Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts
Lenovo's New A10launch, first Android laptop with touch
The Lenovo A10 laptop runs Android 4.2 Jelly Bean and features AccuType keyboard with dedicated Android keys for home, back, multitask, settings among others. It comes with 10.1-inch HD (1366x768 pixels) touchscreen display which can be flipped around 300 degrees in stand mode and features Lenovo's popular stable hinge and 'fold-back' design. There is a 0.3-megapixel webcam and also features stereo speakers. The A10 laptop weighs less than a kilogram and measures about 17.3mm at its thickest point, as per the company.
Lenovo has taken the covers off its 1st laptop computer supercharged by golem, the Lenovo A10. The laptop computer runs golem four.2 candy and in contrast to most devices during this category, the show can not be removed. The hinge permits rotation of the screen to line the device in stand mode, however that is concerning it. therefore it's primarily a netbook supercharged by golem.As for its innards, the Lenvo A10 is powered by a quad-core RK3188 Cortex-A9 processor, clocked at 1.6GHz. In addition, the Lenovo A10's battery supports up to nine hours of video playback on a single charge. Other features include 2GB of RAM, 32GB of built-in storage, microSD card expansion support, two USB 2.0 ports and one HDMI port.
Buy From Here@chep rate :- Click Here for buy lenovo A10
forgot the password of ur memory card ?
I have seen such a case when one my friend forgot the password of his memory card of his mobile phone and he have some very important data in the memory card which he want to recover, he tried almost everything then he lost hope and then asked the mobile phone company to find the way to recover the data from the memory card.
Requirement: You need a file explorer like FExplorer which you can download from the link below.
Proceadure:
1. Insert card into your phone but don’t access it through phone.
2. Run FExplorer and Open the path C:\system.
3. You will find a file called mmcstore ,rename the file mmcstore.txt
4. Copy that file(mmcstore.txt) to your pc and open that file in notepad.
5. You will find your password in that file.
This method is applicable for allSymbian S60 v2 and S60v3 mobiles . If you are still having a problem breaking password,
This method is applicable for all
© Legal-Privacy Policy page.
Recover Deleted Files without any software
Hi guys. In this simple tutorial I'm gonna show you how to retrieve the deleted files without any additional software. This trick is for windows 7 or later versions so sorry for Linux and XP users as of now..
Here, I'm sharing a simple example to demonstrate the method. You can use it later independent of file and folder names.
Follow these simple steps..
1) Create a Folder say Office backup (any name)
2) Put any file in it say test.pdf (it could be any file(s) )
3) Now open the folder and simply delete the file
4) Right Click on folder > in the menu click on Restore previous versions
5) Simply click Restore and apply the changes
6) if you didn't find Restore previous versions option then navigate to Control Panel > System and Security > System >System Protection (left pane) > select your drive > click configure > select Restore system settings and previous version of files.
Here, I'm sharing a simple example to demonstrate the method. You can use it later independent of file and folder names.
Follow these simple steps..
1) Create a Folder say Office backup (any name)
2) Put any file in it say test.pdf (it could be any file(s) )
3) Now open the folder and simply delete the file
4) Right Click on folder > in the menu click on Restore previous versions
5) Simply click Restore and apply the changes
6) if you didn't find Restore previous versions option then navigate to Control Panel > System and Security > System >System Protection (left pane) > select your drive > click configure > select Restore system settings and previous version of files.
© Legal-Privacy Policy page.
How to remove removable disk shortcut virus
Recently, i saw many people have been report that their computer or removable drive has disk virus but they don't know how to remove this virus.Last month my laptop has been infected by this virus.But its gone now.This virus will slow down the computer performance by increasin the cpu usage and it has more bad effects.Many people that don't know how to solve this problem end up with formatting his/her computer or removable drive that may have chance to lose some important files.So i'm going to give you a tutorial on how to remove this shortcut virus from your computer or your removable drive.
1. Disabling the autorun.inf
Its easy,you just need to remove it's contains
Go to My Computer > Search > All files and folders > File name - autorun.inf , Look in - My Computer
or the infected drive , More advance options - Check the Search hidden files and folders > Search
Right click the autorun.inf > Ctrl + A > Backspace > Save and you're done! :)
2. Use an excellent antivirus and antispyware
I recommend you to use there antivirus and Super Antispyware (Don't worry its free)
ii ) Click here to download Super Antispyware
iii ) Scan your computer or the infected drive with these 2
softwares.If you have more time, you can scan the whole
system so that it can remove all the viruses and spywares
in your computer :)
Note: Please scan the software after it is downloaded :)
3. Unhide hidden files and folders
Manual Way:-
Actually your files and folders are not lost. The virus has made the files and folders become super hidden.
