All ABOUT IT: Everything about Pakistan Media, Technology, Phones, IT, Windows, Anti Hacking - Hacking, General Information and All Popular Topics.
Subscribe For Free Updates!

We'll not spam mate! We promise.

Showing posts with label Computer Article. Show all posts
Showing posts with label Computer Article. Show all posts

Thursday, 1 August 2013

Interesting Facts about COMPUTERS !!!

1. There are approx. 6,000 new computer viruses released every month.

2. Doug Engelbart, invented the first computer mouse in the year 1964 and it was made up of wood!

3. It is believed that the first computer virus released in the world was a boot sector virus, which was created in the year 1986 by Farooq Alvi brothers. It was designed by them to protect their research work.

Modern Computers


4. A normal human being blinks 20 times in a minute, whereas a computer user blinks only 7 times a minute!

5. TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard.

6. While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.

7. The first domain name ever registered was Symbolics.com.

8. On an average work day, a typist's fingers travel 12.6 miles. 

9. The world's first computer, called the Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.

10. Domain names are being registered at a rate of more than one million names every month.

11. The house of Bill Gates was designed using a Macintosh computer. 


Replica of Z1 Computer, First Computer to be made
12. The group of 12 engineers who designed IBM PC were called "The Dirty Dozen".

13. One of the world's leading computer and computer peripheral manufacturer Hewlett Packard was first started in a garage at Palo Alto in the year 1939.

14. On eBay, there are an average of $680 worth of transactions each second.

15. Early hard drives in Personal Computers held 20 MB, or 20 Megabytes, and cost about $800. By comparison, an $8 flash drive holds 2 GB, or 2 Gigabytes. That's a 100-fold decrease in price and a 100-fold increase in capacity.

16. The computer mouse, the windowing GUI, laser printing, and the network card were all developed at one company; Xerox in Palo Alto, California.

17. The computer in your cell phone has more processing power than all the computers in the Apollo 11 Lunar Lander that put 2 men on the moon.

18. 'Crash Course' is another name for Microsoft Windows tutorials.

19. Although we normally think of computers as the ones we use in our everyday lives to surf the web, write documents etc, small computers are also embedded into other things such as mobile phones, toys, microwaves and MP3 players. We use computers all the time, often without even knowing it!

20. Almost all computer users must know how destructive a virus can be. But then, it would be interesting to know that a virus cannot corrupt your PC on its own. It corrupts your system only when you activate it by either downloading infected files from the Internet or by sharing these infected files. 

ONE WINDOWS MAGIC TRICK:-

Nobody can create a FOLDER anywhere on the computer which can be named as “CON” (without Quotes). 
TRY IT NOW ,IT WILL NOT CREATE ” CON ” FOLDER

Actually CON is one of system reserved words, that's why it cant create CON Folder !!!

Tuesday, 30 July 2013

SD, DDR, DDR2 & DDR3 RAM Comparison

SD, DDR, DDR2 and DDR3 are all different types of RAM (Random Access Memory). RAM is a kind of computer memory that temporarily stores information, improving your systems performance. Or in other words RAM simply holds data for the processor. The processor also has its own memory known as the L2 cache, the cache lies between the processor and the RAM. The processor sends and retrieves data from this cache, when this cache overflows data is sent to the RAM.

There are mainly four types of RAM; SD, DDR, DDR2 and DDR3. They differ in the way they operate and mainly in their operation speeds. All RAM's used in computers today have a synchronous interface meaning they wait for a clock signal before it can respond to clock signals.

SD RAM:

SDRAM stands for synchronous dynamic random access memory. SDRAM is Single Data Rate meaning that SDRAM can accept one command and transfer one word of data per clock cycle. As mentioned above SDRAM's have synchronous interface therefore they depend on the computer clock signals to perform operations. Typical speeds of SDRAM are 100 and 133 MHz.

