Tuesday, 16 September 2014

How to save bandwidth of internet

Save internet bandwidth

Secure your bandwidth of internet

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC.
You can get it back:

Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy
then Computer Configuration
then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.


In the registry editor (Start > Run > regedit.exe), navigate to HKEY_LOCAL_MACHINE\System\
CurrentControlSet\Services\Class\NetTrans.  In the NetTrans folder you should find another
folder named "000x" in which x represents a fourth digit.  Right-click on the "000x" folder
and select New and StringValue.  Rename the item that appears in the panel on the right
side to MaxMTU, then double-click it to bring up the Edit String box and give it a velue
of 1002.

How to hack Rapid share and Mega upload

Rapid share hack and Mega upload 

Hacking of rapi share

mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Hi all, This is for those who have to wait for about an hour after downloading certain amount of stuff from rapid share. To overcome this time constraint follow these steps:
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

RAPID SHARE


mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

Method 1
1.open your rapid share link 
2.then click on free.
3.As soon as timer start type this in address bar and click enter
javascript:alert(c=0)
4.a pop up message will come click ok your counter is zero just download the stu 
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

Method 2
1.Delete the cookies in your browser internet explorer or Firefox or opera or whatever u use).
2.Press start->run,type cmd.
3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.
4.Now try downloading, for many people this may work if their ISP provides a dynamic ip.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

Method 3
1.Just switch off your router or modem) and switch it back on.
2.This may work for some users Mtnl and Bsnl) and maybe some others too.

Actually these methods generally work for those people whose ISP gives them dynamic ip.
If these don't work then one more thing that can be done is to use proxies.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 4
1.Download the software Hide ip platinum from here http://rapidshare.de/files/34451917/hideipv32.rar 

2.Run it, then it will automatically chose a proxy (ip of a different country) for you. So you can easily download without any restrictions. You just have to change the proxy each time you download.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
MEGA UPLOAD
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Mega upload is very easy to hack to solve the download slots problem). Just go to http://leech.megaleecher.net/ 
Here you will find a place to put your original link. Put it there press enter and then you will get a direct link within some seconds. You are done!!!!!

mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

Multiple login in yahoo Without Using any Software

How to login multiple account in yahoo

yahoo with multiple login at same time

A single computer can be used to access more than one account,
By clicking Sign Out at the top of the any Yahoo page, you're ending your account session. You can then log in with a different Yahoo ID and password.
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login

Funny Computer Trick in internet explorer

Computer Trick with Internet Explorer

Copy and paste the java script code to the address bar of your browser 

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6) 

2: Press enter and watch your window's "shaking it".  
You can change the value of i if you wish. 

Saturday, 13 September 2014

Trick To Make Your Firefox Fast

How to make Firefox Fast

Faster Browser


Type about:config in the address bar, Then look for the following entries, and make the corresponding changes. 

network.http.max-connections-per-server =32

network.http.max-persistent-connections-per-proxy =16

network.http.max-connections = 64

network.http.max-persistent-connections-per-server = 10

network.http.pipelining = true

network.http.pipelining.maxrequests = 200

network.http.request.max-start-delay = 0

network.http.proxy.pipelining = true

network.http.proxy.version = 1.0


Lastly
right-click anywhere and select New- Integer. Name it  nglayout.initialpaint.delay and set its value to 0.
This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!

Finding IP address in Gmail

How to find out IP address of e-mail sender in gmail.com

Track the IP address of the sender in gmail.com

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is

65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender

 

 

Explorer Hot Keys

Internet Explorer Short Keys

Internet Explorer Hotkeys | keyboard Shortcuts

To Select all items on a webpage use CTRL and A.

To Copy a selected item to the clipboard use CTRL and C.

To Paste an item from the clipboard into a document use CTRL and V.

To Add the current page/document to your favorites use CTRL and D.

To Open the IE search utility use CTRL and E.

To Open the FIND box to search the current document use CTRL and F.

To Open the History utility use CTRL and H.

To Open the Favorites utility use CTRL and I.

To Go to a new location/document use CTRL and L. Also CTRL and O.

To Open a new Explorer window use CTRL and N.

To Print the current page/document use CTRL and P.

To Refresh the current page/document use CTRL and R. Also you can use the F5 key.

To Save the current document/page use CTRL and S.

To Close the current Explorer window use CTRL and W.

 

Friday, 8 August 2014

Why Computer Password Should Be Complex?Importance Of Computer Password.

