Pages

Showing posts with label PC Computer Tricks. Show all posts
Showing posts with label PC Computer Tricks. Show all posts

How to Use Pen Drive as a RAM

How to Use Pen Drive as a RAM


Does your Computer regularly freeze and are you sick and tired of this ? 

Are you Running Out of the Primary Memory and are you searching for something that increase your computer speed i.e RAM and that too without investing much ?

Then you are at the right place ...!

Today I'm sharing one Trick that " How to Use Pen Drive as RAM " . Firstly, you might be thinking that is it really possible or it's just a prank ?

Well, answer is hell yeah, this is Possible. So, let's increase your Computer Speed by following the basic steps .

Step 1 :- Firstly, Insert your Pen Drive and let your computer read that and Now, Simply format it to utilize it fully. Just Select your Pen Drive by going in " My Computer " then Right Click and Click on Format. 

Step 2 :- Right click on " My Computer " then go to " Properties " .


Step 3 :- Now, the new window will be open called " System Properties " in that you will see the different different options like Computer name, Hardware, " Advanced ", System Protection and Remote.

Just Click on " Advanced " Option.

In case you're using Windows 8 then click on " Advance System Settings ".



Step 4 :- In " Advanced " Click on " Setting ".



Step 5 :- Now, another window will open so, just go in " Advanced " in that Click on " Change "Under Virtual Memory



Step 6 :- The new window will be open " Virtual Memory ". In that just select your Pen drive . Then, just select the " Custom Size " Radio Button . Now, the last thing you need to do is to set the size which depends on the free available space in your Pen Drive. In my case I set it to 1020 and you can set it accordingly . 




After doing so just hit " Set " .

Step 7 :- Now, the System will ask you to Restart the System/Computer just blindly hit " OK ".



That's it you're done now. When you restart you Computer the Speed of the Computer will be Increased.

Just remember one thing when you restart your Computer do not remove your Pen Drive .

How to Create Ad-Hoc in Windows 8 and 8.1

So, How to Create Ad-Hoc in Windows 8 and 8.1 ?

Well this is possible via Command Prompt. Just Follow the basic Steps to Create Ad-Hoc in Windows 8 and 8.1 .

Step 1 :- Press Windows Key + Q to open app search in Windows 8.

Step 2 :- Type "cmd" in search box and Right Click on it >> Run as administrator.

Now, it will open "User Control Access" dialog Box. Just Click Yes.

Step 3 :- Now, in case you just wanted to see whether your network interface supports Visualization or not. Just type

netsh wlan show drivers


In case if it says no then you need to update network adapter's drivers.

Step 4 :- Enter the Following command and this will create your Ad-hoc Connection.

netsh wlan set hostednetwork mode=allow ssid=solvemyhow key=solvemyhow

Then, press Enter. you will receive the output as the Hosted Network mode has been set to allow.


Note :- You can set your own "SSID" and "KEY". Key will work as Password of your Ad-Hoc Network.

Step 5 :- Now, you have to Start the Hosted Network. So, Just Type,

netsh wlan start hostednetwork


You will receive the message like "The Hosted Network  Started" .

Step 6 :- To see whether the Ad-Hoc Network is Created or not. Just go to >> Network and Sharing Center.


Now you can easily create Ad-Hoc in windows 8 and 8.1 and play LAN games like NFS, Counter Strike (My Favorite)  etc.

Step 7 :- If you wanted to stop the Ad-Hoc Network. Just type,

netsh wlan stop hostednetwork

So, this will stop your Ad-Hoc Network. 

TRICK TO SAVE YOUR TIME WHILE INSTALLING WINDOWS














How to install windows quickly or save your time while installing new windows

Now I am going to tell you how to install window quickely and save time because every
 person want to save time  and also “time is money “ so save time.Boot through Windows XP CD.After all the files are completely loaded, you get the option to select the partition. Select “c”.Now Format the partition, whether it is normal or quick with NTFS or FAT
Once the formatting is completed, All the setup files required for installation are copied.Restart your system by pressing Enter.Now, here begins the Simple trick to save 10-15 minutes.
After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
Now, Press SHIFT + F10 Key -> This opens command prompt.
Type “Taskmgr” and press enter. This will open Task Manager.
Click the Process Tab, here we find a process Setup.exe. Right Click on Setup.exe and Set Priority -> Select High or Above Normal. Initially it will be Normal
Full Version