DDR SDRAM:

DDR SDRAM stands for double data rate synchronous dynamic random access memory. DDR RAM transfers data twice per clock cycle, hence the name double data rate. DDR clock speeds range between 200 MHz (DDR-200) and 400 MHz (DDR-400). DDR-200 transfers 1600 MB/s, while DDR-400 transfers 3200 MB/s.

DDR2 SDRAM:

DDR2 SDRAM stands for double data rate 2 synchronous dynamic random access memory.DDR2 is twice as fast as DDR which means twice as much data is carried to the module for each clock cycle. Also due to the design improvements DDR2 consumes less power as compared to the DDR memory. DDR2 speeds range between 400 MHz (DDR2-400) and 800 MHz (DDR2-800). DDR2-400 transfers 3200 MB/s. DDR2-800 transfers 6400 MB/s.

DDR3 SDRAM:

So by now after reading the above it is quite obvious what DDR3 SDRAM stands for, double data rate 3 synchronous dynamic random access memory. In theory DDR3 is supposed to act twice as fast as DDR2 memories. Thus DDR3 speeds range between 800 MHz (DDR3-800) and 1600 MHz (DDR3-1600). DDR3-800 transfers 6400 MB/s; DDR3-1600 transfers 12800 MB/s.
There Are so many difference between DDR1 And DDR2,  But the main difference is shown in below pictures:

Friday, 26 July 2013

Download Windows 8 Final Professional 32 Bit & 64 Bit Full Version With Keygen + Serial Key 2013 updated



Windows 8 Final Professional 32 Bit dan 64 Bit



Download Windows 8 Final Professional 32 Bit dan 64 Bit Full Version With Keygen + Serial - This is file torrent for downloading Windows 8 Final Professional 32 Bit dan 64 Bit Full Version With Keygen + Serial. Dear friends me ap ko direct links day raha hoon , just 1 little add show ho ga usay skip kar  k ap next downloading walay page pay ja k download kar saktay hain, ye os ap ko boot karana paray ga. us k liye aap win to flash ya komku use kar saktay hain. aor bhi is k kayi features hain wo aap ko next post me share kar doon ga. 

ScreenShots:











Windows 8 Release Preview: has arrived. A prerelease version of Windows 8, it's Windows reimagined and reinvented. Windows 8 Release Preview It's Windows reimagined and reinvented from a solid core ofWindows 7 speed and reliability. It's an all new touch interface. It's a new Windows for new devices. And it's easy to try now whether you're installing it for the first time, or moving from Windows 8 Consumer Preview.
Get the tools-you need to build Metro style apps for Windows 8. Our free download includes Microsoft Visual Studio Express 2012 for Windows 8 and Blend for Visual Studio to help jumpstart your app development project.Our docs are optimized to make you more productive. Discover everything you need toplan, build, and sell great apps in the Windows Store.
 Windows 8 has many powerful features for developers. Discover the new features for Desktop, Web, and Metro style app developers.


Dev Camps are free events-that bring together developers like you to learn more about building apps. Learn interactively and get advice from expert app developers in hundreds of locations around the world.
The more apps you have, the better your experience. Apps can work together and share info, making it easier for you to do what you want.
There's an app for everyone.- Browse lists of top apps, view staff recommendations, and get personalized picks based on apps you already own. And access is easy the Store is built directly into Windows 8.
Now's the time to build apps that'll launch your business worldwide. Download free tools and samples, find design and code resources, and get expert help from Windows Dev Center.

Another screenshot for Windows 8 Final Professional 32 Bit dan 64 Bit




Below is link Torrent to Download Windows 8 Final Professional 32 Bit dan 64 Bit Full Version With Keygen +Serial key



How to Make Windows 8 Genuine Final Pro (Full Version)

  • Right click on START, select Command Prompt
  • Type in slmgr. vbs-ipk NG4HW-VH26C-733KW-K6F98-J8CK4, and then enter.
  • another type slmgr-ato vbs.
  • Enter. Then restart your PC.
  • Congratulations, Windows 8 Pro you are Genuine or Full Version


For license key Windows 8 Final Pro 32 Bit and 64 Bit,below

XKY4K-2NRWR-8F6P2-448RF-CRYQH

NG4HW-VH26C-733KW-K6F98-J8CK4

RR3BN-3YY9P-9D7FC-7J4YF-QGJXW








Thursday, 25 July 2013

40 Operating Systems Which Are Programmed And Designed Using C Programming Language

40os
Most of the programmer choose C Language to code, because of its simplicity and reliability. This language is becoming more and more popular. That's why I have listed 40 operating systems that are designed and programmed only with C Programming.








Firstly take a look on it.. and finally do a share of this post and drop a peace of comment to me.
1. DG/Ux
2. DDC-l
3. OpenVMS
4. Ultrix
5. HP-UX
6. Enea OSE
7. Google Chrome OS
8. Android
9. HP-UX 11i
10. z/OS
11. AIX (Advanced Interactive Exective)
12. Open-Solaris
13. OS/2
14. IBM Academic
15. ICL VME (Virtual Machine Entertainment)
16. MicroC/OS-III
17. Windows NT
18. Windows CE
19. Singularity OS
20. RTXC Quadros
21. OS-9
22. Solaris
21. UNIX
22. Minix
23. BSD Minix
24. Darwin
25. Linux
26. Open-Indiana
27. React-OS
28. Inferno
29. Morph-OS
30. EmuTOS
31. iOS
32. Maemo
33. Windows Phone
34. iPoadLinux
35. Rockbox
36. eCos
37. Thread X
38. Unix
39. Amiga-OS
40. Mint (Tos)

How To Change Color Of Command Prompt In Your Computer

The Command Prompt in Windows provides access to over 280 commands! Among these we just use about 20 to 30 in black background and with white font. But have you imagined yet that you can change the color of font in Command prompt? Have you ever think about it?

I am going to explain how to change font color in command prompt:



Step 1 : Launch Command Prompt


Press Windows key + R > Type cmd in text box and hit Enter button.
A command prompt will be open.

Step 2 : 

Now type command color z and hit Enter Button.

Step 3 : 

Command Prompt will display list of colors.

Step 4 : 

Now Command Prompt will ask to enter any key.. Now hit Enter button..

Step 5 : 

Select your choice color number from step 3.

Step 6 : 

Now Enter command color
eg. If you wants color to Aqua, then enter command color 3

Enjoy commanding! - See more at: http://bybitz.blogspot.com/2013/07/how-to-change-color-of-command-prompt.html#sthash.HbiKlnFH.dpuf

HIDE YOUR DESKTOP ICONS - EASY BUT AMAZING

desktopbybitz

Here is the very easy and amazing tip, you can try it out on your PC or laptop. Dont worry I will not going to take your time..
Just follow simle steps..
Step 1: Go to your desktop

Step 2: Click right button of your mouse
Step 3: Go to View option
Step 4: And Deselect Show desktop icons
And thats all..
Your destop is empty now..
Hey its not over..
How to bring that icon back?
Just select Show desktop icons from step no 4.
And your desktop icons are back..
Now its your choice to visit back or not to Shahzebx.
Thanks..
Please Share our site with your friends for latest tips and tricks..

