Showing posts with label Computer Tricks. Show all posts
Showing posts with label Computer Tricks. Show all posts
Hi Friends! Modern age is going towards digitization. Railway,Banking,Corporate,Education etc. are shifting towards digital platform.We can book tickets or can shop easily just in a click, even our surveillance system became strong by using digitization. We are using programming software. Mobile, Computers, IP cameras, Drones, Radars and many more resources are using on digital platform. Internet is the medium through which we have connected these resources & avail benefits. Softwares through which human & machines can connect & share data.But.. think a moment , are we safe? Out data is secure? no one watching us??? if yes then we should be aware.
Cyber crime may be happen & breach your data, it can disrupt your security & may be destroy your data. On these days we watch news related to "cyber crime happen in Australia.." NAHI was hit by ransomware attack suffered lose of data". Day to day we here these types of news. We need to be alert secure ourselves. So,our resources may not be tracked by hackers.

Awareness is key ingredient in success. So lets know How to Protect your PC from virus & cyber attack.


Turn on your computer Firewall. It is designed to actually filter threatening communication.I allows or block either inclusive of exclusive parameters. It is working like an access control list, which has particular set of guideline that allow or resist access to specific computer communication.

Keep your computer up to date.So that the OS patches will be up to date, it is just like the immunity booster for OS against the newly developed misbehavior programs.

Only download programs from websites that you trust. If you're not sure whether to trust a program that you want to download, enter the name of the program into your favorite search engine to see whether anyone else has reported that it contains spyware.

Read all security warnings,license agreements,and privacy statements that are associated with any software that you download.

Never click "Agree" or "OK" to close a window that you suspect might be spyware. Instead, click the red "x" in the corner of the window or press Alt + F4 on your keyboard to close a window.

Require employees to use strong passwords and change them periodically: A hacker may try to access your account more than once over a period of time. Changing your password reduces the risk that they will have frequent access. A keystroke logger is surveillance technology used to record keystrokes. Regularly changing your password makes it less likely that passwords obtained this way will be useful for any length of time.Keep your password length between 8-15 characters must be contains alphanumeric & special character.

Install anti-virus software: AV periodically scan your computer to keep protect your files, emails & web browsing activities. Antivirus gets update periodically & install updated virus definition.

Use email with caution: Users of email should be careful when they are using it. Hackers can exploit an email in many different ways; hiding viruses in attachments for example. It is very important to not open or read emails from email addresses you don’t recognize, they should be deleted from your inbox immediately.

Use internet carefully: Do you know even the safest website can contains spyware & malware, on a single click they can install in your computer. Avoid clicking on popups, ads, graphics and links to other websites.

Be Aware... Be Safe..😊😉😎




Computer Virus:- 

Computer virus is a small program of malicious code, is written to alter the way of computer operation & spread it from one computer to another computer. It is similar to biological or flu virus which cannot reproduce without host cell. Computer virus spread through the programming files such as files or documents. It also spread by attachments in email messages or by instant messaging messages. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download.

A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do.

Symptoms of virus active in your system:-

  • Pop-ups will appear frequently on your desktop:- Frequently pop-ups will appear on your computer screen & show you message that your computer need protection, download any fake antivirus or unwanted software. This may be due to any spyware available in computer or rogueware (Fake antivirus).
  • Computer running slow :- If suddenly your computer running slow. It may be a symbol of virus, Worm, Trojen , which running tasks which consume more space & slow down your computer.
  • Home page redirect automatically: - uhh hoooo.. my home page redirect automatically to another website.
  • Multiple tabs open when open web browser which neither is nor requested by you…
  • Cannot connect to the internet or internet is very slow….. Yes it may happen due to malware which, establish another session through your internet connectivity & you may face this issue.
  • My antivirus & firewall getting disappeared.. any program like this may be stop working of going to disappeared due to failure of some program in your computer, but when your  all data security program disappear then you need to alert you are almost certainly infected.
  • Where have my data gone…..!!!! Usually no body asking these types of questions but.. Some types of thread may move your data from one location to other or encrypt them.
Till now you have familiar more words like Worm, Trojan horse, Spyware, Rouge ware, Malware etc.. so lets know these term.