Go to My Computer > Tools Tab > Folder Options > View > Look for Hidden Files and
Folders >
Folders >
Click at Show hidden files and folders > Check the Hide extensions for known file types and Hide
protected operating system files > You can see the hidden files and folders now :)
If that didnt work, you can try this step:
Start > Run ( Command Prompt ) > Type in 'cmd' > Type the infected drive.eg - F: >
Type in 'attrib -r -a -s -h *.*' > The folders and files should be unhidden by now.
Your results should be like this:
Easy way:-
Use the Hidden File Tool software to reveal the hidden files and folders.
Click here to download the Hidden File Tool.
Note: Please scan the files after it's downloaded :)
Note: Please scan the files after it's downloaded :)
After you've finished doing the manual or the easy way. The result should be like this picture:
As you can see, the virus name can be buoemx.exe,cxpoaxx.exe and others.Just delete the virus and the autoron.inf files and you're done! Your computer is cleaned from virus and spyware by now! :)
© Legal-Privacy Policy page.
Make your computer talk what you type !
This is very good and interesting Visual Basic Script Trick which let your computer speaks whatever you type. There is no requirement of any software. Just follow below simple steps.
- First open Notepad and copy below codes
Dim message, sapi
message=InputBox("What do you want me to say?","COOL HACKING TRICKS")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message
- Now save the notepad file as talk.vbs
- Now close the notepad file and open it again.
- Done !!!
© Legal-Privacy Policy page.
Rename Your Recycle Bin

1. Go to Start > Run
2. Type in regedit this will open Registry Editor.
3. Go to HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}
4. Change "Recycle Bin" to whatever you want.
© Legal-Privacy Policy page.
What is Session?

HTTP communicates with lot of TCP connections, Server should create unique identifer for each Connection.
A Session is a unique identifier that is generated and sent to the client from a server in order to identify the Current Interaction Session.
Whenever you visit a webpage or login to website, the server will store the data about you in your system as a cookie. This cookies will help to identify you.
For example , you are login to Facebook.com. when you login to your account, a cookie will be generated and stored in your local system. if you click the logout, cookies will be destroyed.
Software Implementation:
TCP sessions are implemented using Multi threading concept. Whenever session is generated , a new thread will be created.
HTTP sessions are typically not implemented using one thread per session, but by means of a database with information about the state of each session.
Server side web sessions:
The sessions are stored in Server Machine.
Client side web sessions:
Client-side sessions use cookies . This will reduce the server side storage.
This is best method but there is one drawback. Sessions stored in client is vulnerable to tampering by the hackers. This can be overcome by encrypting the session(but hackers are able to decrypt it also).
HTTP session token
The client usually stores and sends the token as an HTTP cookie and/or sends it as a parameter in GET or POST queries.
The reason to use session tokens is that the client only has to handle the identifier. All session data is stored on the server (usually in a database, to which the client does not have direct access) linked to that identifier.
Magic cookie is simply a cookie that is used to authenticate the user on remote server or simply computer. In general, cookies are used to maintain the sessions on the websites and store the remote address of the website.
© Legal-Privacy Policy page.
Tips To Make Your Old PC Or Laptop New!
Upgrading Hardware
If you’re okay with spending some money on hardware upgrades, it’s recommended! However, before you make any changes to your hardware, you should backup your system first.
Memory
By adding more memory to your machine is the easiest way to enhance performance of an older machine.
Graphics Card
You can even choose to upgrade its graphics card to enhance your computer’s performance, specially when your motherboard has integrated graphics. In case, you are unsure of type of expansion slots you have, make use of the utility SIW, which is available for free.
Hard Drive
By getting a larger and faster hard drive is another way to enhance the performance of your PC. In most laptops, the hard drive is 4200RPM, and it is possible to upgrade to a 5400 or 7200RPM drive that should enhance read/write performance.
CPU
If you’re an advanced user, it is highly recommended that you upgrade your Desktop CPU in order to improve its performance. You need to find out what CPUs are compatible with your motherboard and chipset.
Reinstall Windows
After extensive use, Windows OS starts slowing down. It is likely to happen even when you do regular maintenance such as using Disk Cleanup, defragmentation of your hard drive, and cleaning of your system with utilities such as CCleaner. But, before you reinstall your OS, you need to ensure that you backup your crucial data!
Use Portable Apps
If you want to avoid installing a bunch of new software on your old machine, you might consider taking a look at Portable Apps. You can run these from your USB flash drive and they don’t need any installation. You can save your data to the flash drive without clogging up your local drive. Also, you’ll have the additional benefit of bringing your favorite apps to any machine.
Install a Light Version of Linux
Puppy Linux
If your older laptop is running XP and doesn’t have the power to run Windows 7 OS adequately, check out Puppy Linux that can be used to add life to it. It is only 130MB and comfortably runs on any machine from the past 15 years. These Tips Are Provided By Cyber Elite.You just need a Pentium 166MMX CPU and 128MB of RAM as minimum requirement.