کمپیو ٹر کے لیے پاس ورڈ کیو ں ضرو ری ہے اور کمپیو ٹر پر پاس ورڈ کی کیا اہمیت ہے۔


Passwords are principal device for restricting access to a machine or network. However, passwords can be guessed or stolen. To guard against theft or discovery, password should be changed frequently. Operating System (OS) is enforced a password changing policy upon its users. To counter guessing, quite simply, the password needs to be made as long and as complex as possible.
A single letter password chosen from (a-z) might be guessed after 26 attempts. A two letter password has 26 times more possibilities (676). The following table shows this sequence of increasing complexity.
1 - Letter password – 26 – possibilities
2 – Letter password – 676 – possibilities
4 – Letter password – 456976 – possibilities
8 – Letter password – 208827064576 – possibilities
Windows OS permits password of up to 127 characters, but recommends at least 8 character for a password.
A single letter password chosen from a to a gives a base of 26 elements, but if the choice of elements includes upper-case letters and other symbols, thus the complexity level will increased significantly, and the password integrity is strengthened.
The length and composition of a user’s password can be specified in security policy, either for an individual machine or for a domain.
In summary, for a password to be strong and difficult to crack, it should:
1-       Be at least 8 characters long
2-       Be significantly different form your previous password.
3-       Not contain your own name or user name. ( nor the name of spouse, children, pets etc)
4-       Not be a common word or name.
5-       Have at least one digit and one upper or lower case letter.
NOTE:

Any password should be changed after every 6 months.         

Computer Virus Trojan Horse

Backdoor Trojan A Trojan horse that grants unauthorized access to computer systems. A spying tool.


Boot sector virus A virus that infects the boot record on floppies or hard drives.

Bug
A programming error in a computer program. Viruses are sometimes incorrectly called bugs, “the love bug” for example instead of the virus’ real name VBS.Loveletter.

Direct action virus

A direct action virus does not remain active in the computer. It only activates when infected objects are used and terminates when the replication and/or
payload routine has been executed.

File virus A virus that infects executable program files.

Hoax. A chain letter that usually circulates as an email

message. Hoaxes are not related to viruses in any way, expect for the fact that many hoaxes warn
about a non-existing computer virus.

Host The object, file or other kind of object to which the virus is attached.

In the wild, ITW
A large number of viruses exist only in virus researchers’ collections because they rely on some
system or architecture that is no longer in common use. The viruses that are working in today’s
computer environment and encountered in real life are called “in the wild” viruses.
Joke A computer program that does something funny or tasteless, but does not harm the computer system.

Macro virus A virus that infects documents using application specific macro languages.

Malware A common term for all kind of unwanted software, such as viruses, worms, Trojans etc.


Memory resident virus

A memory resident virus remains in memory as long as the computer is turned on. This enables the virus to monitor system activities and infect other objects efficiently.

Multipartite virus

A virus that can infect several types of objects. Mostly used for hybrids that can infect both boot
sectors and 16-bit programs.

Overwriting virus A virus that overwrites the host file and destroys it.

Parasitic virus

Most viruses require an object to attach themselves to. These viruses are called parasitic, as they cannot exist without their host.

Payload The part of the code of the virus that does

Polymorphic virus A virus that changes its own code to avoid detection.

Replication mechanism The part of the virus’ code that replicates (copies) the virus.

Retro virus A virus that attempts to damage or disturb the function of anti-virus software.

Script viruses A virus that replicates using scripting languages.

Stealth virus A virus that attempts to hide its presence from anti-virus software.

Trojan horse (Trojan) A computer program that contains a hidden, malicious functionality.
Virus. A computer program that replicates by copying itself. The term virus is often used for both viruses and worms, which is not exactly correct from the technical point of view.
Virus creation kit A programming tool that makes it easy to create
viruses without actual knowledge about how a virus works.

Worm A more independent form of computer virus. Viruses usually depend on humans to copy objects, but worms are able to initiate the copying procedure by themselves.

Thursday, 31 July 2014

Computer Viruses and Worms

Worms


Mail worms

A worm is by definition similar to a virus but more independent. The first wave of worms was seen when Internet mail became a standard way to communicate. An email client, and especially address books and mailing lists, provide a powerful way to reach a large number of recipients worldwide with very little effort. Modern, advanced email programs also provide this functionality through APIs that make it possible for computer programs to automatically send messages. All this together provides an environment that enables mail worms to spread much
faster than viruses. A mail worm is carried by an email message, usually as an attachment but there have been some cases where the worm is located in the message body. The recipient must open or execute the attachment before the worm can activate. The attachment may be a document with the worm attached in a virus-like manner, or it may be an independent file. The worm may very well remain undetected by the user if it is attached to a
document. The document is opened normally and the user’s attention is probably focused on
the document contents when the worm activates. Independent worm files usually fake an error
message or perform some similar action to avoid detection.

