Posts

Showing posts from April, 2014

How to Use HBCD |Rajat Poonia Rajasthan

HBCD used for many purposes but mostly we use for passwords. How to use or when to use which feature : *upto windows 7 we can use kon-boot software which is a part of HBCD.Kon-boot eaisly bypass passwords of windows after then we can do our work. *In win 8 kon-boot not work so inplace of that we use mini xp ,which also part of HBCD. After start xp ,if want to change the password then using 'NTPTedit' program we replace the old sam file with our new sam file(sam file is a file which contain windows password & it is a system file) .

Bypass passwords |Rajat Poonia Rajasthan

Image
Hiren's Boot CD (HBCD) HBCD is created by "Hiren" & "Pankaj", is based on Knoppix and a collection of other freeware tools. Hiren’s Boot CD is an all-in-one bootable CD solution that contains a load of useful tools you can make use of in a variety of situations. I am talking about hard drive failure, virus infections, partitioning, password recovery and data recovery. It has a multitude of tools divided into a number of categories like partitioning tools, backup, recovery and BIOS/CMOS tools to name a few. As it is bootable, the operating system of the computer need not be available for the tools to be usable. All that is required is that the computer is able to run Microsoft Windows and Linux (but it does not have to have either of these installed at the time of use). Most of the tools are also available when the operating system is already started. HBCD contains many programs  ::     Mini Windows 98     Mini Windows XP     A collection of MS-D

NO Suggestion please !!! |Rajat Poonia Rajasthan

Image
Many things in this world are really different because they can happen at any time and we think it is fantastic and you just enjoy those things.But at that time there are people who give you  suggestions about things which you are doing and these suggestion  can be applied  into your life. Suggestion given by family members are really really helpful because they want your success.They can't be wrong for you.Where as suggestions given by outsider people are different,we can't easily believe on them.because we actually don't know what aim they have behind it. But it doesn't mean all outsiders are wrong.It means you sit and think about those suggestions and what their affect in your life. Recently one of my friend told me about what happen with him.He said that few months before one of his senior suggest him that you need to do all study and other extra work yourself  you should not depend on your college for future plans of getting higher jobs by getting good marks an

Instagram user's ...|Rajat Poonia Rajasthan

Image
Instagram user's should need to know what they are using and what happening on their social networking site. if you dont listen about the the news that Instagram was Down (just in recent days) for some time.It was down that was a big issue because reason why it was happened and could not discovered yet.... According to Isitdownrightnow.com and Twitter, and my iPhone, the service is down for everyone. According to this service status site, Instagram has been down for about an hour. Instagram has not made a comment on the matter yet, but we’ve reached out and will update as soon as humanly possible. Update — 10:20 a.m: Instagram says they’re aware of the issue and are working on it, but it’s still down. Update – 11:25 a.m.: Instagram hasn’t confirmed that everything is back up yet, but things seem to be coming back online slowly. Update: 12:01 p.m.: 3 hours later, Instagram seems to be almost entirely back online. Let the narcissism commence!

Google Search |Rajat Poonia Rajasthan

Image
Google runs on a distributed network of thousands of low-cost computers and can therefore carry out fast parallel processing . Parallel processing is a method of computation in which many calculations can be performed simultaneously, significantly speeding up data processing. Google has three distinct parts: Googlebot, a web crawler that finds and fetches web pages.The indexer that sorts every word on every page and stores the resulting index of words in a huge database. The query processor, which compares your search query to the index and recommends the documents that it considers most relevant As he pointed out above, there are a couple of key distinctions to make here:  Keyword data and search query data are not the same thing. If Google stops passing the full set of referrer data on paid search clicks, this will impact search queries, not keywords.Platforms that rely on Keyword IDs, as Marin does, would not have their bidding capabilities disrupted.   The techno