POWER DATA RECOVERY


Power data  recovery  is a software use to recover deleted file orcorrupt file or any file which is missed due to malware.It recovers files in very easy step and very user friendly. Power data Recovery tool will recover your data if the hard drive partition table, boot record, FAT/MFT or root directory are lost or damaged, data lost due to a virus attack, the drive was formatted, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted.This software provides you with the perfect solution to combat digital Data loss be it images, videos clips and movies etc. Appreciably, recover entire data conjointly maintaining the dignity of your data. Data loss may be due to:

•             Deletion of supporting files
•             Bad Sector on the Disk
•             Physical damage to Partition
•             Logical MFT corruption
•             Virus, Malware or Trozan Horse attack
•             Accidental deletion of directories
•             Corruption of coded files
•             Hardware failure

Quick Recovery gives fundamental approach to recover digital media files related to:

•             Audio formats – MP3, RM, RA, AIFF, OGG, WAV etc
•             Image formats – JPG, GIF, BMP, TIFF, JP2 etc
•             Video formats – MP4, DV, DIVX, MOV, MKV, VOB, ASX etc
PROCEDURE:
First of all click on download button to download .rar file
Extract using winrar or any supporting software
Click on setup and follow inststruction
Backup ur drive which you want to recover
When you install software it ask you for registration
Registeration key is inside the rar folder
Put that key into registration block and enjoy
http://adf.ly/h2kju
                                             or
click here to download

Full Version

HOW TO DISABLE ERROR REPORTING IN WIN XP


If you have window xp and you are irritate with errors apper in window xp .so I am going to tell you how to remove error in window xp .
Remove Error in Windows Xp.
Some time an error occurs while you are using  window XP. A little dialogue box appears asking if you want to send report to Microsoft for this accident or not and it also hang ur pc ? Mostly when we press the button “Don’t send” The software we are using, turns off and we do not get any chance to save our working data. You can solve this problem simply and after this process you will not see this error box again.to bypass this error folloe these instruction

Right click on “My computer” and then click on “Properties”
There appear “system properties”
On system properties dialogue box then click on “advance tab”
Then Click on the error reporting button.
Click on “Disable error reporting”
It’s better for you to Place checkmark on “But notify me when critical errors occurs”
Now click Ok.

Now       Enjoy!!!!!!!!!!!!!!!
Full Version

How to Boost and Increase Your Internet Speed


There are many ways to increase internet speed .HERe I am going to tell you simple trick. In this trick  ,increase your Internet speed is using 100% bandwidth. by default Windows holds 20% of your bandwidth for system requirement including Windows update. Now if you can get that 20% of bandwidth it will surely boost your Internet speed.

Follow these step to speed up your Internet connection.

·         Press Windows Key (Start key) + R
·         command prompt window will appear on your screen
·         Now enter “ gpedit.msc”
·         When you enter above statement you’ll see Group Policy Windows
·         Then Double Click on Computer Configuration
·         Then  Double Click on Administrative Template
·         Then  Double Click on Network
·         Then Double Click on QoS Packet Scheduler
·         Then Double Click on limit reservable Bandwidth
·         Then Now click on Enabled and below type 0 (Zero)
·         Then Click OK to save the settings

·         Now youhave done and enjoy =d
Full Version

MicroSD Card Recovery Pro 01:18 software


Some people ask me that how to recover delete data from portable devices so now I am going to tell you about this
People who are  using portable devices frequently wish to store their data in ways that's portable.. one  of these portable devices are  memory sources is really a micro SD card, which is one of the smallest flash memory cards available in  the market. But if you get lost data or delete it accidentally  form a Micro SD card, the first thought came to your mind must be just throwing it away. You should know, now, it can  be recovered by a easy way .
About Micro SD Card Recovery Pro:
Micro SD Card Recovery Pro is file data recovery software designed to recover lost files including video, documents, pictures, audios, and videos from memory cards, CD-ROM's, and lost pictures from digital camera memory. Micro SD photo Recovery Pro is identified is excellent recovery software, so it will still work even if your file has been severely damaged or formatted. For more safety, using Micro SD Card Recovery Pro is safe and risk-free. Micro SD Card Recovery Pro performs read- only operations on your memory card. It doesn't move, delete, or modify the data on the card to avoid causing further damage or overwriting the source.