Thursday, 11 July 2013

7-Point Action Plan Proposed for Cyber Secure Pakistan

inp 08 50 7 Point Action Plan Proposed for Cyber Secure PakistanTo address security issues related to the internet , Senate Committee on Defence and Defence Production organized a policy seminar on “Defending Pakistan Through Cyber Security Strategy” in coordination with Pakistan Information Security Association (PISA) yesterday at Pakistan Institute of Parliamentary Services (PIPS), Islamabad.
Senator Mushahid Hussain, Chairman of Senate Committee on Defence and Defence Production, in his welcoming address, said that the cyber security threat can affect Pakistan’s national defence, security, intelligence, diplomacy, nuclear and missile programme, economy, energy, education, civil aviation as well as industrial and manufacturing units both in the private and public sector. “Cyber security is an issue of paramount importance for Pakistan’s stability and progress.”
Ammar Jaffari, President of Pakistan Information Security Association (PISA) highlighted the importance of National Cyber Security Policy. “As a Global best practice to achieve desired results Pakistan need to have a road map which can only be achieved under a National Cyber Security Policy.” He said.
In the Q&A Session, Senator Farhatullah Babar suggested to form focal ministry or division exclusively to handle cyber security issues. He said laws for data protection should be introduced and in this regard, industry experts have to join hands with Parliamentarians. Senator Mushahid Hussain informed Senate Defence Committee has already taken initiative to form Joint Task Force for Cyber Security having technical support of PISA to present recommendations and situation analysis.
In his concluding speech, Senator Mushahid Hussain thanked the members of Senate Defence Committee and announced the Senate Defence Committee is proposing the following 7-point Action Plan for a Cyber Secure Pakistan:
  1. Relevant legislation to preserve, protect and promote Pakistan cyber security, drafting for which has already begun. We will presents bills in Parliament for Cyber Security.
  2. Cyber security threat should be accepted and recognized as new, emerging national security threat by the Government of Pakistan, similar to the threats like terrorism and military aggression.
  3. Establishing a National Computer Emergency Response Team (PKCERT).
  4. Establishing a Cyber-Security Task Force with affiliation with Ministry of Defence, Ministry of IT, Ministry of Interior, Ministry of Foreign Affairs, Ministry of Information and our security organizations plus relevant and leading professionals from the private security so that Pakistan can take steps to combat this new emerging threat and formulate Cyber Security Strategy for Pakistan.
  5. Under the office of the Chairman, Joint Chiefs of Staff Committee, an Inter-Services Cyber Command should be established to coordinate cyber security and cyber defence for the Pakistan Armed Forces.
  6. Within the framework of SAARC, Pakistan should take the initiative to initiate talks among the 8-member states particularly India to establish acceptable norms of behavior in cyber security among the SAARC countries so that these countries are not engaged in cyber warfare against each other. If Pakistan and India can have an agreement not to attack nuclear installations, why not an agreement seeking the prevention of cyber warfare against each other?
  7. Soon after Eid, the Senate Defence Committee, in cooperation with the Pakistan Information Security Association (PISA), will have a special media workshop to promote awareness among the public and educate opinion leaders on the issue of cyber security.
The seminar was attended by a number of representatives from civil society, government officials, ministries, academia and media as well.

Thursday, 30 May 2013

Wifi Scaning Free Tools


hacking wifi, hacking wireless,hacking wireless modem

Topics that we cover in this tutorial:
1. Wifi or Wireless Scanning tools
2. Scanning the Wireless Networks or Wifi Networks.
3. WEP hacking and cracking tools
4. Cracking the WEP key of wifi or Wireless Networks
5. Wireless Sniffing Tools
6. Wireless Sniffing technique
7. Security Measures to protect yourself from these attacks.

Guys you must know everything that's why i am explaining each and everything in this tutorials related to wireless networks or wifi hacking. Its a complete wireless network hacking tutorial with allhacking tools and how to use them. Using these you will came to know how to hack wifi or wireless networks and note guys this tutorial is 110% working like other one's.
Note: This article is only for Educational Purposes so that you can understand the loopholes in wireless networks and fix them. Any misuse can result in disastrous consequences like cyber crime.

Don't worry everything is ethical till you misuses it. So always try to be ethical as far as possible. Lets start from the first topic...

1. WIRELESS SCANNING TOOLS
Scanning tools is needed to scan the wifi or wireless networks around you. First of all we need to scan all the wireless networks so that we can select the wireless network to hack. There are several wireless scanning tools but my favorite is NET STUMBLER. And for Mac operating systems is MacStumbler.
There are several Wireless scanning tools, a list of all wireless scanning tools is given below:
a. NetStumbler for Windows operating systems.
NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows 98 and above. A trimmed-down version called MiniStumbler is available for Windows CE.

