.

.

Showing posts with label Internet tips. Show all posts
Showing posts with label Internet tips. Show all posts

Tuesday, 15 January 2013

Monitor your hardrives health status with crystaldiskinfo.

Data recovery is a costly. It’s always better to have backups, but what about the reliability of our backup drives? There is a way to find it out. Each hard drive, both internal and external, stores details about it’s health without any user intervention. It’s called S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology) which monitors several parameters, which helps to anticipate failures. S.M.A.R.T can detect only predictable failures which comes from normal wear and tear of mechanical components, and degradation of disk surface. CrystalDiskInfo is a free system utility to read your hard disk’s SMART data easily.

CrystalDiskInfo monitor-your-hardrives-health-status

  • IDE, SATA hard drives even on USB interface is supported.
  • can detect disks on RAID array.
  • less hungry on system resources.
CrystalDiskInfo can detect very interesting figures like
Power-On Hours (POH) : Count of hours in power-on state. The raw value of this attribute shows total count of hours (or minutes, or seconds, depending on manufacturer) in power-on state
Power Cycle Count : This attribute indicates the count of full hard disk power on/off cycles.
Temperature : Current internal temperature and many more.
source: wikipedia.com
Download CrystalDiskInfo
OS : Windows 7/2008/Vista/2003/XP/2000, x86/WoW64

Online Radio of Singapore


 The Singapore Radio FM broadcasts in various Singaporean languages such asEnglish, Mandarin, Malay, Tamil and other international languages. The Radio channels streaming news, music and infotainment from band artists, classical music, contemporary music to modern music programmers such hits music, jazz, mix music, hot music, best music, pop music and many more. Enjoy yourself while listening to radio Singapore online.


 

Search Bar Form for Blogger


This searches all the posts on your blog, and displays them by latest posts first. Inside the search bar you will find the text "Search this Site", this can easily be changed to any text you desire. Such as "Search my Site", "Search", "Type andHit Enter", etc. Just simply replace the code. You can also change the text "Go" on the button to something like "Search", "Find", etc.

<form id="searchThis" action="/search" style="display: inline;" method="get"><input onfocus="if(this.value==this.defaultValue)this.value='';" value="Search this Site" type="text" id="searchBox" onblur="if(this.value=='')this.value=this.defaultValue;" style="width: 150px;color:#636363;" vinput="" name="q"> <input id="searchButton" value="Go" type="submit"></form>

Saturday, 3 November 2012

PC Security Threats | Malwares




Computer security threats or Malicious code or Malwares comes in a wide variety of forms and is distributed through an ever growing number of delivery mechanisms. In general malicious program is any software that impedes the normal operation of a computer or networking device. This software most often executes without the user's consent. 
Understanding how malwares works can help you develop defensive strategies, select 
computer security products and train employees on how to identify potential threats.


Types of computer security threats

These can be roughly broken down into types according to the malware's method of  operation. Anti-"virus" software, despite its name, is able to detect all of these types of malware. There are  following malware types.

  • E-mail and other types of viruses
  • Trojans and other backdoors
  • Worms
  • Blended threats
  • Time bombs
  • Spyware
  • Adware
  • Stealware
  • Zombies


when a piece of malicious code starts infecting large number of computers, it is said to be 'in wild'.

Threat level of these malwares refers to it's potential to spread and infect computers. Threat level can be shown in 4 catagories.
  1. NO -  may not function well
  2. Low - requires human assistance in replicating and moving from computer to computer
  3.  Medium - slow infection speed and little damage
  4.  High - great infection speed and do considerable damage.
wild list  or threat list refers to malicious code that is wandering around the internet infecting computers. An archive of wild lists and information about the organisation that maintains the list are available at www.wildlist.org

Friday, 26 October 2012

Download Beginning Ubuntu Linux Free






                                                      
Beginning Ubuntu Linux, Fourth Edition is the update to the best–selling book on Ubuntu, today’s
hottest Linux distribution. Targeting newcomers to Linux and to the Ubuntu distribution alike, readers
are presented with an introduction to the world of Linux and open source community, followed by a
detailed overview of Ubuntu’s installation and configuration process. From there readers learn how to
wield total control over their newly installed operating system, and are guided through common tasks
such as writing documents, listening to audio CDs and MP3s, watching movies, using VOIP and chat, and
of course general system maintenance matters.



Additionally, there’s a series of comprehensive tutorials on Linux internals and the command–line
prompt—essential for any Linux user—and the book includes special sections on optimization, security,
and system maintenance.

Forgoes introductions to esoteric Linux topics so commonly found in other books and instead focuses on
everyday tasks for everyday users: printer and file sharing configuration, office document management,
and listening to MP3s and watching movies among them.


What you’ll learn

* Use Ubuntu as a daily desktop replacement.

* Complete all manner of office tasks, such as creating Microsoft Office–compatible documents and
spreadsheets, using e–mail, and managing contacts.

* Listen to MP3s and CDs, and watch movies using a user–friendly Linux desktop.

* Configure Ubuntu’s printer– and file–sharing features to share resources seamlessly with other
computers on your network.

* Become a proficient user of the Linux command line.


Who is this book for?

Beginning Linux users seeking to explore the popular Ubuntu distribution



 Download : Beginning Ubuntu Linux


Enjoy !

Hack your Friends PC using Beast Trojan !!!

Step 1:- Download the necessary software  Beast 2.06

Step 2:- Open the software







Step 3:- Now click on “Build server “button.


Step 4:- Now in this window click on the notifications tab.

Step 5:- In the notifications tab click on the e-mail button.

Step 6:- Now In this window fill your proper and valid email id.





Step 7:- Now go to “AV-FW kill” tab.



Step 8: – Now In this put a tick mark on the “disable XP firewall “.
  

 Step 9:-Now click on “EXE icon” tab.




Step 10:- Select any icon and click on the ”Save Server” button and the Trojan will be made.





Step 11:-Now send this Trojan File to u r friends (VICTIM).

Step 12:- As and when the victim will install the Trojan on his system you will get a notification e-mail on your 
specified e-mail id while making the Trojan. This Email consists of the IP address and port of the victim.

Step 13:-Put This IP address and Port in the place shown in the below snap-shot.




Step 14:- After That Click on the “Go Beast” Button and You will be connected to victims PC.


Enjoy !

 

Get Latest Updates: Subscribe Now | Like Us on Facebook

X