12 Type Of Servers And What They Do!
1. Real-Time Communication Servers
Also known as chat servers or IRC, and
sometimes known as instant messaging (IM)
servers, these servers are meant to allow huge
number users to exchange information
instantly.
2. FTP Servers
This is one of the oldest of the Internet
services available. The FTP or File Transfer
Protocol allows the users to securely transfer
one or more files of any size between two
computers.
3. Collaboration Servers
In many ways, [.....]
How do you know your computer is infected? Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer's normal operations. Be aware of any unusual or unexpected behaviours. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious [.....]
Ray Tomlinson, widely credited as the creator of email, has died, his employer Raytheon, told CNN on Sunday. He was 74.
Tomlinson invented direct email messages in 1971. Before his invention, electronic messages could be shared only on a very limited network.
Among those paying tribute was Gmail, one of many offshoots of Tomlinson's creation."Thank you, Ray Tomlinson, for inventing email and putting the @ sign on the map," Gmail's Twitter account said.
[.....]
History of hacking
Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
Early 1960s
University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed [.....]
7 Tools for every Hacker This tools are most important in every hacker, network penetrator's life. They must need these tools. 1. Nmap :- For network exploration Nmap logo
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available [.....]
Internet Internet
Internet is a world-wide/global system of interconnected computer networks.
Internet uses the standard Internet Protocol (TCP/IP)
Every computer in internet is identified by a unique IP address.
IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer location.
A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
For example, a DNS server will resolve a name http://thetrick.blogspot.com to a particular IP address to [.....]
We know that youtube is the biggest online video network. But we can not download videos from the youtube. but now you can use this trick to download videos from youtube.
This method is very easy and any one can use without using any software. You can download any video from youtube in various formats you can also convert it to the .mp3. Follow the simple steps as below:-
[.....]
Tricks To Clean All Temporary Files,Cookies,Temporary Internet Files without any software.
Tricks To Clean All Temporary Files,Cookies,Temporary Internet Files
Just use notepad....
Step 1:
Start with making a new txt file.
[.....]
Awesome & Simple VLC Media Player Trick this is the simple and funny trick by using VLC media player. To do this trick follow this simple steps as bellow
1. Open Vlc Media Player.
2. Then Press Cltr + N
3. Now Type "Screen://" (without quotes)
4. Click on Play and watch this simple little trick. [.....]
20 Things You Didn't Know About Computer Hacking :- ----------------------------------------------------------------------------
1 Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.
2 Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.
3 One of the club’s early programs: code [.....]
An A-Z Index of the Windows CMD command line
Here is nearly all the A to Z cmd commands. To open the command prompt use shortcut key i.e. win key + R Or GOTO start menu >> all programs >> Accessories >> command prompt A ADDUSERS :- Add or list users to/from a CSV file
ADmodcmd :- Active Directory Bulk Modify
ARP :- Address Resolution Protocol
ASSOC :- Change file extension associations•
ASSOCIAT :- One step [.....]
10 reasons why PCs crash you must Know
Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one [.....]
Today I am posting the interesting facts about computer. That facts you may not know ;-)
1. There are approx. 6,000 new computer viruses released every month.
2. Doug Engelbart, invented the first computer mouse in the year 1964 and it was made up of wood!
3. It is believed that the first computer virus released in the world was a boot sector virus, which was created in the year 1986 by Farooq Alvi brothers. It was designed by them to protect their research work.
[.....]
Nowadays, many programs take lots of memory during operation, which is a nightmare for low RAM systems. So to avoid this make your pen drive/USB of large size as RAM, which will allow your system to handle more operations and tasks. That allows you to boost your computer speed. It may increase your computer processing speed.
Now follow the simple steps in your windows 07.
Transcend 4GB DDR3L 1600 LAPTOP RAM SanDisk Cruzer Blade SDCZ50-016G-I35 16 GB USB 2.0 Pen Drive
Insert your pen drive Format [.....]
hiii friends this post is related to the most useful run command used in the windows. this is accessed by using short-cut key i.e.. windows key + R for more information about the short-cuts you can see my previous post windows short-cuts. There are, however, tools and utilities that I bet you never knew you had that can be accessed through the Run feature. The main reason most people don't use the Run feature is because they don't know the Commands. So, to solve that problem, I decided to [.....]