DSL Linux
DSL is another light Linux distro which is small in size and just like Puppy Linux is possible to from a Live CD, flash drive. You can even install it inside Windows. It is only 50MB in size and can run on machines with 16MB of RAM!
© Legal-Privacy Policy page.
RAR Password Unlocker
Have you ever forgotten the password of a protected RAR file that you downloaded from Internet? If your answer is yes, then don't worry because RAR Password Unlocker will find it out for you.
The program has three recovery options; the dictionary attack, the absolute brute force attack which will test every possible word combination, and the mask attack which is the same as brute force, but will save a lot of time by allowing you to specify a known part of the password or some symbols that should compose it.
Once the program has found your lost password, you can choose to remove it from the file and remove the write protection password as well.
The speed of the cracking process will depend on the priority level that you have chosen for the program, idle or high, and also on your computer's hardware.
Trusted DOWNLOAD 12.7 MB
© Legal-Privacy Policy page.
How to Create Your Own Media Player in Vb.net?
We All Know About Windows Media Player Or Other Players That use to Play a Audio And Video File in Your Computer OR Laptops or etc… But Any Body Know how to make it … ?
Don’t know …. ok … ok … i will teach you how to make it….
In this Tutorial We Use Visual Basic 2008 To make Our Own Media Player….
ok…. let’s Start….
Don’t know …. ok … ok … i will teach you how to make it….
In this Tutorial We Use Visual Basic 2008 To make Our Own Media Player….
ok…. let’s Start….
1. Open Vb.net and Create New Windows Application ….
2. Give it Name MY Media Player…
3. Change the Text of Form1 to Your Own one … like My Media Player, Smart Media Player etc…. (Here I use Smart Media Player…. )
2. Give it Name MY Media Player…
3. Change the Text of Form1 to Your Own one … like My Media Player, Smart Media Player etc…. (Here I use Smart Media Player…. )
5. Now You can See new Toll Windows Medial Player In Tool Box Control…. Drag It into Form….
6. Now You Can See One Little Control Same Look Like Windows Media Player….. Drag and Drop it into Form….
7. Ohhh…. see there is one little Medial player… oh … Interesting …
7. Ohhh…. see there is one little Medial player… oh … Interesting …
8. Hey Congrat’s you done it …. now Double Click on Play Button and you can See code Window….
In this Write Following lines of Codes….
AxWindowsMediaPlayer1.URL = "z:\Songs\xyz.mp3” // You file Path Will be goes here……
In this Write Following lines of Codes….
AxWindowsMediaPlayer1.URL = "z:\Songs\xyz.mp3” // You file Path Will be goes here……
You Can make Your Own Playlist and Write this Code In SelectedIndexChanged Event of List box and Combo Box…..
9. Now … .Double Click on Stop Button and Write Following Lines of Codes ….
AxWindowsMediaPlayer1.Ctlcontrols.stop()
AxWindowsMediaPlayer1.Ctlcontrols.stop()
10. Do Same For Following Buttons ….
1. Pause :- AxWindowsMediaPlayer1.Ctlcontrols.pause()
2.Prev":- AxWindowsMediaPlayer1.Ctlcontrols.previous()
1. Pause :- AxWindowsMediaPlayer1.Ctlcontrols.pause()
2.Prev":- AxWindowsMediaPlayer1.Ctlcontrols.previous()
Do same For many other Controls….
11. Now Run your Application … See it Work ….
© Legal-Privacy Policy page.
How To Modify .apk Files
The extension Google uses for Android applications (APK) may seem a bit complicated at first, but it really isn’t. In fact, an .apk is nothing else than a .zip file disguised as an .apk. That’s dumbing it down, but you get it. Essentially, if one wanted to see what’s inside an app, they would just change the extension ofapplicationname.apk to applicationname.zip, unzip it. And there you have it: The contents of the .apk! We aren’t done yet, read more after the break.
Here is where it gets tricky. Inside the folder where you unzipped the contents of the application, you’ll find a file named classes.dex. That’s the most important file of the whole application, containing all the java files, but it’s encrypted! No worries, that can easily be solved. You’ll need two things:
- Dex2Jar from http://code.google.com/p/dex2jar/
- A regular Java decompiler, such as JD from http://java.decompiler.free.fr
Copy classes.dex to the folder where you unzipped Dex2Jar, and run from the commandline: “dex2jar.bat classes.dex”
This will produce a file, strangely named something like: “classes.dex.dex2jar.jar” If you have WinRAR installed, you can just unpack the files. If you don’t, install it.
Now go ahead and adjust it to your liking!
© Legal-Privacy Policy page.