What is worm?

Worm is a self replicating computer program that spreads without human interaction. Mostly it spreads from emails attachments that infect the computer when they are open. Worms uses system resources like hard drive & bandwidth by overloading a share network. It also steal data, install a backdoor and allow hackers to gain system control. So, keep monitoring your bandwidth , keep eyes on your hard drive, check time ti time for missing files of new files because worms delete and replace files in your computers.

What is spyware?

Spyware is a type of malware which can install on your computer without your knowledge. It can collect personal information secretly from your computer. Spyware can monitor your usually web browsing  activity, it may install un necessary software in your system & guide your web browser according to him or may control your system.

What is a trojan horse?

Trojan horse is a malicious program is not spread by themselves but they spreads from virus, worms or downloaded software.It can spread like....You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cyber criminal, and the file you clicked on — and downloaded and opened — has gone on to install malware on your device.When you execute the program, the malware can spread to other files and damage your computer.

What is rogue security software?

A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, Shield, Security, Protection, or Fixer. This makes them sound legitimate. They frequently run right after you download them, or the next time that your computer starts. Rogue security software can prevent applications, such as Internet Explorer, from opening. Rogue security software might also display legitimate and important Windows files as infections.

What is malware?

Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system. Examples of malware include the following:

  • Viruses
  • Worms

  • Trojan horses
  • Spyware
  • Rogue security software

👆How to Protect your PC from virus & cyber attack.



Security awareness is health for digitization.So, Guys....Be aware Be safe.!!!! 😊😊😊😊😊


Processor/CPU Overview:-


Central processing unit understand all the activities between human & computer then, process the the instruction further as a command of a computer program by performing the basic arithmetical, logical, and input/output operations of the system.CPU is basically brain of computer, it stores data, immediate results & instructions.It performs all type of data processing operations.It controls the operations of all parts of the computer. 




CPU has three main component:-   
  • Memory or Storage Unit
  • Control Unit
  • ALU(Arithmetic Logic Unit)


Memory or Storage Unit
This unit can store instructions, data, and intermediate results. This unit supplies information to other units of the computer when needed. It is also known as internal storage unit or the main memory or the primary storage or Random Access Memory (RAM).Its size affects speed, power, and capability.
Primary memory and secondary memory are two types of memories in the computer. Functions of the memory unit are :-
  • It stores all the data and the instructions required for processing.
  • It stores intermediate results of processing.
  • It stores the final results of processing before these results are released to an output device.
  • All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual data processing operations.
Functions of this unit are :-
  • It is responsible for controlling the transfer of data and instructions among other units of a computer.
  • It manages and coordinates all the units of the computer.
  • It obtains the instructions from the memory, interprets them, and directs the operation of the computer.
  • It communicates with Input/output devices for transfer of data or results from storage.
  • It does not process or store data.
ALU (Arithmetic Logic Unit)
  • Arithmetic Section
  • Logic Section
Arithmetic Section
Function of arithmetic section is to perform arithmetic operations like addition, subtraction, multiplication, and division. All complex operations are done by making repetitive use of the above operations.
Logic Section
Function of logic section is to perform logic operations such as comparing, selecting, matching, and merging of data.