Open Source |Rajat Poonia Rajasthan

Image
Open source software is software that can be freely used, changed, and shared (in modified or unmodified form) by anyone. Open source software is made by many people, and distributed under licenses that comply with the Open Source Definition. In simple means we can use and modify its soucre code(programming) and can use for our purposes. like-linux,php,android .... >Open-source software is very often developed in a public, collaborative manner. >When an author contributes code to an open source project (e.g., Apache.org) they do so under an explicit license (e.g., the Apache Contributor License Agreement) or an implicit license (e.g., the open source license under which the project is already licensing code). Some open source projects do not take contributed code under a license, but actually require (joint) assignment of the author's copyright in order to accept code contributions into the project (e.g., OpenOffice.org and its Joint Copyright Assignment agreem

Biggest exploit of the last 12 years ... |Rajat Poonia Rajasthan

Image
Heartbleed is the name given to a vulnerability in the OpenSSL underpinning large sections of the Web, which potentially exposes passwords and other data from various sites. The code that contains the bug was written by programmer Robin Seggelmann , who admits he "missed the necessary validation by an oversight." * *Heartbleed is a security vulnerability in OpenSSL software that lets a hacker access the memory of data servers. According to Netcraft, an Internet research firm, 500,000 Web sites could be affected. That means a user's sensitive personal data -- including usernames, passwords, and credit card information -- is potentially at risk of being intercepted.  The vulnerability also means an attacker could steal a server's digital keys that are used to encrypt communications and get access to a company's secret internal documents. The programmer who inadvertently introduced the Heartbleed bug to the Internet on New Year's Eve 2011 reck

A New Software ,Steal Your Passwords.....|Rajat Poonia Rajasthan

Image
Heartbleed-Username,password,bank detail & credit card detail are stolen.... Heartbleed is newest software bug or say virus program made by hackers to steal users information lile - username,password and detail,email accounts and a wide range of online commerce. Recently by using this software user's Bank details are easily taken. Due to this Many of online tax serivices and other transfer services are stopped in many country. company's servers which are affected by this, are giving advice to change their password. How it works:: This bug software 1st found inside a secure socket layer(ssl).ssl used to kept secure information and data protection.It store data as library .It converts data into special code which flows between user's computer & server's on internet. 

Windows XP By By ...Its Time to Retire |Rajat Poonia Rajasthan

Image
(Its Time to Retire) Windows XP support has ended ...  Microsoft provided support for Windows XP for the past 12 years. Now Microsoft has also stopped providing Microsoft Security Essentials for download on Windows XP. *Due to easy hacks in windows XP ,Microsoft decided to stop services for win xp. *This could be problem for win xp  users , mostly  government offices which use win xp for their work. *It is right decesion taken by Microsoft which also shows that how eaisy it can be hacked due to its low protection level.This news may be bomb for whom use win xp, because they have habbit of work with win XP. *It is also shock for youngester ,who start playing games using win xp.

Networking Engineers |Rajat Poonia Rajasthan

Image
How to Become a Networker : Starting or building a career in computer networking. Many view computer networking as one of the best and "hottest" career fields available today. Some claim that a serious shortage of qualified people to fill these networking jobs exists, and these claims may lure some people into the fray hoping for an easy position with a fast-growing company. Employment Opportunities in Computer Networking: The Indian market for computers and peripherals has been growing at a rapid pace. In fact, the networking market is one of the fastest growing segments in the industry. Over three million computing and networking units sold last year and the figure is expected to grow by 40 % crossing the 4.2 million mark this year. Driving this boom are technological innovations and a drop in prices. This will translate into a PC penetration of 20 per 1000 people. Going by the average requirement of one hardware engineer for every 50 machines, the demand for netw

CS Engineers |Rajat Poonia Rajasthan

Image
Computers have become a ubiquitous part of modern life, and new applications are introduced every day. The use of computer technologies is also commonplace in all types of organizations, in academia, research, industry, government, private and business organizations. As computers become even more pervasive, the potential for computer-related careers will continue to grow and the career paths in computer-related fields will become more diverse. The career opportunities for computer science graduates can be : *Top 10 Job Titles for Computer Science Majors     Software Engineer     Systems programmer     Systems Engineer     Software Developer     Java Developer     Business Analyst     .NET Developer     Web Developer     Systems Administrator     Project Manager     Network Engineer * Top 10 Companies Hiring      CSC     AppLabs     General Dynamics     Microsoft     Deloitte     Amazon     ManTech Int'l Corp.     Raytheon     HP     Northrop Gr

