Thursday, 4 December 2014

Partition problem while dual booting ubuntu with windows

Hello all, As the time changes and new generation is moving towards linux operating system there are more people who want to or try install versions of linux (ubuntu in common) on their systems. Giving away windows for new users is not an easy task.
So, one of the best way is to interact both with the windows and ubuntu at the same time and on the same system.'
There are certain problems that arise during dual booting ubuntu with windows and in this article I am going to discuss one of those.

Partitions not visible at the time of installation of ubuntu alongside windows.

Saturday, 6 September 2014

A way to to store 1000TB on a CD

A young Victorian researcher has made a breakthrough in optical formatting that could significantly increase our data storage capacity.
t5gbpxcm-1371621655
Image: Nature Communications
Every day, humans are producing more data than ever before - around 90% of the world’s data was generated in the past two years alone - and there will come a point when our data storage centres and the cloud can no longer keep up.
But Dr Zongsong Gan, a researcher at Swinburne University of Technology in Melbourne, Australia, has found a revolutionary way we can fit a whole lot more data onto traditional optical storage devices, such as CDs, and is now using that technology to help data storage keep up with demand.
In 2013, Gan and his colleagues found out how to fit 1,000 terabytes (TB), or 50,000 high-definition movies, onto a DVD - an increase from the 4.07 gigabytes they’re currently capable of storing. And he’s now been awarded one of 12 Victoria Fellowships in 2014, which will help incorporate his research into practical, mass storage devices.
Gan and his colleagues managed to increase DVD storage so significantly by using light to create extra small dots or ‘bits’ - the unit used to store information. This means they could write far more information than ever before onto discs the same size.
This advance required them breaking a physical barrier known as the diffraction limit of light. Light cannot be split any smaller than around 500 nanometres, and before their work it was thought that, because of this, light wasn't capable of writing bits of information smaller than 500 nanometres across. 
But by using two-light-beams with different abilities, the scientists managed to whittle down the point of light writing the data to just nine nanometres across, or one ten thousandth the diameter of a human hair. 
npmycqrs-1371621965
Image: Nature Communications
Both the beams used were 500-nanometres-wide, but one was for writing information (red), and the other beam (purple) blocked the first from writing information. By making the second one doughnut-shaped, they created only a small space that the first beam could write information through, as shown in the image above.
With the $18,000 fellowship, Gan will collaborate with industry and researchers around the world to work on new breakthroughs for data storage devices, and also see how his existing research can be used on a larger scale to rapidly improve the capacity of optics-based information technologies.
“The successful development of our technology will result in possible Victorian owned long-term patents and create a global role for Victoria, reinforcing the state’s profile of fostering high-tech industry and an innovative research environment, in particular in optics-based information technologies,” Gan explained in a press release.

Source: http://www.sciencealert.com.au/

Thursday, 4 September 2014

Computer Runs Slow

Symptoms

Is your computer system taking its sweet time to load your desktop icons every time you turn it on? Your programs might also be running at a snail’s pace as well. Chances are that you have also come across your fair share of computer crashes. Other symptoms might display error messages that might indicate an infected system. For example –

  • Hardware like printers and USB devices might not be responding to your commands
  • The errors might not be letting you access files on your computer
  • The sizes of your files fluctuate even if you are able to access them

There are many reasons why your system always keeps you waiting. Some of them are as follows –

Causes

Low hard Disk Space

This is one of the most common reasons that might make a computer system run slower than it normally does. A near full hard drive will eventually fill up as you include more digital content like pictures or videos in it. The more filled it is the slower will a hard drive be.

Viruses

This goes without saying. Your system can be attacked by viruses if you haven’t installed any protection. Malicious viruses can sometimes inflict irreparable damage on a system. Most of them are designed to steal valuable info like credit card information. Unfortunately viruses also have a tendency to bog down your system.

Spyware

Like viruses, malicious spyware will also cause your system to run slow. This is software that installs itself into a computer and enables information to be leeched to another source without the user’s knowledge. Hackers also use spyware to access private information like passwords and a user’s internet history this way.

How to Fix the Issue

All is not lost. Fortunately there are many digital software that you can use to free your hard drive from the extra space, get rid of any malicious viruses or malware that might have taken residence and make your system run faster –

Install Virus Protections and Anti-malware Software

Most computers are already equipped with anti-virus and anti-malware tools at purchase. If you haven’t activated or updated them in a while it is best that you do so now. Software that hasn’t been updated will not be able protect your computer against such threats efficiently. Once it is, your system should operate smoothly.
Always check whether your antivirus protection is running on a regular basis. If your system is infected it might also have deactivated your antivirus protection without your consent.

