Banner Ad

    A    L    W    A    Y    S           D    E    S    I    R    E           T    O           L    E    A    R    N           S    O    M    E    T    H    I    N    G           U    S    E    F    U    L   

Technology and business

technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other

Arthur C. Clarke

Any sufficiently advanced technology is indistinguishable from magic.

Bill Gates is a very rich man today... and do you want to know why? The answer is one word: versions.

Softwares

Defect-free software does not exist.

Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.

Thursday, August 25, 2011

Haking FB

Hacking Facebook with Javascript

Because facebook relies so heavily on javascript, and because we can type javascript into the address bar, that means we can “poke” into the workings of facebook to do things that we wouldn’t normally be able to do. It’s not “hacking” exactly, but it employs the same sort of skills hackers use when looking into applications. The best part is that because it’s all using the same control codes (or “API”) that facebook uses, there’s no way for facebook to find out you’re doing it, so it’s totally safe! (I think…) Besides, we’re not going to be doing anything too dodgy, just a few little tweaks ;)

Facebook Hack: Sending your friends offline

Here’s a funny one; if you’re chatting to a friend, get them to paste the following code into their facebook address bar:

javascript:buddyList.toggleTab();

It’ll make them go offline! Of course it’s not permanent, they can go back online by clicking the icon as normal, or by giving the same command again

Facebook Hack: Change facebook color

Check this out:

Isn’t that cool? Just use the following code to get your profile colour changed and impress your friends!

javascript:void(document.getElementById('headNavOut').style.backgroundColor="red");

Of course, you can use any colour you like; green, yellow,orange, black. It’s also fun to change it to “white” so you can’t see the text. Muahahaha. Again, only you can see it, but it does last until you log out or view certain special pages.

Facebook Hack: Get Chat History Even When Friends Aren’t Online

New: Video Tutorial for this hack.

Here’s a facebook hack that’s actually proven very useful to me in the past. One thing that I find annoying about facebook is that you can’t retrieve chat history if your buddy is offline… well now you can! :)

Click onto your friend’s profile page and copy their facebook ID from the address bar; i.e. the number after “id=”, highlighted in red below:



It might look slightly different, perhaps like this: http://www.facebook.com/home.php#/profile.php?id=123132132213&ref=nf

But the important thing is to copy the number of the user, in our case 123132132213

Then while you’re still on facebook, type this into the address bar:

javascript:buddyList.itemOnClick(123132132213);

(with the correct ID of course)

And their chat window will pop up, saying “Harsha is offline”. And if there’s any chat history, it will be displayed. How neat is that!

You can even open a chat window to yourself by pasting your own ID into the javascript, as seen to the right. You can use it for little notes to yourself, but remember that facebook chat history is cleared every few days, so don’t rely on it.

UPDATE1: A few people have had trouble pasting it in correctly, so here’s how it should look:


UPDATE2: Now that we have facebook usernames, it can be little harder to determine the ID of a profile, but it’s still possible – here’s one way: right click the “see all” friends link and choose “copy link location”, like so:

Or in Internet Explorer, you can choose “open link in new tab”. The resulting URL will look something like this:

http://www.facebook.com/friends/?id=YOUR_ID_HERE&view=everyone
That’s it!

Facebook Hack: Change your name (temporarily)

This one’s a very simple hack that you can apply to any website. As you saw in the screenshot above, I’d changed my facebook to display as “Facebook | Harsha”. You can do this by using the following javascript:

javascript:void(document.title="Facebook | Gayan");

Sadly, your friends will only see your actual name, not the new one, but it can make for some amusement in a computer lab class or anywhere where you can show people face to face.

Facebook Hack: Close chat windows

If you’re chatting to a friend and want to close the window, sure you can just click the ‘x’ in the top corner, but isn’t it cooler to do it with javascript? Well no not really, but if you can trick your friend into typing the following code in, you can close the chat window of anyone they’re chatting to:

javascript:chatDisplay.tabs[123132132213].tabXOnClick();

That will close my chat with “123132132213″. You can send your friends that link with your own facebook ID in it, and it’ll close their chat window with you! And if you happen to know that ID:123 is chatting with ID:321, you can send the following to ID:123, and when they paste it in it’ll close their chat with 321!

javascript:chatDisplay.tabs[321].tabXOnClick();

Other Facebook Hacks

The hacks above are the most impressive, but there are a few other little things you can do which are mildly interesting:

Bring up notifications:

javascript:presence.toggleTab('chat_status_control','chat_status_control_tab');

Bring up online friends list:

javascript:buddyList.toggleTab();

Bring up application tab:

javascript:applicationDock.toggleTab();

Make text bold or underlined in facebook chat: use *stars* for bold text, and _underscores_ for underlined. There is no way to get italic text on facebook; see my comment here about facebook chat italics.

That’s all the hacks I’ve found (but I know there are more). In fact, it’s possible to get your friends to “like”, or “unlike” items, and I think it would be possible to get them to comment and more, but the complexity of the javascript makes it not worth doing, plus you have to get them to paste code into their address bar – there’s no way to do it without getting them to do that.

Facebook Easter Egg: Pirate Language
Here’s a nice little facebook easter egg for you: Go to the language settings page and scroll to the bottom of the list of languages, and somewhere around there you should see “English (Pirate)” in the list of supported languages.

Choose that language option and avast ye sails fer much facebook silliness.

Facebook Easter Egg: Konami

Click in your status update box and type the following: [up] [up] [down] [down] [left] [right] [left] [right] b a [enter], and then click anywhere on the page to see lensflares:




Tuesday, August 23, 2011

CMD Hacking commands

CMD HACKING COMMANDS


First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:

Code:

Code:
nslookup net view net use net user ping tracert arp route nbtstat netstat ipconfig
In case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy...

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command.

Code:

Code:
ping x.x.x.x (x is the IP address)
or
Code:
ping www.whatever.com (www.whatever.com is the website you want to ping, but you don't know the IP)
OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don't know its IP(and you want to find out).

nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

Code:
Code:
nslookup (enter) set type=mx (enter) yahoo.com
This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for "How to spoof email", then look for my "How to spoof email tutorial"http://www.infowar.com/forums/showth...&threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

Code:
Code:
tracert x.x.x.x (x is the IP address)
or
Code:
tracert www.whatever.com (www.whatever.com is the website you don't know the IP)
4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

Code:
Code:
arp -a
5) route : This command will show you the routing table, gateway, interface and metric.

Code:
Code:
route print
6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

Code:
Code:
ipconfig
or

Code:
Code:
ipconfig /all
this command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type...

Code:
Code:
ipconfig /release (this will release your IP) ipconfig /renew (this will renew your iP)
OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.

Code:
Code:
netstat
or

Code:
Code:
netstat -a (this will show you all the listening ports and connection with DNS names) netstat -n (this will show you all the open connection with IP addresses) netstat -an (this will combined both of the above)
8)nbtstat : This command will show you the netbios name of the target box.

Code:
Code:
nbtstat -A x.x.x.x (x is the IP address) nbtstat -a computername
net view x.x.x.x or computername (will list the available sharing folders on the target box)


Now some hints:

Code:
Code:
net use \ipaddressipc$ "" /user:administrator
(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

Code:
Code:
net use K: \computernameC$
(this will create a virtual drive on your "my computer" folder)

OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.

And least but not last, the "help" command.

Code:
Code:
whatevercommand /help
or

Code:
Code:
whatevercommand /?
This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.

How to Check windows experience index

Right click on my computer then you will see following image then click on windows experience index which is located under system category

Then this screen will appear then click refresh now button, if you have installed new hardware there will be a message new hardware detected.

now you can see your windows experience index which describe the performance of your computer

What are those indexes means?

1.0 to 1.9 - Basic performance. Even a component with a 1.0 subscore meets the Windows 7 minimum requirements.
2.0 to 2.9 - Enhanced performance. Windows Aero may be available.
3.0 to 3.9 - Windows Aero will be enabled.
4.0 to 4.9 - Good performance with high-resolution displays and multiple displays.
5.0 to 5.9 - Capable of running high-end video games, 3D modeling applications, and high-end video editing applications.
6.0 to 6.9 - Supports DirectX 10 graphics with high frame rates at high resolutions.
7.0 to 7.9 - Highest performance level available. Reserved for systems with SSD hard drive, high-end graphics card, and multi-core (i.e. 8 or more) processor.

Networks

Ethernet Cables for Connecting Computers

Network Basics


Network Basics

Networks begin when two or more computers are connected so that information can be shared. In order to connect to any kind of network, a computer requires a network card and CAT5 or CAT6 cables. (If the computer has a "wireless" network card, radio signals can be used in place of the cables.) A network also requires a piece of equipment called a switch, which acts as a central routing "hub" for the information being shared. A switch is kind of like a mail room in a large company. It makes sure the addressed messages get to the right recipient.
You may have heard the term LAN or WAN. LAN stands for Local Area Network, and usually denotes a network of computers which are fairly close together, say in the same building or office. WAN stands for Wide Area Network. WANs usually connect local area networks which are separated by great distances. (For example, a larger company may have an office LAN in Seattle, and an office LAN in Boston. These two LANs could be connected via a WAN data line.)

Peer to Peer Networks

The most basic type of network is a called a peer to peer network. This type of network consists of several computers which are connected to each other. The "network" consists of shared folders located on computers within the network.
These folders are set to a "shared" status, so that other people connected to the network can access them. Each shared folder is accessed by the users of the network, who set up a certain drive letter (say H:) as a "pointer" to the shared folders on other computers. In addition, any printers connected to any computer can be shared to other network users.
Peer to Peer Network
Here's an example. Susan and Joe work together in a small office and need to look at files on each other's computers. Susan creates a folder called "SusansFiles" on her computer and sets it up as a shared folder. Joe can then use the network connections to "see" the folder called "SusansFiles".
He sets up a permanent shortcut called "H:" drive to the folder called "SusansFiles". Now when he turns his computer on, Windows Explorer will show the folders on his computer's C: drive, the CDROM D: drive and the shared H: drive as his available file locations. Susan can do the same with a folder that Joe shares out from his computer.
Benefits of a Peer to Peer Network:
  • A peer to peer network is inexpensive to set up. It uses the built in networking capabilities of Windows XP Professional (or Vista Business), so no special software is needed. It allows for file and printer sharing, and can be an adequate choice for a very small office.
Limits of a Peer to Peer Network
  • Peer to peer networks are dependent upon the computer knowledge of each employee, as certain rules must be followed in order to minimize network interruptions. If a user shuts down his machine in the middle of the day, other users on the network lose access to the files in that machine's shared folder. In the picture provided above, the laptop might only connect to the network when an employee is not traveling. Any files stored on that laptop are not available (and may not be backed up) when that employee is out of the office.
  • Network and data security are weak.
  • Files are not centralized, so getting a back up of all critical files is more difficult.
  • Ongoing tasks like anti-virus scanning and Windows updates are localized on each machine. Updating virus definitions and patches has to be done manually at each machine, which is time consuming.

Client Server Networks


A more common type of network is called a client server network. This type of network uses a central server and specialized network software. The server is dedicated and is only used to store files and run server tasks. The computers which connect to the server are called clients and these are the machines the company staff would use.
The server acts as the "hub" of the network, and does most of the "behind the scenes" maintenance and storage. Common server network operating systems include Windows Small Business Server 2003 or 2008, Windows Server or Linux.

Benefits of a Client Server Network
  • The server stores all of the shared files for each user.
  • The server runs the file backups which can be scheduled in the middle of the night, minimizing network interruptions.
  • The server manages user security, and insures that all users who access the network are authorized to do so.
  • The server manages printer sharing and acts as a central repository for the printer drivers and settings.
  • The server manages other common tasks such as internet access, email routing, Windows updating and anti-virus definition management.
  • The server can also share software applications out to multiple users.
  • The server can also provide for an "Intranet", an internal website which holds shared company information such as news announcements, HR policies, training documents, and more.
    In short, a client server network provides for easier network administration, and provides a much more robust environment in which provide secure and manageable access to company data.

Client Server Network
Limitations of a Client Server Computer NetworkThe benefits of a client server computer network are substantial, but there are some limitations.
  • A server based computer network is more expensive to implement. Server computers are powerful machines with built-in redundancy and other hardware to provide data safety. Hence, they cost much more than a simple desktop computer.
  • The server network software is also much more powerful, complicated, and must be installed correctly to run all of the required tasks, and so the cost is higher for both the software and installation charges.
  • The server is a critical point of failure. If it goes down, the entire network comes to a halt. This drawback can be minimized with the installation of redundant drives in the server (so that if one fails, the others will still be working), and even a second server that can take over if the primary server fails completely. Cost then becomes the only issue.

Which Computer Network is Best For Your Business?


Peer to peer computer networks are reliant upon the computer users, so employee behavior is a major factor. Peer to peer networking could work for your business if you have the following:

  • Computer savvy employees whom you trust.
  • Low employee turnover.
  • Five or less employees.
  • Newer desktop or laptop machines with lots of memory and hard drive space.
  • A large capacity portable data storage unit for backing up files and taking them off site.
  • Time and motivation to keep the computer patches and maintenance up to date.

A client server computer network is more secure, easier to manage, and would be a better solution for your business if the following is true:
  • You want to secure your company data and provide access to certain files and folders to only a few employees.
  • Your business experiences high employee turnover.
  • You have more than 5 employees.
  • A secure, complete backup of all of your critical business data is needed.
  • A central information repository for your employees would be helpful.
  • You want to have a cohesive email solution using a single domain address (i.e., jack@yourcompany.com, megan@yourcompany.com).

Think of the cost of implementing a network as an investment in your business. As your business grows, implementing a computer network will help your employees share information and resources, and in the long run, will play a major role in the successful growth of your business.

Recreate a Deleted Shortcut


Recreate a Deleted Shortcut
Let's say you accidentally deleted the shortcut for Spider Solitaire from the All Programs menu. Here's how you get it back:
  1. Right Click on the Windows Desktop.
  2. On the menu that appears, choose New, then Shortcut.
  3. A Create Shortcut dialog box appears.
  4. In the shortcut path field, type the path that you see in the picture below:
    Shortcut Dialog box
  5. then click Next.
  6. Type Spider Solitaire as the name of the shortcut, then click Finish.
  7. You should now have a Spider Solitaire shortcut on your Desktop.
Most of the non-Internet games for Windows are in that Windows System32 folder, so you can use the same steps above add the name of the game that was deleted.
Here are the game names for convenience:
  • Hearts: mshearts.exe
  • Spider Solitaire: spider.exe
  • Solitaire: sol.exe
  • MineSweeper: winmine.exe
  • Freecell: freecell.exe
Pinball has it's own folder: Look under C: drive, Program Files, Windows NT, Pinball, Pinball.exe
Alternatively, you can remove and re-add them as components of Windows. Go to:
  1. Control Panel | Add or Remove Programs
  2. Add/Remove Windows Components
  3. Accessories and Utilities
  4. Details button
  5. Games
Uncheck the games you are missing from your Games menu, and OK your way out. Then go back in and check off the same games, and OK your way out. That should put them back in your menu. 

How to Cut and Paste "Clean" Text from One File to Another in Windows

How to Cut and Paste "Clean" Text from One File to Another in Windows
This Windows Tutorial is one of my most popular.
Say you want to copy some text from a webpage into a Word document. You probably already know that you can copy and paste the text using the generic steps below:
  1. Highlight the text you want to cut and paste with your mouse, and then press Control + C on your keyboard.
  2. To paste the text, put your cursor in the receiving document, and press Control + V to paste it.
Simple, right? Except that when you copy from a webpage or from another Word document, all the formatting comes with it, and messes up the formatting of the document you're working in. Annoying.
You could paste it into a new page and manually remove all the formatting, but here's an easier way:
  1. Highlight the text you want to cut and paste with your mouse, and then press Control + C on your keyboard.
  2. Open Word, and click on the Edit menu.
  3. Click on Paste Special
  4. From the Paste Special dialog box, choose Unformatted Text and click Ok. Voila, nice clean text!

How to Create Strong Passwords


How to Create Strong Passwords

Choose a password with the following criteria:
  • At least 8 characters in length
  • At least 1 number
  • At least 1 special character like & or *
  • Both upper and lowercase characters.
Passwords with difficult combinations make it harder for password cracking tools to figure out your password.
Don't use personal information such as birthdays, children names, or first and last names when creating a password. Avoid using words or phrases that could be found in a dictionary or easily guessed.

Password Safety 101

Don't share your password with others including your spouse, children, Help Desk personnel or System Administrators at work. IT professionals at your job or Internet Service Provider (ISP) will not normally ask you for your password.
If the IT professionals at your job need it, give it to them in person and ensure you change it as soon as they are done with their task. You may even want to change your password first to something generic, give the IT person THAT password, then change it back when they are done with their task.
Be aware of a common tactic used by hackers, in which they call up unsuspecting users and pretend to be from the computer support staff. This is more likely to happen in very large companies where users might not know everyone on the IT staff.
Another tactic is to send a legitimate looking email asking the user to type their password into what looks like a legitimate site; this practice is known as "phishing." Be aware that a legitimate businesses will NEVER ask you to submit personal information via email.
Also, be vigilant.. these phishing scams are not easy to spot. I make my living as an email administrator, and I was almost taken in by one of these scams. The email was supposedly from my AT&T Internet service account. I pay it each month on one of my credit cards. The email was "notifying" me that my credit card had expired and that I needed to update my credit card information to continue my service. There was just enough truth in the way the email was written that I actually started to click on the button to do it. Thankfully, my brain kicked in and I caught myself before I made the blunder.
If you use the web to access important personal information, such as online banking or health records, ensure that the website offering the service uses some type of secured method of encryption.
You can determine this by checking to see that the website's address (URL) begins with an "https://" (Note the extra "s").
Also, look for a yellow lock in the bottom right hand corner of the website page. That's an indication of SSL security being enforced.

Computer Hardware maintenance Tips


Computer hardware troubleshooting is a lot easier than software troubleshooting. Either your mouse, monitor or keyboard works or it doesn't. Here's a list of tips, questions and advice to fix your computer hardware problems.

Monitor Questions and Tips

Computer hardware troubleshooting for monitors is complicated by the fact that there are so many different monitor manufacturers.
The hardware questions below are basic and common to most monitors. If you have a monitor issue that isn't addressed here, a good place to check for answers is at the monitor manufacturer's website.
Where do I adjust my monitor settings?
    Monitor adjustments are located in the Display properties of Windows. To get there:
  • Right click on your Windows desktop and left click Properties.
  • Click on Settings and then Advanced button.
  • Alternatively, some of the newer monitors install a configuration manager. It would have it's own tab on the Advanced properties window (For example, NVIDIA is common monitor configuration manager).
My monitor display looks strange.
This is one of those computer hardware troubleshooting questions that is best answer in person. However, there are some basics you can check:
    If your monitor has black around the edges or the image displayed looks weird, you may have the wrong resolution chosen for that monitor. For instance if you have a wide screen monitor and choose a square resolution like 1024x768, it won't display correctly. In addition, the wrong monitor driver might have gotten installed. Go to the monitor manufacturer's website to download the correct driver and install it.
My computer screen is sideways!
    Some computer monitors can be rotated, so there are video cards which support that rotation. For example, web designers and artists use rotating wide screen monitors to look at long pages. To turn ON this feature, you probably pressed CTRL + ALT + Left Arrow. To turn if OFF, simply press CTRL + ALT + Up Arrow instead.
Monitor says "No signal or No signal input".
    Usually this means your monitor is turned on, but your computer is not. If your computer is on, and you get this error, it means the cable from the computer to the monitor is loose or unplugged.
How do I change the resolution of my screen?
  1. Right click on the Windows desktop (where there is no icon).
  2. Click on Properties from the menu that appears.
  3. Click on the Settings tab.
  4. Slide the resolution bar to where you want it to be. An 800x600 will look larger than a 1024x768 resolution.
  5. Click Apply. Windows will give you a dialog box asking if you want to keep the new resolution. Click Yes.

I've got mouse problems.. the cursor is acting strange.
Computer hardware troubleshooting for mice is different for wired versus wireless mice, so I've broken the answer up for both types.
Wireless Mice:

    My wireless mouse cursor jumps and won't go where I want it to go. Solution: Turn over the mouse and see if there is lint or hair or something blocking the hole where the optical laser head is located. It will be a hole in the bottom of any optical mouse.Also, make sure you aren't using a reflective mouse pad. Dell used to make a mousepad that had shiny diamond shapes in it.. My optical mouse would act crazy on that pad, because the shiny pattern was interfering with the laser positioning.

Wired Mice:

    My wired mouse cursor won't move. Solution: This is usually an issue with the old track ball mice. Gunk builds up on the wheels and ball of the mouse, and causes it to stick. To fix it, unscrew the cap on the bottom of the mouse that holds in the ball, and swab the insides out with a Q-tip soaked in alcohol. Do not wash the mouse in water, unless you want to buy a new mouse.

My new mouse has features I want to turn off or on.

    To turn mouse features on or off, go to Start, Control Panel, Mouse. You can see all the tabs and features there.

Computer hardware troubleshooting can be complicated, but most of the time, the problem is a basic connection or driver issue.
The list above goes over the most common computer hardware troubleshooting problems and answers. I don't profess to be a hardware guru but if you've got a basic question I didn't answer here, let me know, and I'll do my best to help you out.

General Computer Maintenance Tips

General Computer Maintenance Tips:

  • Keep all of your working files in one folder. The My Documents folder is offered by Windows expressly for this purpose. The benefits of keeping all your files in one place are multiple. One, you know where all your files are, two, it's easy to back them all up at once, and three, your machine will run faster.
  • Don't put your personal files on the root of the C: drive. If you store a large number of files in the root folder, you could corrupt your disk file table which could lead to a "NTLDR is missing" error message when you boot the computer. Very bad. If you have personal files on the C: drive now, move them to the My Documents folder.
  • Uninstall programs that you are not using. But don’t just delete the program. Remove it correctly so you won’t cause Windows errors. Go to Start, Control Panel, Add or Remove Programs. Find the program you want to remove in the list, and click the Remove button.
  • If you download a zip file and expand it, delete the original zip file when you are done.
  • Store your hardware drivers and purchased software installer files off your hard drive. A flash drive works great for this purpose.
  • If you aren’t already using one, get a good surge protector and plug your computer and peripherals into it. If you live in an area with bad lightening storms, unplug you computer and peripherals during the storm.
  • Practice safe computing. Don't accept software or downloads for which you didn’t ask. Delete any suspicious email without opening it. And even if the email came from your best friend, don't open any email attachments with the following extensions: * .exe, .com, .vbs, .bat, .mdb, .reg, and .js

Scheduled Computer Maintenance Tips:

Daily computer maintenance tips
  • Update your anti-virus scan and anti-spyware definitions, if they aren’t being done automatically.
  • Back up any critical files that you have changed today to your flash drive.
Weekly computer maintenance tips:
  • Make sure your anti-virus and anti-spyware programs have been updated with the latest definitions, and run a full scan from both programs.
  • Reboot your computer. (If you shutdown your computer each night, disregard this tip). If you leave your computer on all the time, definitely do this. It will reset the RAM, and your computer will run much better and faster.
Monthly computer maintenance tips:
  • Clean up your temp files, your temporary internet files, and other junk files about once a month. To do this easily, you can either download my favorite program for cleaning, CCleaner or run the built-in Windows Disk Cleanup tool.
  • Ensure you have the latest Windows updates installed. Go to Internet Explorer, Tools, Windows Update. Click on the Custom button. (I always use the Custom button so I can check what’s going to be installed before it gets installed). Windows update may ask you to download and install the latest version of itself. Go ahead and do that, then click Close when it’s finished, and then Continue. It will then check again for real updates and offer those. Choose which updates you want to install. Uncheck the ones you don’t want to install.
  • Clean out your email, paying special attention to your Inbox and Sent box. The easiest way I’ve found is to sort your email box by size of the message, and delete the largest unneeded emails first.

Quarterly computer maintenance tips:

  • Change your passwords (Yes, I know this is a pain, I hear you groaning. But it’s really a good idea to do this).
  • If you have a mouse with a roller ball (non-optical) clean it out. Use a Q-tip and some isopropyl alcohol to clean the ball and the internal rollers. Remove any caked on grease, oil, and dust that may have accumulated.
  • Check to see if you need to defragment your computer’s hard drive. To do this in Windows XP, go to Start, All Programs, Accessories, Systems Tools, Disk Defragmenter. Run an analysis first by clicking the Analyze button. Go do something else while it runs. Windows will tell you if it needs to be defragmented. If it does, click on the Defragment button, and again go do something else while your computer runs this.
    For Windows Vista, this computer maintenance tip is a little different: Go to Start, All Programs, and click on Accessories. Find Systems Tools, Disk Defragmenter and click on it. Vista will ask you for permission to continue. Click Continue. Vista doesn't give you the ability to choose to defragment, it just assumes you want to and presents a schedule to do so. You can stick with the suggested schedule, or modify it. If you want to kick off the defrag process immediately, click the Defragment Now button. It will then ask you which drive you want to defrag. Uncheck the drives you don't want to defrag, and then click OK.
  • Check all your computer cables and make sure they are plugged in tight, and not being pinched or pulled in a way that is damaging them.
  • Check your C: drive (hard disk) for disk errors. NOTE: please make sure you have a current backup of your files before you run a check disk command. (Also, do this immediately if you see a message stating that your Windows “volume is dirty”).
    To run a check disk manually on your C: drive, do this:
    1. Click Start, select Run.
    2. In the box, type cmd and click Ok. In the black DOS window, type: chkdsk c: /f (The /f command automatically fixes any errors encountered.
    3. Go to Start, Shutdown, and restart the computer. When the computer restarts, it will run chkdsk automatically. The Check Disk process could take over an hour, so schedule this when you have something else non-computer related to do. On rebooting the PC, you will see a window that shows the progress of the disk check. When it's finished,, it will boot back to the normal version of Windows.

Disclaimer included below. Opening your computer case could void your warranty, and expose you to possible electric shock. Please be careful.
6 month computer maintenance tips:

  • Go on dust patrol. FIRST, TURN OFF and UNPLUG your computer from the electrical socket. Blow out your keyboard with a compressed air can, and then turn it over and tap it with your hand a few times to shake out any other junk. Brush off the dust bunnies from your PC fan (and any other parts in the back of the PC). Also, open the computer case and GENTLY blow or vacuum out any dust in there, especially around the CPU chip (the big square chip on the mother board).
    MAKE SURE you touch something metal to ground yourselfbefore you open the case and reach in there. Even the slightest static electricity zap can ruin a computer chip. This step is especially important if you live in a dusty place like Wyoming.

Annual computer maintenance tips:
  • Check to see if you have the latest hardware drivers loaded for your printer, monitor and other peripherals.

I hope these computer maintenance tips help your computer run better and faster.

Monday, August 15, 2011

Create table in mysql

click here to download DBMS 1 practical 5
answers for dbms 1 practical 5


create table dept_1 (
dno int primary key,
dname varchar(30)
);




create table emp (
eno int primary key,
nic varchar(30),
ename varchar(30),
address varchar(30),
dnum int
references dept_1(dno)
);




create table project_1(
pno int primary key,
pname varchar(30),
location varchar(30),
);


create table worked_on(
eno int,
pno int,
hired_date datetime,
houres int,
primary key (eno,pno),
constraint worked_on_fk1 foreign key (eno)
references emp,
constraint worked_on_fk2 foreign key (pno)
references project_1


);






insert into dept_1 values(5,'IT')
insert into dept_1 values(6,'IS')
insert into dept_1 values(7,'CSN')
insert into dept_1 values(8,'IT')




insert into emp values(100,'901250087V','Smith,John B','731 Fondren Houston',5)
insert into emp values(101,'895290452V','Wrong, Franklin T.','638 Voss Houston',5)
insert into emp values(102,'923859070V','Zelaya,f Alicia J.','33321 Castle Spring',4)
insert into emp values(103,'918257988V','Wallace, Jennifer S','291 Berry Bellaria',4)
insert into emp values(104,'904850045V','Narayan, Remesh K.','975 Fire Oak Humble',5)
insert into emp values(105,'889950600V','English, Joyce A.','5631 Rice Houston',1)
insert into emp values(106,'915850123V','Jabbar, Ahamad V','980 Dallas Housr',1)




insert into project_1 values(1,'Road Construction','Bellaire')
insert into project_1 values(2,'Power plant','Sugarland')
insert into project_1 values(3,'Reproduction','Houston')
insert into project_1 values(4,'Recycling','Stafford')




insert into worked_on values(100,1,12-04-2011,12)
insert into worked_on values(101,2,25-02-2011,1)
insert into worked_on values(102,3,15-05-2011,20)
insert into worked_on values(103,4,02-06-2011,50)
insert into worked_on values(104,5,08-06-2011,5)
insert into worked_on values(105,6,12-07-2011,3)
insert into worked_on values(106,7,20-07-2011,40)
insert into worked_on values(100,1,18-05-2011,1)
insert into worked_on values(100,1,01-07-2011,11)
insert into worked_on values(100,1,27-06-2011,1)

Thursday, August 11, 2011

Database management systems DBMS

download practical 3 question DBMS 1
answers for dbms 1 practical 3

--Q1
select *
from customer
order by customer_num desc;


--Q2
select *
from customer
where lname like '[A-G]%'
order by state,city;


--Q3
select stock_num,manu_code,unit_price as old_price,unit_price*115/100 as new_price
from stock
where manu_code='ANZ';


--Q4
select *
from items;


select COUNT(*)
from items;


--Q5
select *
from customer


select COUNT(*)
from customer;


--Q6
select *
from orders;


select AVG(ship_charge)as average
from orders;


--Q7
select MAX(ship_charge)as max, MIN(ship_charge)as min
from orders;


--Q8
select COUNT(*)
from stock
where description='baseball gloves';


--Q9


select *
from stock;


select AVG(unit_price)
from stock
where description='tennis racquet';


--Q10
select stock_num,manu_code,unit_price as old_price,unit_price*115/100 as new_price,
round(unit_price*115/100,1)
from stock
where manu_code='ANZ';


--Q11
select  sum(unit_price) as sum
from stock;


--Q12
select MAX(quantity) as highest_quantity_ordered
from items;


--Q13
select *
from stock;


select COUNT(distinct manu_code)
from stock;

Related Posts Plugin for WordPress, Blogger...

your comments