Electronics Engineers |Rajat Poonia Rajasthan

Image
Electronics is the branch of study that has revolutionized the life style of humanity. It is a pace setter and a prime mover behind the transition to a technological society. The field of Electronics and Communication Engineering encompasses all areas of human life. Radio, television, telephones, computers, automobiles, office machinery and house-hold appliances, life saving medical equipments and space vehicles represent a mere sample in the wide spectrum of application of Electronics. Electronics is the technology concerned with the development and behaviour of devices and circuits (televisions, computers), which make use of electronic components such as transistors or silicon chips. Electronics engineers develop and design products, processes or devices in the field of low-power electricity. *What do Electronics and Communication Engineers do? Design, fabricate, maintain, supervise, and manufacture electronic equipment used in the entertainment media, in hospitals, in the co

How to keep people safe in cyber crime |Rajat Poonia Rajasthan

Image
How to keep people  safe  in cyber crime::: >Cyberbullying  >The Law and Regulations    >Monitoring Internet Use     >Technical Terms & Abbreviations      >Social Networking Sites       >Chat Rooms and Instant Messaging        >Blogging          >Video Resources For Parents - Digital Safety

cyber crime ... |Rajat Poonia Rajasthan

Image
Computer crime or cyber crime , refers to any crime that involves a comuter and a network.The computer may have been used in the commission of a crime, or it may be the target. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Cybercrime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. These include attacks against computer data and systems, identity theft, the distribution of child sexual abuse images, internet auction fraud, the penetration of online financial services, as well as the deployment of viruses, Botnets, and various email scams such as phishing. The FBI certainly is. We lead the national effort to investigate high-tech crime

wanna to success .... |Rajat Poonia Rajasthan

Image
The term “successful” can have a number of meanings and associations for different people. For some, a successful person is a person who earns a lot of money in their job, for others success might be best found in a person working in an honorary post. Success lies in the eye of the beholder. What we ourselves consider as successful might be very different from what other people think about success. A parent might see his son or daughter getting a good grade and think he was successful in his exam, while the student might just think he was lucky. A young girl might see an actress on the television and think that this person must be successful in life, while the actress might consider herself troubled and unhappy because her private life suffers from her popularity as a public figure. Many people want to achieve success in life, but it's easier said than done. There are so many distractions There are so many distractions that it can be challenging to discipline one's sel

Who Changed Your Life |Rajat Poonia Rajasthan

Image
Timeline:  - 1972 - Graduates high school and enters Reed College in Portland, Oregon. Jobs drops out after one semester. 1974 - Takes a job with Atari designing video games, then leaves that same year to travel through India. 1976 - Co-founds Apple in his family's garage with Steve Wozniak and introduces the Apple I computer. 1977 - Along with Wozniak, produces the Apple II. 1980 - Apple comes out with the Apple III. 1983 - The Apple Lisa is introduced which is purportedly named for his daughter, Lisa. 1984 - Apple introduces the Macintosh. 1985 - Leaves Apple due to disagreements with management. Launches the computer company NeXT. 1986 - Purchases Pixar Animation Studios from George Lucas. 1996 - Sells NeXT to Apple and rejoins Apple as a consultant. 1997 - Is named interim CEO of Apple. 1998 - Apple introduces the iMac. 2000 - Becomes permanent CEO of Apple. 2001 - Apple introduces the iPod, a portable mp3 player. April 28, 2003 - Apple launc

Just Can't Forget |Rajat Poonia Rajasthan

Image
** Steve Jobs co-founded Apple Computers with Steve Wozniak. Under Job's guidance, the company pioneered a series of revolutionary technologies, including the iPhone and iPad.** When Steve Jobs was 6 years old, his young next door neighbor found out he was adopted. "That means your parents abandoned you and didn't want you," she told him. Jobs ran into his home, where his adoptive parents reassured him that he was theirs and that they wanted him. >At about age 12, Jobs asked William Hewlett, co-founder of Hewlett-Packard for some parts to complete a school project. Hewlett offered Jobs an internship at his company. ** Steve spends the fall semester at Reed College, Oregon, then drops out. He will stay on campus and attend the classes that interest him for a while, then move to a hippie commune. >Steve gets his first job at video game maker Atari, and later makes a trip to India to 'seek enlightenment' with his college friend Dan Kottke.