NetStumbler is commonly used for:
  • Wardriving
  • Verifying network configurations
  • Finding locations with poor coverage in one’s WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized (”rogue”) access points
  • Aiming directional antennas for long-haul WLAN links


b. MacStumbler for Mac operating systems.
MacStumbler is a small utility to emulate the functionality of projects like netstumbler, bsd-airtools, and kismet. It's meant purely for educational or auditing purposes, although many people enjoy using these types of programs to check out how many WiFi (wireless) networks are in their area, usually known as "war driving".
MacStumbler only works with AirPort wireless cards, it does not (yet) work with any PCMCIA or USB wireless devices. 



c. Kismet for Windows and Linux.
Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic. Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.



d. Redfang 2.5
Redfang is an application that finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the device's Bluetooth address and doing a read_remote_name().
http://www.hacker-soft.net/Soft/Soft_4399.htm

DOWNLOAD:Redfang


e. THC-WarDrive
THC-WarDrive is a tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. THC-WarDrive is effective and flexible, a "must-download" for all wavelan nerds.
  
DOWNLOAD:THC-WarDrive
f. PrismStumbler
Prismstumbler is software which finds 802.11 (WLAN) networks. It comes with an easy to use GTK2 frontend and is small enough to fit on a small portable system. It is designed to be a flexible tool to find as much information about wireless LANinstallations as possible. Because of its client-server architecture the scanner engine may be used for different frontends. 

DOWNLOAD: PrismStumbler


g. Mognet
Mognet is a free, open source wireless ethernet sniffer/analyzer written in Java. It is licensed under the GNU General Public License. It was designed with handheld devices like the iPaq in mind, but will run just as well on a desktop or laptop to find wireless networks.

DOWNLOAD: Mognet


h. WaveStumbler
WaveStumbler is console based 802.11 network mapper for Linux. It reports the basic AP stuff like channel, WEP, ESSID, MAC etc. It has support for Hermes based cards (Compaq, Lucent/Agere, … ) It still in development but tends to be stable. It consist of a patch against the kernel driver, orinoco.c which makes it possible to send the scan command to the driver viathe /proc/hermes/ethX/cmds file. The answer is then sent back via a netlink socket. WaveStumbler listens to this socket and displays the output data on the console.

DOWNLOAD: WaveStumbler


i. StumbVerter
StumbVerter is a standalone application which allows you to import Network Stumbler's summary files into Microsoft's MapPoint 2002 maps. The logged WAPs will be shown with small icons, their colour and shape relating to WEP mode and signal strength.

DOWNLOAD: StumbVerter


j. AP Scanner
Wireless Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD and AIX.

DOWNLOAD: AP Scanner

k. SSID Sniff
SSIDsniff is a nifty tool to use when looking to discover access points and save captured traffic. Comes with a configure script and supports Cisco Aironet and random prism2 based cards.

DOWNLOAD:SSID Sniff


l. Wavemon
Wavemon is a ncurses based application forwireless hardware. It`s running currently under Linux with cards witch supported by Jean Tourrilhes wireless extensions. You will find them in the Kernel 2.4. I used this tool a few times, it`s small, works, opensource and good.

DOWNLOAD:Wavemon


m. Wireless Security Auditor
Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2 -PSK text passwords in order to test how secure your wireless environment is.



n. AirTraf
AirTraf 1.0 is a wireless sniffer that can detect and determine exactly what is being transmitted over 802.11 wireless networks. This open-source program tracks and identifies legitimate and rogue access points, keeps performance statistics on a by-user and by-protocol basis, measures the signal strength of network components, and more.

DOWNLOAD:AirTraf


o. AirMagnet
AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise Wi-Fi networks. AirMagnet WiFi Analyzer helps IT staff quickly solve end user issues while automatically detecting network security threats and other wireless network vulnerabilities.
DOWNLOAD:AirMagnet