Optimize your PC through RegCure Repair Tool

You can also download RegCure Repair Tool to optimize your system. The tool cleans and fixes your system in order to make it capable of running at peak performance. It also repairs system errors, optimizes your PC’s memory, removes malware and deletes privacy files to make it more secure.
Now that you know what can cause your computer to stop working at its best it’s time that you get to it before anything else can get at it.
Download Now: Windows Repair Tool 
* RegCure Pro will scan your system & repair the issue 
Source: Yahoo

Thursday, 21 August 2014

WhatsApp Magic

What's more important in today's world or I should say for a "SMART" generation??
The answer will be "Smart Phones" and in that "Facebook" or any other social networking sites and the one which replaces inbuilt text message service, The "WhatsApp".
In this article I am going to show you what all you can do in WhatsApp besides just chatting.

Here are some tips and tricks for WhatsApp you can try to bring a change from what others are having.

Recover Deleted Messages

Sunday, 10 August 2014

Use pendrive as password


Computers are the most important storage area to store valuable files, documents and data, etc., for any individual person or an organization. Security is also necessary for these computers. So Security is most crucial for the computing world. Admin Password is not enough to protect your PC because hackers have various ways to hack your PC or they can easily steal your valuable data.
In this tutorial, I am going to discuss about "How to turn your pendrive a password for your system". Yes!! Pendrives are not only storage device, its more than that, one can use pendrive in many different ways according to their needs.
For now, I am writing a cool trick how to use your pendrives as a password, i.e everytime if anyone wants to access your PCs or laptops, they need your pendrive to access your system. It is quite easy and helpful trick.

Locking a pendrive

You know that “security” and “privacy” are the two most essential things that should not be compromised. In the daily life, to prevent ourself from security threat we use passwords and a lot more things, like in our bank accounts, phone, computers, online accounts etc.
We are well aware that to transfer data, pendrives or SD cards are choosen by default. Now if we want to keep ourself safe from all sort of threats, why not to consider putting locks to our pendrives or SD cards.

Monday, 28 July 2014

18 Tar Command Examples in Linux

The Linux “tar” stands for tape archive, which is used by large number of Linux/Unix system administrators to deal with tape drives backup. The tar command used to rip a collection of files and directories into highly compressed archive file commonly called tarball or tar, gzip and bzip in Linux. The tar is most widely used command to create compressed archive files and that can be moved easily from one disk to anther disk or machine to machine.

In this article we will going to review and discuss various tar command examples including how to create archive files using (tar, tar.gz and tar.bz2) compression, how to extract archive file, extract a single file, view content of file, verify a file, add files or directories to archive file, estimate the size of tar archive file, etc.
The main purpose of this guide is to provide various tar command examples that might be helpful you to understand and become expert in tar archive manipulation.

Saturday, 26 July 2014

25 Useful Basic Commands of APT-GET and APT-CACHE for Package Management

This article explains how quickly you can learn to install, remove, update and search software packages using apt-get and apt-cache commands from the command line. This article provides some useful commands that will help you to handle package management in Debian/Ubuntu based systems.


What is apt-get?

The apt-get utility is a powerful and free package management command line program, that is used to work with Ubuntu’s APT (Advanced Packaging Tool) library to perform installation of new software packages, removing existing software packages, upgrading of existing software packages and even used to upgrading the entire operating system.

What is apt-cache?

The apt-cache command line tool is used for searching apt software package cache. In simple words, this tool is used to search software packages, collects information of packages and also used to search for what available packages are ready for installation on Debian or Ubuntu based systems.

Virtual Keyboard in iPhone 6

Apple iPhone turns table top into full-sized invisible keyboard

We have virtual keyboards, clip-on keyboards, magnetic keyboards and even laser keyboards. But what if your keyboard wasn’t a keyboard at all?
Florian Kräutli has developed an ingeniously simple alternative called the Vibrative Virtual Keyboard. By placing an iPhone on any surface, that surface becomes a keyboard. Technically, the phone’s accelerometer is measuring vibrations on that surface. Kräutli’s software maps those vibrations to a point of origin on the table. And when the phone can “see” where you’re tapping, you can have a QWERTY keyboard on any tabletop.
“I wondered how a normal surface might become interactive, without using an elaborate combination of projectors and cameras, as Microsoft is currently doing in their research,” Kräutli explains. “There are already tons of sensors in current smartphones, so I thought there must be more that we can do with them.”