 

How to restore Micro SD card?

STEP 1 Download the software setup
STEP 2 extract it using winrar
STEP 3 Now you install that file and copy registration code
STEP 4 when your installation complete it ask you for registration code
STEP 5 now paste your code and enjoy fully registered software
STEP 6 Connect your card to your PC. Run the Micro SD Card Recovery Pro software. Click Start Scan, specify the drive letter, and file type and destination location. Then click Next]to start the scan.
STEP 7 When the scan is finished, select the files you want and click Recover button to restore the files.


Full Version

How To Hide File Behind Image

How To Hide  File Behind Image
IN this post I am going to tell you how to hide important file without any software.There are some important  files or document you want to hidefrom others on your computer. To do that you might be creating folder inside folder to hide such files but in today tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a filebehind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.

How To Hide File Behind Image ?


In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.
Video Tutorial On Basic Terminal Commands
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
cd desktop
hide files behind images

5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 Copy /b imagename.jpg + filenaIN this post I am going to tell you how to hide important file without any software.There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in today tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.

How To Hide File Behind Image ?


In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.
Video Tutorial On Basic Terminal Commands
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
Cd desktop
hide files behind images

5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 Copy /b imagename.jpg + filename.rar finalimage.jpg
hide files behind images
Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
Replace file-name with name of your file you want to hide. It must be in .rar format.
Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.


    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.me.rar finalimage.jpg
hide files behind images
Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
Replace filename with name of your file you want to hide. It must be in .rar format.
Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.


    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.

    3. Extract the file and done.
Full Version

How We Save Our Pc From Hackers

How We Save Our Pc From Hackers
P0st By Asad Ullah

Internet ki dunya main hacking aur virus phelana bohat aam hogya hai


agar aap yeh mehsos karain k aap ka internet slow chalnay lag gya hai

aur aap ka pc b bohat memory ly raha hai to aap ko yeh sochna chahyeh hai 

k koi aap ko infect to nai kr chuka

Aaj main aap ko aik aisa tutorial ya trick keh lain btata hun

Jis sy aap asaani sy yeh maloom kar sktay hain k aap k pc k sath aur kon kon connect hai

jab b koi aap ko hack karay ga to woh tab he aap ki info ly sakay ga jab aap internet sy connect hongay

yeh aik bohat he aasan tarika hai jo k yun keh lain k basic hai is main koi 

rocket science nai chahyeh yeh dekhnay main k kahein aap ka pc hack to nai.

Note: Yeh tutorial aap k virus ko detect nai karay ga blkay hacker ko detect karay ga.

sab sy pehly aap start task manager phr processes main jaen

wahan dekhain k kon si exe file hai jo zyada memory lay rai hai?



aur phr uski description dekhain aya woh mozila, chrome ya antivirus to nai

ab aap yeh dekhain k koi aap k computer sy connect to nai

networking maps k lye bohat programms hain market main jaisay wireshark wgaira magar

yahan aap aik simple command sy dekhain 

windows-->cmd--> yahan type karain netstat

phr woh aap ko kuch aisi window dy ga jis main aap k connection details hongi
Code:
Active Connections
  Proto  Local Address          Foreign Address        State
  TCP    192.168.0.103:139      192.168.0.101:60172    ESTABLISHED
ab aap dekhain k yahan kahein aisa foriegn address to nai jo aap k process main ho he nai

ab aap type krain netstat -ano

Yeh aap ko kuch yun result dy ga



aik aisa foreign ip 77.234.42.51.80 and pid (processid) 1396 jo meray sy connect hai mjhy is ka maloom nai k yeh hai kon

chalain check krtay hain 

dobara task manager kholain

upper properties window-->click view--> click on pid

ab aap dekhain k yeh 1396 kis ki process id hai

ab jab hum ny dekha to yeh avast ka process hai so it means sab thek hai



magar aap hacker to laat maar kr wahan sy nikal sktay hain agar koi unknown connection dekhain to 

usay task manager main ja kar right click--> end process kar dain.

yeh aik asaan aur simple tarika tha apnay pc ko hackers sy bchanay k lye 

advance tarikay aainda post krunga.


