12 Type Of Servers And What They Do!

12 Type Of Servers And What They Do!
1. Real-Time Communication Servers
Also known as chat servers or IRC, and
sometimes known as instant messaging (IM)
servers, these servers are meant to allow huge
number users to exchange information
instantly.

2. FTP Servers
This is one of the oldest of the Internet
services available. The FTP or File Transfer
Protocol allows the users to securely transfer
one or more files of any size between two
computers.

3. Collaboration Servers
In many ways, [.....]

How do you know your computer is infected?

How do you know your computer is infected?           Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer's normal operations. Be aware of any unusual or unexpected behaviours. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious [.....]

Ray Tomlinson, the creator of email is dead

          Ray Tomlinson, widely credited as the creator of email, has died, his employer Raytheon, told CNN on Sunday. He was 74.
          Tomlinson invented direct email messages in 1971. Before his invention, electronic messages could be shared only on a very limited network.
          Among those paying tribute was Gmail, one of many offshoots of Tomlinson's creation."Thank you, Ray Tomlinson, for inventing email and putting the @ sign on the map," Gmail's Twitter account said.
[.....]

The History Of Hacking

History of hacking
Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.

Early 1960s
University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed [.....]

MUST HAVE this tools for every Hacker

7 Tools for every Hacker This tools are most important in every hacker, network penetrator's life. They must need these tools.  1. Nmap :- For network exploration Nmap logo
          Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available [.....]

Internet & Intranet

Internet Internet
Internet is a world-wide/global system of interconnected computer networks.
Internet uses the standard Internet Protocol (TCP/IP)
Every computer in internet is identified by a unique IP address.
IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer location.
A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
For example, a DNS server will resolve a name http://thetrick.blogspot.com to a particular IP address to [.....]

Download youtube videos without any software.

We know that youtube is the biggest online video network. But we can not download videos from the youtube. but now you can use this trick to download videos from youtube.


This method is very easy and any one can use without using any software. You can download any video from youtube in various formats you can also convert it to the .mp3. Follow the simple steps as below:-
[.....]

Tricks To Clean All Temporary Files,Cookies,Temporary Internet Files without any software.

Tricks To Clean All Temporary Files,Cookies,Temporary Internet Files
Just use notepad....




Step 1:
Start with making a new txt file.

[.....]

Awesome & Simple VLC Media Player Trick

Awesome & Simple VLC Media Player Trick this is the simple and funny trick by using VLC media player. To do this trick follow this simple steps as bellow 
1. Open Vlc Media Player.


2. Then Press Cltr + N
3. Now Type "Screen://" (without quotes)
4. Click on Play and watch this simple little trick. [.....]

Things that You Didn't Know About Computer Hacking

20 Things You Didn't Know About Computer Hacking :- ----------------------------------------------------------------------------

1 Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.
2 Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.
3 One of the club’s early programs: code [.....]

CMD commands

An A-Z Index of the Windows CMD command line
    Here is nearly all the A to Z cmd commands.      To open the command prompt use shortcut key i.e. win key + R Or     GOTO start menu >>  all programs >> Accessories >> command prompt A    ADDUSERS :- Add or list users to/from a CSV file
   ADmodcmd :- Active Directory Bulk Modify
   ARP     :- Address Resolution Protocol
   ASSOC  :-  Change file extension associations•
   ASSOCIAT :- One step [.....]

10 reasons why PCs crash you must Know...

10 reasons why PCs crash you must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one [.....]

Interesting Facts about COMPUTERS

Today I am posting the interesting facts about computer. That facts you may not know ;-)
1. There are approx. 6,000 new computer viruses released every month.

2. Doug Engelbart, invented the first computer mouse in the year 1964 and it was made up of wood!

3. It is believed that the first computer virus released in the world was a boot sector virus, which was created in the year 1986 by Farooq Alvi brothers. It was designed by them to protect their research work.
[.....]

Use Pendrive as RAM

Nowadays, many programs take lots of memory during operation, which is a nightmare for low RAM systems. So to avoid this make your pen drive/USB of large size as RAM, which will allow your system to handle more operations and tasks. That allows you to boost your computer speed. It may increase your computer processing speed.
Now follow the simple steps in your windows 07.

Transcend 4GB DDR3L 1600 LAPTOP RAM SanDisk Cruzer Blade SDCZ50-016G-I35 16 GB USB 2.0 Pen Drive
Insert your pen drive  Format [.....]

Useful Run Commands.

hiii friends this post is related to the most useful run command used in the windows. this is accessed by using short-cut key i.e.. windows key + R for more information about the short-cuts you can see my previous post windows short-cuts.    There are, however, tools and utilities that I bet you never knew you had that can be accessed through the Run feature.   The main reason most people don't use the Run feature is because they don't know the Commands.  So, to solve that problem, I decided to [.....]

Next PostNewer Posts Previous PostOlder Posts Home