Xiaomi Mi 3




Earlier this week, Chinese consumer electronics giant, Xiaomi set foot in the Indian market with the official release of the flagship smartphone Mi3.
The company opened Xiaomi Mi3 online sale via Flipkart at 12 noon for pre-registered (numbering 100,000 plus, as claimed by Xiaomi) buyers and soon the smartphone stocks ran out exactly in 38 minutes 50 seconds.
Considering its feature-rich specifications and dirt-cheap price tag, Xiaomi Mi3 is all set to recreate a new storm just like Motorola's Moto G did in February earlier this year.

Xiaomi Mi 3 detailed specifications

Friday, 25 July 2014

BackTrack 5 or Kali Linux 1.0

BackTrack is/was a specialty Linux distribution for security professionals. It is designed for hacking and penetration testing and is loaded with the best Free and Open Source (FOSS) hacking applications available. The last edition was BackTrack 5 R3 (the R is for Revolution).
After BackTrack 5 R3, the developers decided to retool and revamp their distribution. The result of their effort was released as Kali Linux. So the gist of this article is this: BackTrack is now known as Kali Linux, and if you came to this website searching for information about BackTrack 5 R3, Kali Linux 1.0 is the distribution you should be looking for.
So, aside from upgraded applications and a name change, what’s the real difference between BackTrack and Kali Linux?

Thursday, 24 July 2014

Cat5e vs. Cat6





















Cat6 cables, also called Category 6 or Cat 6 cables, provide lower crosstalk, a higher signal-to-noise ratio, and are suitable for 10GBASE-T (10-Gigabit Ethernet), while Cat5e cables support only up to 1000BASE-T (Gigabit Ethernet). As a means of future-proofing your network, Cat6 is generally a better choice and worth the small premium in price. Cat5e and Cat6 cables are both backwards compatible, which means newer Cat6 cables can be used with older Cat5e, Cat5 and even Cat3 equipment.


Saturday, 19 July 2014

Coming Soon : Lockscreen apps for Windows phones

New Lock Screen
Traditional Lockscreen


Back in May when Microsoft announced update Windows phone 8.1 during build 2014, this feature was kept secret from public but somehow we were able to get a peek through it.

This project is being developed with the collaboration of Microsoft and Windows phone developer Rudy Huyn.

Earlier from its screenshots only of this project it was depicted that users could thoroughly customize their lock screens to various predefined templates.


We see this as a brilliant effort from Microsoft which might help Windows phone to gain traction towards more premium features. And yes, this will be soon available as an 3rd party app from Windows phone store.

How to use WINE in Kali linux

What’s Wine?


Initially, the name Wine was an acronym for WINdows Emulator. But now, Wine INot an Emulator: it is a compatibility layer, an interface that allows to run Windows binaries on a host system. To do this, Wine implements the Windows application binary interface in the user space, rather than as a kernel module. A daemon known as wineserver provides the services normally provided by Windows kernel.
The security in Wine is good enough, because applications running in Wine are confined to the current user’s privileges. For this, is a good choice to not run Wine with the superuser‘s account, because of its unlimited privileges! However, it is too difficult that a virus written for Windows damages our system.

Friday, 18 July 2014

Simple code for KBC project in C#.net

The project includes a database(here I use SQL server) from where questions and options will be fetched to the Windows form in Visual Studio under C#.

This code is based on following database architecture:





Tuesday, 15 July 2014

How to trace IP address using Wireshark












Wireshark is software that "understands" the structure (encapsulation) of different networking protocols. It can parse and display the fields, along with their meanings as specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture packets on the types of networks that pcap supports.
You can read more about Wireshark on Wikipedia: http://en.wikipedia.org/wiki/Wireshark .

You can download wireshark from the given URL: http://www.wireshark.org/download.html , select the required version from the list.

Watch how it works on youtube, Link:
https://www.youtube.com/watch?v=hBcvX6GA5UQ

Enjoy!!

FIND LOCATION BY IP ADDRESS

This is a simple trick and by using it you will be able to track someone’s location using his computer network’s IP (Internet Protocol Address) address. You can use this technique in anonymous chat websites like Omegle and other to find out the strangers location.  But first of all, you will have to be aware of some basic terms related to the worldwide web and computer networks.
What is an IP Address?
IP address is a numerical label assigned to each computer participating in a network. In simple terms it’s similar to your house number but in the case of computers it is assigned to identify it on the network. The IP address of your computer is accessed by almost every website so that it can communicate and identify your computer on the network.  Every computer has a unique IP which makes it possible to be identified and browse the internet. You can find out the IP address of your computer by  using sites like www.whatismyip.com or by simply searching for the term “What is my IP ? “ on Google Search.

Monday, 14 July 2014

Finding Serial Key Of Any Software Using Simple Google Trick

Finding Serial Key Of Any Software Using Simple Google Trick


google tricks
Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily.

How To Find Serial Key Of Any Software ?

The key 94FBR is a part of  Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick

    1. Go to Google
    2. Then type  Software Name 94FBR
  • Replace Software Name with the name of software whose serial key you want to find
  • Eg: To find serial key of Nero i will type Nero 94fbr
    3. Now press Enter and you will find serial key of software you are looking for as shown below.
google trick to find serial key

Sunday, 13 July 2014

Basic Linux Commands

Starting a Terminal

In Unity

Unity is the default desktop environment used as of 11.04. Where systems are not ready for Unity they revert to GNOME which is also used in previous releases such as Ubuntu 10.04 LTS (Lucid), see next sub-section.
The easiest way to open the Terminal is to use the 'search' function on the dash. Or you can click on the 'More Apps' button, click on the 'See more results' by the installed section, and find it in that list of applications. A third way, available after you click on the 'More Apps' button, is to go to the search bar, and see that the far right end of it says 'All Applications'. You then click on that, and you'll see the full list. Then you can go to Accessories -> Terminal after that. So, the methods in Unity are:
Dash -> Search for Terminal
Dash -> More Apps -> 'See More Results' -> Terminal
Dash -> More Apps -> Accessories -> Terminal
Keyboard Shortcut: Ctrl + Alt + T

Complete Guide On How To Install Kali Linux In VMware

This tutorial will walk you through the difficult process of installing Kali Linux in VMware Player, a free virtual machine manager that can be downloaded from www.vmware.com.

Step 1:

First we need to download Kali from http://kali.org/downloads/. If you have a 64-bit capable computer , then you probably will want the 64-bit version of Kali for performance reasons.
Expand the drop down menu’s to find the version you need. Select the 64-bit version ONLY if you have a 64-bit computer.


step 1


Saturday, 12 July 2014

Video Compressor

How to compress large video files without losing quality using Handbrake: 


Large video files are slow to upload and download.  One of the most popular tools that can significantly shrink the file size without losing quality is Handbrake.  It is popular due to three reasons:
  • It can convert video from nearly any format, e.g. .wmv – Windows Media Video File, .avi – Audio Video Interleave File, .m4v, .mov, etc.
  • It is free and Open Source
  • It works on Windows, Mac and Linux

This tutorial illustrates how to compress a video file for the web on a Windows machine. The sample file I used to compress was called WL-Video.wmv and its original size was 39.0 MB.  After compression the file size was down to 4.40 MB.  The compressed video format is MP4 as it is the most supported video format on the web. Depending on your original video file, following the instructions in the tutorial, the file size may still be reduced if your video file is already MP4 format.

Download and install Handbrake if you do not have it

  1. Download Handbrake at http://www.handbrake.fr
  2. Double click the downloaded file to install Handbrake by following the instructions on screen.

Compress videos
3. Launch Handbrake.  Do not be put off by all the buttons and options available – you usually only need to use a few of them.
handbrake-0
4. Click Source > Open File to select the video you want to compress.  In this tutorial, I select WL_Video.wmv and then click Open.  You can see the original size was 39MB.
handbrake-1
handbrake-10
5. In Handbrake, under Destination you can decide where the compressed file is saved by clicking Browse.  By default, it is saved in the same folder where the original file is.  You can change to other location if necessary.   You are required to provide a name for the compressed file.
handbrake-18
6. For Output Settings, choose Mp4 if it is not selected and select Web Optimized.
handbrake-4
7. Click on Video and make sure that H.264(X264) is selected.
handbrake-5
8. Click Start to compress the video.  The green Start button will become red Stop button until the compression is complete.   When it is back to green.  You are ready to view the compressed video.  The original video file was reduced from 39.0MB to 4.40MB.  The compressing process for this small file took around 20 seconds.  If it is a very large file, it can take much longer to compress.
handbrake-12Note: 
This tutorial aims to introduce the basic features in Handbrake.