browser than Internet Exploer, and hundreds of thousands of users jumped abord the wagon to using Netscape. However, today there are many different web browsers to choose from. Today, we are going to look at each browser and what each has to offer a typical user.


Internet Explorer

Internet Explorer is still the world's most used Web Browser. And that is because it is preinstalled on every Microsoft Windows installation out there. You probally have the E icon on your desktop right now. Because of this, the people who write malware (or software that attacks your computer) typically target Internet Explorer users. Today, Microsoft advises everyone who is using older copies of their product to update to Internet Explorer 8 to prevent any issues from happening. But there isn't really any reason to use IE when there are more secure browsers than that still around.
Mozilla Firefox

Firefox was created as the new Netscape browser. It offered secure browsing and tabs. Something many people never experienced before. Tabbed browsing enabled users to have one window open on their start bar and to have many different tabs of content inside. This allowed you to instead of opening a bunch of windows, to open a bunch of tabs. In my opinion, this is far less intrusive than having your start bar say (26) Mozilla Firefox and having to shift though each window to find what I was looking for. Mozilla Firefox also was a pionner when it came to delivering a safer way to browse, because when it downloaded a web page from a website, it's engine (Gekco), renders pages in a more secure fasion and prevents the holes that Internet Explorer's original rendering engine (Trident) had to offer. Today is is the leading competitor in the Web Browsing world.
Google Chrome

If your like me and you go tab crazy, you will love Google Chrome. Google introduced their own web browser to enable their users to enjoy the latest features of JavaScript Library 8, which renders pages remarkably faster than ever before. Along side with the fact that Google Chrome did something no one else had done before. Where in the past when your web browser crashed, Google built Chrome to have each tab as a separate process in your system. This means that if a tab crashes, it doesn't interfere with the rest of your tabs and your entire web browsing experience. This method of sandboxing each tab revolutionized how we browse the internet.

 There are many other Web browsers out there today. Including Netscape, Oprah, Safari (which is also available for Windows), and many more. But take it from me, as a web developer, I make a deliberate choice in what Browser I choose to use to browse the internet. Although each goes to the same place, and no matter which you type freepctech.com into your going to get to the same place, they each have their own advantages and disadvantages.
Posted by Abhishek Vohera

History of Java and Programmer James Gosling

Java is a programming language and environment invented by James Gosling and others in 1994. Java was originaly named Oak and was developed as a part of the Green project at the Sun Company.


The writing of Java began in December of 1990. Patrick Naughton, Mike Sheridan, and James Gosling and were trying to figure out the "next wave" in computing.


http://blog.taragana.com/wp-content/uploads/2009/06/java.jpg



James Gosling 
In 1977, James Gosling received a B.Sc in Computer Science from the University of Calgary. In 1983, he earned a Ph.D in Computer Science from Carnegie Mellon University, and his doctoral thesis was titled "The Algebraic Manipulation of Constraints". While working towards his doctorate, he wrote a version of emacsgosmacs), and before joining Sun Microsystems he built a multi-processor version of Unix while at Carnegie Mellon University, as well as several compilers and mail systems.
Since 1984, Gosling has been with Sun Microsystems, and is known as the father of the Java programming language.
On April 2, 2010, Gosling left Sun Microsystems which had recently been acquired by the Oracle Corporation. Regarding why he left, Gosling wrote on his blog that "Just about anything I could say that would be accurate and honest would do more harm than good."
Posted by Abhishek Vohera

How To Delete Virus Without Using Any Antivirus Programs

One of the ways by which a virus can infect your PC is through USB/Flash drives. Common viruses such as 'Ravmon' , 'New Folder.exe', 'Orkut is banned' etc are spreading through USB drive . Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB drives or harddisk. Whenever you plug a USB DRIVE in your system, a window will appear similar to the one shown below…


Don't click on Ok , just choose 'Cancel'. Open the Command Prompt by typing 'cmd' in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.

This will display a list of the files in the Flash drive or Hardisk. Check whether the following files are there or not

* Autorun.inf

* Ravmon.exe

* New Folder.exe

* svchost.exe

* Heap41a

* or any other .exe which may be suspicious.

If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like McAfee or TrendMicro's PCCillin to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the "Autorun.inf" file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread…
Posted by Abhishek Vohera

How to Secure a Wireless Network from Hackers?

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.


In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips: 
                   
1.       Strategic antenna placement:

The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
2.       Use WEP:

WEP stands for Wireless encryption protocol.  It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3.       Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.

4.       Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5.       Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6.       Utilize access lists:

        For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.
Posted by Abhishek Vohera

- Copyright © Abhi Software Tips -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan -