Posts

Showing posts from December, 2014

What is Encryption and decryption ?

" Encryption is a technique or method used in order to convert a message or plain text into an unreadable format usually know as cypher , so that unauthorized person can not read that message except an authorized party. On the contrary decoding of cypher into plain text is know as decryption." Encryption is a powerful method usually used to encode your messages also called plain text into an unreadable format also known as cypher text, so that your message secrecy remain constant. Encryption is in existence before a long time and being used to encode messages so that enemies or an intruder can not change or read that message. From the beginning many methods has been introduced like Cesar shift cipher technique, however other techniques with more reliability has also been introduced. Encryption is used by websites while you're doing online banking and shopping. It is also used to encrypt your emails and messages on social networking site

Activate or Disable Admin account from Command Prompt

Sometimes administrator account are disabled by the companies and colleges to prevent unauthorized access in the computer. Usually it is protected by some password credential. If it is not password protected then you can easily activate it and use it. But you must have admin privileges to open command prompt as an administrator. Administrator account is very helpful to keep an eye on the other accounts in your computer. You can apply any kind of security on the other accounts to limit the access on the computer or on the internet. If you have administrator account in your possession then you have the entire leverage to do what do you want to do e.g downloading, net surfing, user's account management and so on. If your account has some admin privileges to open command prompt as an administrator then you can easily activate or deactivate admin account. Sometimes you have an Admin account but there wil

How to change Admin or other account Password from Command Prompt ?

If you want to change your account password then you need to go to control panel and then User Account and finally select change password for this account . It will ask you to type your new password twice. It is very exhausted task. If you don't want to pass through this entire process you can do this very easily by Command Prompt. With the help of a Command Prompt you can change any account password but you must have Administrator privileges. If you have administrator privileges in your account then you have the entire leverage to change any account password within two Commands. People ask many times How to change Admin or other account Password from Command Prompt ? believe me it is very easy and tricky. So to change Admin or other account Password from Command Prompt you need to follow these steps. Step 1. Open Command prompt as an Administrator or go to start and t

How to recover hidden pen drive data using command prompt?

Today lots of Computer users are in trouble because of their pen drive or USB flash drives. A common problem caused by a virus named shortcut virus, which converts all your data files inside your pen drive or USB flash drive into shortcuts and hide your actual data which may be very useful to you. You become a victim when you insert or plug in your pen drive or USB flash drive into someone's computer who has shortcut virus in his Computer. It effects your pen drive or USB flash drive as you insert your pen drive or USB flash drive into the computer which is suffering from shortcut virus. Most of the people format their pen drive or USB flash drive when encounter this kind of problem . This is not the proper solution . So now you will learn How to recover hidden pen drive data from Command Prompt ? To recover hidden pen drive data from Command Prompt you need to follow these two s

How to remove write protection from USB flash drives using cmd ?

Write protection is a feature of a pen drive which saves you from malwares , however it becomes a disaster sometimes while you don't know that how to remove write protection from your USB drive or from micro SD cards . Your pen drive or USB flash drive might become write protected because of several reasons like by changing its attributes from command prompt in an efficient way or through viruses and so forth. So follow the given steps to remove write protection from your USB drive or from memory card . STEP 1: Open command prompt or press windows logo + R keys simultaneously, and then type in run prompt cmd and then press enter, it will pop up cmd. STEP 2: Now in command prompt type your USB drive letter like M: in my case, write your USB letter instead, and press Enter. Type this command attributes clear readonly and press Enter. It will give you a message that operation performed successfully. Now you are good to go, write protection has be

What is virtual memory ?

Virtual memory is a kind of memory which is created by our operating system on a small portion of our system's hard disk according to our RAM size, in order to handle or manage more address space if RAM is not capable to hold overall address space. A common mistake done by people to consider virtual memory that virtual memory holds data but believe me nothing like that. Virtual memory only holds data address instead, i.e. called address space and your RAM also holds address space not data. When your RAM is no more capable of holding address space it transfers the rest of the address space on virtual memory , which is reserved memory space on your system's hard disk to achieve this task. You can also manage (increase or decrease) your system's virtual memory. To increase virtual memory read my PC tune up post . One important thing to let you know that people always says if you increase your virtual memory then you need not m

What are hash functions and message digests ?

" Hash functions and message digests are a way to maintain data or message Integrity, to ensure that data is not tempered or change by any means like deliberately or accidentally. Basically they include a string of digits, which is also called checksum. " Hash functions and message digest are an efficient way to manage the Integrity of data or a piece of message. They usually generates an string value i.e. called hash value or checksum. Message digest also notify to the owner when data or message is tempered or changed, and also locate the intruder and generated copies of data. There are various hash functions used to generate hash values or checksum like MD5, SHA1, SHA2, SHA3 and CRC32. MD5 and SHA1 functions are not more reliable, therefore SHA2 and SHA3 are in use nowadays. So we have learned now, What are hash functions and message digests ? And why are they used, keep learning from computerflicks. Please leave c

What is PPC?

PPC is an acronym of Pay Per Click and it is a Google strategy, which is used in order to achieve a value in Google search preferences, so that an advertiser can get benefits of first page impressions and clicks . PPC is also an alternate of SEO , because SEO is a time consuming strategy, however SEO is free, on the contrary PPC is paid and not time consuming service aids by Google. In PPC you need to handshake with Google via Google Adword tool to achieve a top most place in Google search preferences. However in PPC as a click on your AD is take place a certain and a willing or your budget amount is paid by you to Google on each click therefore named Pay Per Click. Why choose PPC? As I said above and in my SEO post PPC is paid not time consuming. If you want to come in first search page preferences in no time in order to increase your sales or business then only option to you is PPC. However if you don't want to consume money r

What are USB 2.0 and USB 3.0 ports ?

USB 2.0 USB 2.0 describes Universal Serial Bus 2.0 standard which provides maximum 480 Mbits/s which is equivalent to 60 MBPS of data transfer speed. USB 2.0 is a Unidirectional or half duplex port which lets you transfer or receive data, however one operation at a time. Because of these problems its leads developer to introduce a new port type which is a USB 3.0 port. USB 2.0 contains 4 pins for all of its operation. USB 3.0 USB 3.0 describes Universal Serial Bus standard 3.0 specifications, which provides maximum 5 Gbits/s which is equivalent to 640 MBPS of data transfer speed. The main feature of USB 3.0 are its bidirectional data transfer mode and it is ten times faster than USB 2.0 data transfer speed. You can easily recognize a USB 3.0 by its blue color. USB 3.0 still have backward compatibility means you can use all of the product compatible to USB 2.0 specifications in USB 3.0 port, however they will work on their da

What is Off page SEO (Search Engine Optimization) ?

Off page SEO is a SEO strategy of SEO, which plays second half role in the entire SEO process. In Off page optimization we basically work on other websites to optimize our website or content by creating back links, content writing and article submission on other websites. Creating links or connecting your sites with social media is also comes under the off page category. We also do Blog or news setup in off page SEO activity. The above things are basics and very important from off page SEO perspective in order to make your site more Google friendly. So in off page SEO strategy we need to create back links from other websites. It might also be helpful to drag traffic on your site. We basically submit our site URL or domain name with a brief description of our site on other website so that we can make our site more familiar over the Internet with the help of back links. Content writing and article submission also plays an important role

What is On page SEO (Search Engine Optimization) ?

On page SEO is another SEO strategy, which plays half role in the entire SEO process. In On page optimization we basically work on our website pages or content, to make our content or website niche, by keyword stuffing, title optimization, image optimization, syntax optimization means HTML tag syntax and ordering and links optimization. These are the basic things we must remember while optimizing our site in order to make it Google friendly. You need to stuff keywords in your content several times and always stuff those keywords which are relevant to people queries over the search engine by searching them on Google Adword tool. You also must remember that use the same keyword in your title tag to optimize title tag of the page. Next thing is image optimization which is also very important from SEO perspective. Always use alt attribute in image tags to give the name or brief description of the image. Never use copyrighted, massive siz

What is an HDMI port ?

HDMI stands for High Definition Multimedia Interface , is a sort of port which is used to process uncompressed video and both kind of means compressed and uncompressed digital audio signals. HDMI ports are the replacement of DVIs (traditional ports to handle High Definition). The primary focus to develop an HDMI port is just to process high definitions videos and audios. It was first introduced in HDTVs to handle HD1 (1k), 2k, 3k and they have also developed to handle 4k video quality. Because of their haigh performance and popularity many devices introduced with HDMI port thereafter. Now, laptops, digital HD cameras, projectors, play stations , game consoles and set-top boxes they all have one or two HDMI ports available to connect with an HDMI compliant device. So we have learned now, What is an HDMI port ? And why are they available in latest devices, keep learning from computerflicks. Please leave comments.

What is Asymmetric or public key encryption ?

" Asymmetric key encryption is a type of encryption, also called public key encryption. It uses a public key to encrypt a message, and only decrypt with the private key of the recipient, so called Asymmetric or public key encryption." Asymmetric key encryption is a kind of encryption which uses RAS algorithm, a well know algorithm for Asymmetric encryption, to encrypt a message. Asymmetric key encryption uses a public key of the recipient and RAS algorithm to encrypt a message and only decrypts a message when private key of the recipient is used to decrypt the message. Because in this encryption technique public key is used to encrypt a data, and decryption only takes place when secret key of the recipient is found, So there is no need to manage any key and secrecy of data also remain as it is. It is a more reliable technique than symmetric key encryption. . However Asymmetric key encryption is slower than Symmetric key encryption tech

What is symmetric or secret key encryption ?

" Symmetric key encryption is a type of encryption, also called secret key encryption. It uses a private key or secret key to encrypt a message, and also decrypt with the same key, so called secret or private key encryption." Symmetric key encryption is a kind of encryption which uses AES algorithm to encrypt a message. Symmetric key encryption uses a secret key and AES algorithm to encrypt a message and also decrypt when same key is used to decrypt it. Symmetric key encryption is faster than Asymmetric key encryption. The only problem with this encryption technique is, multiple keys are generated to distribute among people. So the management of keys and hazards of losing key secrecy are two common issues in this encryption technique. Symmetric key encryption is used by software companies to secure their products, password protected zip and PDF files and so forth. So we have learned now, What is Symmetric

What is raspberry pi?

Image
Raspberry pi is a credit card size Cabinet computer which contains a processor or CPU, RAM, ROM, VGA port, mouse port, keyboard port, USB port and a LAN wire port for Internet on a single credit card size mother board. It also contain some internal memory to store your operating system. It is really a very good Integration, because the hole computer except desktop is now available in a very small area and you can keep it in your pocket. However a down fall is still with raspberry pi that is, its configurations. A raspberry pi contains a Pentium 4 processor and approximate 128 to 512 MB of RAM and around 2GB internal storage. Raspberry pi is a future computer and it will increase its configuration in future. Raspberry pi is also inexpensive device which is available in the market around $57 to $60. So we have learned now, What is raspberry pi? And what are its configurations and size, keep learning from computerflicks . Please leave commen

How to download videos from Youtube?

So many people are worried about How to download videos from Youtube? while surfing Youtube and wants to get the desire videos. We will learn Youtube videos downloading from two methods. These are very simple you just need to follow given Methods. Method 1 In this method we're going to learn videos downloading from Youtube with the help of some editing in the video's URL this is the simplest method. Now follow the simple step and recall them whenever needed. Step . Open your favorite video in the Youtube and pause that video, now goto on the browser's URL bar and just remove www. portion and then type ss on the place of www. after doing this your URL must look like this ssyoutube.com/watch?v=aDJpKHw61jc instead www.youtube.com/watch?v=aDJpKHw61jc you not need to worry about the rest URL of your videos just put ss in the begging of the URL and hit Enter. It will lead you on a website which will give you all the related vide

How to watch Youtube when it is blocked ?

Usually Youtube is keep blocked in schools, colleges and offices to restrict the downloading and watching videos by students and employees, so that they can not download movies, videos from Youtube. The only solution of this problem is PROXY . You can watch all the videos over Youtube after applying the proxy. You will never caught by your network administrator. So we will learn now, How to watch Youtube when it is blocked ? You need to follow given few steps to start watching videos from Youtube. Step 1. First of all download the software (freegate) to access Youtube, to make an online proxy to access this website if it is blocked. You can learn it in our previous post that how to apply a freegate proxy. To download freegate Click here . Step 2. After applying proxy open youtube and enjoy. If it has some further restriction and your are not able to watch youtube yet, fol

What is flash memory?

Image
" Flash memory is a kind of non volatile memory to store your information permanently. Flash memory is a ROM circuit which let you read and write to and from, helps you get rid of traditional memory elements. " Flash memory is a kind of non volatile memory to efficiently store your information. You can read and write with flash memories. Now, one thing that was a secret for me for a long time is, flash memories are a kind of ROM i.e. EEPROM with better performance. Thats why you can delete data electrically on your drives. Don't worry you just need to give a delete command and the rest is handled by your device. There are so many applications of flash memories, they used in digital cameras, set top boxes, smartphones (mobile phones) and also has replaced hard disk drives with SSD (Solid State Drives) . Your pen drives (USB flash drives) and even your SD cards are flash memories. So we have learned now, What is fls

Change windows 7 start-up screen or boot screen

If you are tired from windows 7 boot screen or start up screen,so now you have an option to change it forever and make it according to your wish. You just need to follow simple given steps, to learn that How to Change windows 7 start-up screen or boot screen? . To do so you need to follow the given steps. Step 1. Download windows 7 boot loader here and install it on your computer. Step 2. Now open up your favorite browser and type devianart.com to download the desire windows boot loader animation to apply it on your computer start up screen or click here to get it windows 7 boot skins. You can also apply any desired image instead, to do so browse an image from your computer and apply it. You can also have a look in the preview bar in the software, that how it would look like on start-up? In addition you are also free to write any kind of text like your name and so forth on start up screen. After doing

What is fragmentation and defragmentation?

" Fragmentation and defragmentation are the contrary part of each other. Fragmentation occurs while free non use worthy space is created among files on your disk drives. Fragmentation waste your space while defragmentation is used to utilize that space efficiently." Fragmentation Fragmentation as the name implies fragments your data means when you store any data on your hard disk then it simply stores the files where it gets the place on your hard disk. So data files are fragmented and stores themselves place to place and leave the small holes or space place to place on your hard disk which fragments your disk drives. This phenomenon is called fragmentation. Fragmentation wastes your hard drive space and also reduces your data access speed. Defragmentation Defragmentation is the contrary process of fragmentation in which blank space is removed by keeping all relevant data files together. Defragmentation also

How to download software's crack versions?

This summary is not available. Please click here to view the post.

How to remove forgot BIOS password?

People usually forgot their passwords and this might be very inconvenient to them. Sometimes we apply password on our BIOS for more security reasons, which doesn't let your operating system boot up before the exact password is applied. So in case if you forget your BIOS password then you will not be able to boot or start your system even you can't boot your computer by other operating system installation. Then what happens, you totally stuck to do anything with your computer. In this tutorial we will learn that How to remove forgot BIOS passwords? by hardware and software. To do so follow the given steps. STEP 1 : Open you CPU cabinet and remove CMOS battery i.e. a small round battery which contains you BIOS password and computer timing. STEP 2 :After removal of CMOS let it outside for a while at least 10 minutes and then replace it again on its actual position. STEP 3 : Reboot your computer and you are good to go now. It might ask you to re

How to resolve fast boot or quick boot problem?

To solve fast boot problem we must first consider that, what it is? Fast boot is a new technology used to speed up computer system booting process. In fast boot technique only essential drivers of the devices are loaded on the RAM and the rest of the drivers loads after booting process of your operating system has been completed. This technique speed up booting process upto a large extent and extensively using in Intel motherboards and others. Usually keyboard, mouse and other drivers doesn't load at the time of booting so you will not be able to use these peripheral devices at the booting time. When you stuck in fast boot or quick boot problem it displays you a message on the screen would you like to use fast or quick boot on next boot or start up, and will ask you for yes or no, here is the problem begins because you can't give it any value from your keyboard means y/n just because your keyboard drivers are not loaded yet. And until you don't give it any a

How to run or operate two operating system simultaneously?

Every computer geek wants to run two operating system simultaneously. In this post you're going to learn How to run or operate two operating system simultaneously? . If you want to learn this then read the rest post carefully, it is very easy to learn. To run or operate two operating system simultaneously, you need a software named Virtual Box . There are a lot of software available over the Internet like VM ware but my recommendation is Virtual Box because it is much easier than VM ware and easy to operate for beginners. To learn that How to run or operate two operating system simultaneously? you has to pass through from given steps. Step 1. First of all download Virtual Box from Oracle vendors. Step 2. When your download has done install it in your drive which must have the enough free space of 40 GB. Step 3. Now Open Virtual box and click on NEW , it will then pop up a new window named Cr

How to solve DLL or library file missing problem?

Most of the people always face DLL or library file problem like bink32.dll missing from your computer likewise when other DLL (Dynamic Link Library) files are deleted or corrupted by viruses or by you then an annoying message start to pop up on your Desktop that this name DLL file is missing from your computer. This problem is also mostly occur when we try to install video games, and our operating system does not let us install that game because of a missing DLL file or it shows an error after installation. To solve these problems follow the given steps. STEP 1 : Note the DLL file name from the message, and then open up your favorite browser. STEP 2 : Type in Google DLLfixer.com after you get inside this website then type your DLL file name in the website search bar. After search completion you will see a DLL file in the search result same with your file name download that file it would be around 2KB. STEP 3 : Extract the downloaded file

How to speed up torrents downloads?

Most of the people wants to download softwares, movies, games and so forth quickly from torrents. You can only download fast when there are enough seeders available to the particular software, movie and other things, otherwise it might be very time consuming. So in this post we are going to learn How to speed up torrents downloads? over Internet. You can do this easily by getting the knowledge over here. There are some websites available on the Internet to make your torrents download fast. We will learn this from a website named zbigz.com . To do so you need to follow some given steps one after another. Step 1: Goto torrents site like kat.ph or you can choose your favorite one and download the torrent file it might be around 1 or 2 KB in size. Step 2: Now open your favorite browser and type in google URL bar zbigz.com . Step 3: After opening the site click on .torrent and browse your torrents file i.e 1 or 2

How to recover lost or permanently deleted data?

Usually people lost their important data because of any mistake or reason. Sometimes virus creates this sort of problem to you which is very inconvenient to most of the people. If you are facing this kind of problem that How to recover lost or permanently deleted data? you need not to worry about this at all. It is very easy to get your permanently deleted or lost data within few minutes. We're going to sort out this problem through a software named EASEUS_Data_Recovery . This software lets you recover your data from Hard Disk Drive, pen drive and even from SD cards . To get your data back you need to follow given simple steps. Step 1. Download this software and install it on your computer. Step 2. There are three options available to you. 1. Deleted File Recovery 2. Complete Recovery 3. Partition Recovery Go for first option if you have deleted your data permanently even from recycle bi

How to stop beeps after pressing the keys on your keyboard?

Sometimes your keyboard works as a piano means it gives annoying beeps seems coming out from your CPU, on pressing the every single key on your keyboard or pressing the Num lock, Caps lock keys and so forth. It happens because of sticky keys and toggle keys feature of windows operating system, so before learning that How to stop beeps after pressing the keys on your keyboard? . Let me explain you what are these keys. Sticky keys Sticky keys lets you use the SHIFT, CTRL, ALT, or windows logo keys in a single key means you don't need to press multiple keys at a time to open up something like task manager or other functions required more than one key at a time. You can merge three keys into a single key with the help of sticky keys. You can enable sticky keys by pressing the shift key on your keyboard five times and setup them according to you. If you do so then it will give you beeps on pressing the keys, if you done this

What is PROXY?

"PROXY is a service, works as a mediator between client and server in order to hide client's identity, so that nobody can hack you. Also used to access blocked or restricted websites." PROXY is a kind of service, which works as a mediator between client and server. PROXY is very close to me, because it is an awesome service. We can also consider PROXY as a helper, which listen our requests and then Interact with the server and finally take response from sever to serve us back. The system or server who does this job for us called PROXY server. Proxies are also used or helps us in order to serve Internet anonymously by hiding our original identity, so that we couldn't be hack easily by intruders. There are several softwares available on the Internet to apply proxies. VPNs (Virtual Private Networks) are also provide proxy services and they are more reliable than other third part softwares. Proxies are also used to remo

What is ISDN?

"ISDN is an acronym of Integrated Services Digital Networks, is a fast and efficient way to transmit data in the digital form over telephone lines therefore aka telephone switched networks. " ISDN is an acronym of Integrated Services Digital Network , ISDN is working since a long time, in order to transmit data e.g. voice, images, video over a channel or medium in the digital form. ISDN provides speed upto 128 kbps with 20 MHZ frequency. ISDN transmit data over telephone lines which provides speed and data without any noise or distortion, because it (data) travels in the digital form. Therefore ISDN is also called switched telephone networks. ISDN uses PSTN (Public Switched Telephone Network) as a medium in order to transmit data without any distortion, therefore it is used by many broadcasting companies which provides live telecast. There is no need of any MODEM in ISDN because data travels in th

What is Reverse Engineering?

"Reverse Engineering as the name implies is a method to reverse architecture or code of a hardware and application respectively in order to build a new product to possess it." Reverse Engineering as the name implies is a kind of Engineering but contrary to real Engineering is a methodology used by hackers to possess someone else product architecture or code. In reverse engineering, which is used by hackers or the rival companies to find out the way or process in which the actual product was created or introduced, a team of professional programmers or hardware engineers analyses a product by directly buying it from market or by getting things on the Internet to get the code of a particular software or to get the hardware design of a part accordingly by applying reverse engineering on it, in order to create a new one product and apply own copyright on it. In Engineering you code for a software but it is done reversely in reverse engineer

How to check computer or laptop's graphics memory and DirectX version?

People specially HD graphics game enthusiast always want to seek out one thing that how much graphics or video memory they have in their PC and laptop, in order to play more advanced and realistic 3D games. So If you want to know how much graphics memory do you have in your PC or laptop then follow given simple steps. STEP 1 : Just right click on your mouse on to the Desktop and click on screen resolution . STEP 2 : Now on screen resolution, click on Advanced Settings . Here you go, it will pop up a new window, which contains all information relevant to your graphics card and graphics memory. Another thing for those people who wants to play games and even they also have good graphics memory but getting problem of DirectX version, or want to check out which DirectX version they have in their PC or laptop. To know your DirectX version just follow the given steps. STEP 1: Press windows logo key + R Key simultaneously. It will pop up run window

What is a graphics card or video card and video memory?

"Graphics card also known as memory card, is a component used to process high definition images and videos, includes a RAM, heat sink or fan and GPU on a single card. It can be a PCIe or AGP card with 2D or 3D techniques." Graphics card is an external component or unit which is used in order to process your graphics like high resolution images and so forth, basically designed for high-end users like gaming freaks, who wants to process modern first-person shooter 3D games with multi texture quality and more by their graphics card. Graphics cards usually, includes a graphics processor i.e. called GPU (Graphics processing unit) and its own RAM with other components and also a heat sink or cooling fan to keep the card cool. So if you choose more memory or RAM then you will feel better performance, otherwise with less Graphics card memory i.e. its RAM your graphics card will share your system resources specifically RAM which degrades th

What is BSQL or Blind SQL Injection?

"BSQL is an acronym of Blind SQL Injection , a sort of SQL Injection, used when a customized error page is sets as a substitute of database error message in order to increase database complexity for intruders." Blind SQL Injection or BSQL is a kind of SQL Injection , which is used to find out vulnerabilities in a database system to exploit. Blind SQL is similar to SQL Injection because in both ways an intruder try to steal digital identities or data from a database system in order to exploitation. To Increase the SQL Injection complexity a developer or application programmer sets an error page as a substitute of database error message. So when a hacker apply SQL Injection attack on a database system a customized error page is returned except database error message, which makes that intruder or hacker blind to exploit with database. Eventually, this problem for hackers raise to create a new kind of SQL Injection to attack blindly on the