Are You Safe On the Internet! |Rajat Poonia Rajasthan

Image
Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people. >We should be worried about how internet companies are getting people to part with their money, not their privacy. The Internet Society works in both the technical and policy arenas, supporting the development of tools and policies that empower people to manage their online identities and the 'digital footprint' they leave behind. > Provision or restriction  to third-parties is very essential. >Privacy can entail either Personally identifying information(PII) or non-pll information such as a site visitors on a website.PII refers to any information that can be used to identify an individual. for ex.-age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are uni

Virat Kohli gets marriage proposal |Rajat Poonia Rajasthan

Image
Virat kholi -a great example of a perfect blend of good looks and talent. The Delhi boy not only scores on the cricketing field but off it too. The Indian vice-captain is definitely a huge hit among girls and is also currently rumoured to be dating Bollywood actress anushka sharma. A good start, soon turned into tense situation once India lost a few wickets. But, one end was tied; Kohli just does not know to let it go. He proved himself to be the big match player, hitting Dale Steyn & Co. like practice bowlers. He took India home hitting the winning four with 5 balls to spare. This does not sound that great unless your hear that the guy is just 24. But Anushka’s got some serious competition now, as Virat just got proposed by English lady Danielle Wyatt on Twitter! Who is Danielle? Well, for everyone’s information, Danielle Wyatt is herself a cricketer! So the two have a lot in common.The 22-year-old off-spinner Wyatt, who is not a part of England's current women'

Invention ....that occurs |Rajat Poonia Rajasthan

Image
** Brilliant ideas strike people all the time. Perhaps you've been inspired at some point with the notion for an innovative product or process. Inventors have served to power human progress in ways big and small ever since our anthropoid ancestors stood upright and began making tools. But it takes more than just some clever firing of the brain circuits to turn an invention idea into a working, tangible product. And then it takes even more work to develop it into a mass-market phenomenon that can change people's lives and make the inventor rich as Midas. It’s very easy to believe that a multimillion-dollar invention is just a twist of a screwdriver away. Listen to the seductive radio and television ads that promise to help your invention fly off the shelves. Watch reality television shows like “Shark Tank,” where contestants vie to get businesses to invest in their idea. *** Inventors are creative people who observe a problem and envision a solution.  Practically any

Don't Click ..... |Rajat Poonia Rajasthjan

Image
IDN homography is a way a malicious party  may deceive computer users about what remote systems they are communicating with,by exploding the fact that many different characters look alike. Simply it is way in which a person is forcing to click on that link which look like a famous domain names like-google.com or facebook.com But they are not actual domain names, they only looks like that.this kind of spoofing attack is also known as script spoofing. How it is done:: >BY collecting different type of letters which are same in other languages.  a person frequenting citibank.com may be lured to click a link in which the Latin C is replaced with the Cyrillic ะก. >www.amazon.com  It  looks like amazon.com of course,but it's not.The first ‘a’ is the Cyrillic small letter a, not the English, or Latin rather, small letter ‘a’, although they look identical – they’re from two different languages.   Confused?  Good. Now hover your mouse over the link above, don’t click i

What the fuck....|Rajat Poonia Rajasthan

Image
WTF...with Engineers   A million engineers in India struggling to get placed in an extremely challenging market ... Somewhere between a fifth to a third of the million students graduating out of India's engineering colleges run the risk of being unemployed. Others will take jobs well below their technical qualifications in a market where there are few jobs for India's overflowing technical talent pool. Beset by a flood of institutes (offering a varying degree of education) and a shrinking market for their skills, India's engineers are struggling to subsist in an extremely challenging market. Somewhere between a fifth to a third of the million students graduating out of India's engineering colleges run the risk of being unemployed. Others will take jobs well below their technical qualifications in a market where there are few jobs for India's overflowing technical talent pool. Beset by a flood of institutes (offering a varying degree of education) and a sh