CPU Features :- 


Speeds and Feeds :- Processor performance is usually a number in either MHz (megahertz) or GHz (gigahertz.) That number represents how many times the internal clock inside the CPU ticks in cycles per second. The clock inside a 2.5GHz CPU ticks 2.5 billion times each second.
But clock frequency isn’t a complete measure of performance. Efficiency — how much work can be done by the CPU in each clock cycle — is also important. This is measured in terms of instructions per cycle, often abbreviated as IPC. A CPU with a very high clock frequency, but low IPC, may not perform as well as a CPU with a lower clock frequency and high IPC.
Cache :- Fast access to memory is important to a PC processor, and that’s what your cache is for. Waiting for data to come in from system memory can make your CPU inefficient. The memory hierarchy is a way to show where memory bottlenecks exist. The CPU registers hold the data actually being used in calculations and comprise the fastest memory. The next fastest are levels 1 and 2 caches.
 These are small amounts of fast memory built right onto the CPU core. Level 1 (L1) cache is faster but smaller than Level 2 (L2). Some CPUs have a third level, which is often shared between different CPU cores. Even the L3 cache is much faster than your computer’s main memory.
 If an item of data is not in the cache, the CPU must wait until the data is retrieved from memory. In the slowest case, the data isn’t even in main memory, but must be fetched from the hard drive. However, while waiting for that data to be retrieved from system memory, the CPU can turn to a different task to help keep the PC running.
Cores:- Modern PC processors are multi core. Each core is as fully functional as the others. Each has its own cache, but can communicate with other CPU cores as needed. Cores can also share information in a cache, such as the level 3 cache built into AMD Phenom II processors. AMD’s Accelerated Processing Unit (APU) technology adds a new concept — the GPU core — which is better at certain kinds of math than the traditional core. The technology, originally developed for AMD’s Direct X 11-capable line of graphics cards, brings sophisticated graphics capability and parallel compute technology directly onto the CPU.
Current time you can see the cores like the mention below:-
  1. Dual Core Processor (It has two cores)
  2. Quad Core Processor (It has four cores)
  3. Hexa Core Processor (It has six cores)
  4. Octo Core Processor (It has eight cores)
  5. Decca Core Processor (It has ten cores)
Bandwidth:- CPUs are part of a larger platform. They need to communicate with the outside world. Data buses (circuits that carry the data) communicate with the chip sets built onto the motherboard. The chips act as traffic cops to route data to the outside world, for example to the PCI Express slots, which communicate with discrete graphics cards and other expansion cards, and USB ports, which communicate with external storage, keyboards, mice, etc.
 The speed of this communication is called bandwidth. It’s split into two types: memory and input/output (I/O). AMD processors have circuitry integrated into the CPU itself to handle all communication with system memory. This block of circuits is called the memory controller.

There are various companies manufactures processor but, below mentioned are the top processor manufacturing companies :-
  • Intel
  • AMD
  • Qualcomm
  • NVIDIA
  • IBM
  • Samsung
  • Motorola
  • Hewlett-Packard(HP)
Intel & AMD are the most demanding processor in current time. Choosing options & comparison between them:-

AMD Stands for Advance Micro Device was founded in 1969 & currently it is 2nd largest processor manufacturing company after Intel.AMD is said to offer the same basic product at the cheaper price than Intel.It consumption of power is more than Intel. AMD APUs made for gaming which contains CPU + GPU.AMD have low life/speed cpu's.

Intel Corporation was founded a year earlier in 1968  & its processors are costly than the AMD.Intel processors are power efficient.For gaming you need GPU which is not inbuilt in Intel processor  but both the processor performs well for gaming. Intel have better cpu's life/speed like Core I7 (8 cores every core have 3Ghz speed).



Tricks:-

  • Move the cursor quicker to the beginning of the previous word by pressing CTRL+Left Arrow, instead of doing it manually.

  • To get the cursor to the beginning of the next word, use CTRL+Right Arrow.

  • Recover a deleted item with ALT+Backspace.

  • Delete an entire word by pressing CTRL+Backspace.

  • Select a word you want to highlight quickly, without dragging the mouse, by double-clicking on it.

  • Highlight a whole paragraph by triple-clicking on it.

  • Make superscript and sub text by pressing CTRL + = for sub, and CTRL+ Shift for superscript.

  • Close all your windows quickly if you’re in a hurry by pushing the Windows button +D, and they will all shut immediately.

  • Rename your highlighted files quickly by pressing FN + F2.

  • Re-open your last closed tab with Shift + CTRL + T on most browsers.

  • Instead of moving the cursor to the close (X) in the corner, press CTRL + W to close the current window.

  • Take a screen shot with Windows + Print Screen.

  • Adjust any setting on your PC with the Windows “God Mode” folder, which is a centralized Control Panel for all the OS settings.                                                                                                                                                  Access this by creating a new folder named: God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}.


  • Problem Step Recorder will record all mouse clicks and take screenshots. This tool is helpful to a tech when an issue with your PC needs to be diagnosed. Use this by pressing Windows + R then type the letters “psr” & press enter.

Start recording dialogue box will be open like this 👉

You may save or review the recording steps & screenshots also....



Enjoy Guys......😊
 

How to Check Internet speed on Taskbar:-

Hello Guys!!! Generally we can check the speed of internet in our mobile phone but, not able to check in windows system. It is very easy to see now in windows machines. Let's do few steps..........

Step 1. We need to install a software. Download link is given below:-


Step 2. Open the download link & click on the Download now tab. 




Step 3. Select the software size as your windows support.



Step 4. Double click on setup to install.... but,oops!!! there are an error message. Setup could not be install in the higher version of windows 8 & more. 



Step 5. Right click on setup & go to property.



Step 6. Click on compatibility tab & check on "Run this program in compatibility mode for" Previous version of windows then click on Apply & Ok.



Step 7. Again double click on setup & let them install normally.

Step 8. Net Speed Monitor has been installed need few configuration to show on desktop. Right click anywhere on taskbar ➤ Toolbars ➤ NetSpeedMonitor.



Step 9. Yes guys!!! now you can see the Uplink & Downlink on your taskbar. Opps.. But speed is not monitored yet!!!!!!!



Step 10. Right click on the NetSpeedMonitored showing on taskbar & go to the connections. & Change or select your current connected internet driver. It may be WiFi of LAN on any other...


OK Guys Enjoy Now....!!!! 😊😊😊 






Hello Guys,

    Now I am Gonna Show You How to Get Password Behind the Asterisk, that is *******
    
Firstly we know the meaning of Asterisk:-
An asterisk is the sign *. It is used especially to indicate that there is further information about something in another part of the text.
    Follow the below steps:-

     Step 1:-  Firstly go to any login page in your web browser,(i have choose Facebook).


You can see here the password is saved under the Asterisk, and there are no any view option so you can click and view the password directly. Now, I will tell you the trick, how to see the password behind the Asterisk.
Step 2:-  Right click on the page and go to the inspect....


Step 3:- Press control + F and type password


you can see here there are 8 times password Shaun in the the search bar. You have to select input Type password for any page may be other than Facebook.


Step 4:- Now just  right click on the password found in yellow highlight and click on Add attribute.


      
Step 5:- Now double click on the passwords shown in yellow highlight and edit this "password" to the "text"




Finally guys it's working now..........
you can check in the asterisk ********change to the plain text and the password is visible now.

You May Also Watch:-
How to see password behind asterisk (*******) - https://youtu.be/Hn04o0bi8rY
How to hide drive without using any software - https://youtu.be/vqw2hy59USw
xxx


           



    

Privet Browsing/incognito Tab


You know that if u want to browse something on web without being noticed by anyone, you can do it by using an option in various browsers,I will tell u how to use it :-

For Google Chrome :-

1.click on menu button of chrome.


2.A new window will be appear,click on "New incognito window" & enjoy privet browsing.



                                             Now you are in ur privet window

FOR Firefox :-
1.click on menu button


2.Then click on  "New privet window"

DONE!!!!!!!!



Hide Drives Without Using Any Software

Hi friends now u can hide your drivers without using any software.In our computer labs we see only "C" drive and think that there are no drivers are available except "C" drive,but all drivers are hidden by lab in charge...
Let see how to hide drivers without using any software :-
  • Press window + R  key. 
  • Open gpedit.msc


A new window will be appear as Local Group Policy Editor.
  •   Click & expand User Configuration >Administrative Templates > Windows Component


  • After Double click on Windows component on the right side bar Windows Explorer (for window 7 & xp) File Explorer (for window 8,8.1 & 10) 
  • Now click on Hide These Specified drives in My computer.
  • Click on Enable then choose below the drives you want to hide on Pick one of the following combination.
  • Then click Apply & Ok.

  • For Unhide Drive follow the same steps, In step 7 just click on  Not Configure then apply & OK
Thank you.

Followers

Translate

Subscribe Us

Enter your email address:

Delivered by FeedBurner

Cooming Soon

Routing Protocols

Popular Posts

Total Pageviews