Pure worms

A worm is a replicating program that works independently without a host file and without user intervention. Pure worms meet all these requirements, whereas mail worms represent an intermediate form that resembles both viruses and worms. Pure worms have the potential to spread very quickly because they are not dependent on any human actions

Trojan horses

The name Trojan horse is borrowed from Greek mythology. In the computer world the term refers to a program that contains hidden malicious functions. The program may look like something funny or useful such as a game or utility, but harms the system when executed. Many Trojans contain activation criteria that enable the Trojan to work for a while. The user is convinced that the program is safe and useful, and forwards it to other users before the malicious code strikes. Trojans lack a replication routine and thus are not viruses by definition. A Trojan is spread to other computers only through deliberate transfer by the users.
The motives of most virus writers remain unknown. There are however some motives that can be identified by examining virus samples or talking to known or anonymous virus authors.
Challenge and curiosity. There are no courses or good books about how to write viruses. Many programmers want to see if they can do it, and do not necessarily realize that the virus may cause significant damage.
Fame and power. Even if the author remains anonymous, it probably gives a kick to read about the virus in headlines. The virus, and possibly the damage it has caused makes other people work and react in some way.
Protest and anarchy. A virus is quite a powerful way to cause intentional damage. There have
been cases where a virus is intended to harm a school’s network.
Proof of concept. Someone may for example want to prove that a certain replication technique works. This type of virus may also appear on new platforms or applications capable of hosting
viruses.
Political motives. A virus may be used to spread a political message. This may, for example, be protests against totalitarian governments, multinational corporations etc. Organized political parties do not use viruses.

Computer Viruses and Worms

 Different types of computer virus



Virus reaserchers are, however, generally less interested in these routines because they are not significant part of the replication chain of the virus. Payloads usually represent routine programming and the technically exciting stuff is located in the replication mechanisms.

Viruses and worms

A worm, for example, is able to use services provided by a modern networked environment much more efficiently than a virus. This results in an advantage that enables worms to spread much faster than viruses.
A pure worm is more independent than a virus. A pure worm works by itself as an independent object. It does not need a carrier object to attach itself to. The worm can also spread by initiating telecommunications by itself. There is no need to wait for a human to send the file or document.

Different types of viruses


Boot sector viruses

A boot sector virus infects the boot sector of floppy disks or hard drives. These blocks contain a small computer program that participates in starting the computer. A virus can infect the system by replacing or attaching itself to these blocks.

These viruses replicate very slowly because they can only travel from one computer to another on a diskette. In addition, a boot attempt must be made on the target computer using the infected
diskette before the virus can infect it. The virus may, however, reside on the diskette and infect new computers even if there is no operating system on it. Network communications have replaced diskettes as a means of sharing data. Software is also distributed using networks or
CD-ROMs rather than diskettes. This has made the boot sector viruses almost extinct. Some boot sector viruses still remain on stored diskettes, but they are rarely activated and usually do not work in modern operating systems. However, some damage does occur because these viruses may unintentionally damage file systems that they do not understand (i.e. the NTFS file system used by Windows NT).

Traditional file viruses

This group of viruses replicates when attached to MS-DOS program files with the .EXE or .COM extensions. This group of viruses is extinct due to the fact that they rely on operating systems
that are no longer used.

Document or macro viruses

Document or macro viruses are written in a macro language. Such languages are usually included in advanced applications such as word processing and spreadsheet programs. The vast majority of known macro viruses replicate using the MS Office program suite, mainly MS Word and MS Excel, but some viruses targeting other applications are known as well.


Macro viruses differ from earlier boot sector and file viruses in many ways. Most differences are beneficial to macro viruses and enable them to spread much faster than any other kind of virus
seen thus far. The most important difference is that macro viruses infect data files rather than program files. This takes advantage of a computer environment in a much more efficient way than previous virus types. The purpose of a computer system is to store, refine and
communicate data.

Sunday, 27 July 2014

Free Download Khilafat-e-Rashida book final by Zahid Hamid

Download Khilafat-e-Rashida book free by Zahid Hamid



A comprehensive book on Islamic System Of Khilafat, having a great archive about philosophy of Khilafat, 
Political System, Economy, Management, People Welfare, Zakat, Law and Justice.

A beautiful compression of Democracy and Khilafat.    

A beautiful compression of Democracy and Khilafat.