HOW TO MAKE WINDOWS 7 GENUINE USING COMMAND PROMPT
Have You Ever thought of Making Windows 7 Genuine Using Command Prompt Directly Without Using any Activation Crack or Loader ?
So Today Here in this Post I am Going to Tell you a very Simple Procedure to Make Your Windows 7 Genuine Using Command Prompt.Because of the High Cost of Original Windows 7 Not Everyone Can afford to buy Original Microsoft Windows 7 So they Prefer to Use Cracked or Pirated Versions of Windows.Because of the Use of Pirated Copy of Windows they often face the Error “Windows 7 is not genuine” and because of this they are Unable to Change the Desktop Background Settings and Control Panel Settings.So Here is A Step by Step Guide on How to Make Windows 7 Genuine Using Command Prompt Without Using any Activation Cracks.
First of all You need to Open Cmd ( Command Prompt ) as an Administrator.To Open it as an Administrator Type cmd in Start-menu and then Right Click on the Cmd and Select Run as Administrator as Shown below in the Image.
Now Type the Command SLMGR -REARM in cmd as Shown below in the Image
Press Enter and Wait For Few Seconds
Next a Message Dialog Box Will open Specifying Command ‘ Completed Successfully.Please Restart the system for the Changes to Take effect ‘ as
Shown below in the Image
Restart Your Computer and You are all done.Now You are Free of the Error
‘Windows 7 is Not Genuine’
Note - You Must Run Command Prompt as an Administrator Else this Method Will Not Work
Speed Up Your Games upto 40% Trick
Speed Up Your Games upto 40% Trick By H+ Team
Now you can speed up your gaming performance through a software called Game booster. While launching a game it will temporarily turn off un-wanted programs, due to this it will automatically increase your PC gaming performance after closing a game it will restore all programs.
Features of Game Booster
Increase your gaming performance upto 40% without installing any hardware device.
1 Click boosting game performance
Gaming performance will be better than before.
Pure Gaming Environment with "Game Desktop"
Tweak System for Top Gaming Performance
Real-time Screen-cast for Sharing
Download It From Here :-Download Game Booster
© Legal-Privacy Policy page.
CLOUD COMPUTING
Cloud computing is the technology of computing which is totally based on the internet media. With the help of this ethnology many servers can offer softwao.re applications and resources and information to the computer and devices attached on request with the control of electricity grid. It can be called as the service architectures or virtualization for improving the utility of the computational techniques. Whole system is service oriented and customer focused. Complete detail is taken from the customer and delivers the service according to the need. The main idea of cloud computing is based on the cloud that is specifically designed for the processing each related device is present in this cloud of network. Could computing remains invisible to the customers’ .They only have to pay for their resource that they use in cloud computing services.
How cloud computing works :-
Cloud computing involves the multiple cloud components that communicate with each other wit the help of application interfaces mostly web services. UNIX operating system follows the same theoretical techniques for its tasks. The task complexity is divided into all the components making balanced and manageable results. The two most important components of the back end and front end .the front end is the interfaces or the main screen that is visible to the customers and users through which they interact with the system. This interface can be browsed with the help of web browsers and all the applications can be used with this interface. Usually this interface is GUI based.
The back end involves all the components and the complete architecture and programming technique of cloud computing that is totally remains hidden from the users. Only system known what is going one at the back of very user request. The back end device involves, cloud server, Assistant computers, Data storage media and many connectors.
Historical background
The very first concept for the cloud computing was given by the John McCathy in 1960s.he first gave the statement for the future use of computational techniques as a public utility. With the arrival of the Virtual private networks this concept which was modernized in 1966 took implementation shape .in year 2007 the most famous organization such as Google ,IBM and may universities world wide started research program on cloud computing and finally in 2008 the first cloud computing system was introduced.
Advantages of the cloud computing :-
1)Agile functionalities :- Cloud computing enables user to frequently use the technological resource at inexpensive price.
2)Application interface fro users :- Another great feature plus advantage of cloud computing system is the accessible and reliable interface for its users API technology make it more interesting for the users to interact with the human beings.
3)Cost effective :- This computing techniques greatly reduce the total cost and capital expenses that come sin arranging the infrastructure .integrated resources are available at almost no cost to the third party users.
4)Geographical independence of system and devices :- The most exciting feature of the cloud computing is its total geographical independence. Its users can access the system from the web browsers any where in the world at any time.
5)Multi and large application pool :- Large application pool is available for the users.
6)Reliability :- improved design versions of many redundant website have efficiently increase the performance and suitability of cloud computing more useful.
7)Security :- Security is at the one level above as compared to the other networks because of the centralization of data and increased security feature of very individual component.
8)Maintenance :- Cloud computing systems are flexible and easy to maintain because components can be added and deleted from the infrastructure.
Subscribe to:
Comments (Atom)