Note:Yeh tutorial aik aam computer user jo networking nai janta us ko dekhtay huy bnaya hai
is saray process ko check karnay k lye behter hai k aap apnay saray kaam bnd kr k check krain to zyada acha hai kam network chalaingay aur aap thek sy detect karlaingy.

NET surfinG


** NET surfing By Asad Ullah*********

Name:  m1.jpg
Views: 1377
Size:  110.0 KB

Name:  m2.jpg
Views: 1377
Size:  112.2 KB

Name:  m3.jpg
Views: 1368
Size:  104.2 KB

Name:  m4.jpg
Views: 1402
Size:  72.4 KB

Unix, Linux, and variants

Quick links

Unix ABCs

Unix, which is not an acronym, was developed by some of the members of the Multics team at the bell labs starting in the late 1960's by many of the same people who helped create the C programming language. The Unix today, however, is not just the work of a couple of programmers. Other organizations, institutes, and other individuals contributed significant additions to the system we now know today.
  • See our Unix definition for additional related information.

Linux ABCs

Developed by Linus Torvalds and further elaborated by a number of developers throughout the world, Linux (lee'nuhks/ or /li'nuks/,_not_/li:'nuhks) is a freely available multitasking and multiuser operating system. From the outset, Linux was placed under General Public License (GPL). The system can be distributed, used, and expanded free of charge. In this way, developers have access to all the source codes, thus being able to integrate new functions or to find and eliminate programming bugs quickly. Thereby drivers for new adapters (SCSI controller, graphics cards, etc.) can be integrated very rapidly.
  • See our Linux definition for related information and variant information.

MS-DOS vs. Linux and Unix

If you can navigate a computer using MS-DOS or the Windows command line, you should be able to quickly pick up on the navigation of Linux and Unix. In the below chart is a listing of common MS-DOS commands with their Linux and Unix counterpart.
MS-DOSLinux and Unix
attribchmod
backuptar
dirls
clsclear
copycp
delrm
deltreerm -R
rmdir
editvi
pico
formatfdformat, mount, and umount
move and renamemv
Typeless <file>
cdcd
chdir
more < filemore file
mdmkdir
winstartx

Linux and Unix Commands

  * See the Linux and Unix overview page for a brief description on all commands on one page.
Aa2p | ac | access | alias | agrep | apropos | apt-cache | apt-get | aptitude | ar | arch | arp | asaspell | at | awk
Bbasename | bash | bc | bdiff | bfs | bg | biff | break | bs | bye
Ccal | calendar | cancel | cat | cc | cd | chdir | checkeq | checknr | chfn | chgrp | chkey |chmod | chown | chroot | chsh | cksum | clear | cls | cmp | col | comm | compress | continuecopy | cp | cpio | crontab | crypt | csh | csplit | ctags | cu | curl | cut
Ddate | dc | dd | df | depmod | deroff | dhclient | diff | dig | dircmp | dirname | dmesg |dos2unix | dpkg | dpost | du
Eecho | ed | edit | egrep | eject | elm | emacs | enable | env | eqn | ex | exit | expand | expr
Ffc | fdisk | fg | fgrep | file | find | findsmb | finger | fmt | fold | for | foreach | fromdos | fsck |ftp | fuser
Ggawk | getfacl | gethostname | gpasswd | gprof | grep | groupadd | groupdel | groupmod |gunzip | gview | gvim | gzip
Hhalt | hash | hashstat | head | help | history | host | hostid | hostname
Iid | ifconfig | ifdown | ifup | ip | init | info | iostat | isalist | iwconfig
Jjobs | join
Kkeylogin | kill | killall | ksh
Llast | ld | ldd | less | lex | link | ln | lo | locate | login | logname | logout | losetup | lp |lpadmin | lpc | lpq | lpr | lprm | lpstat | ls | lsof | lzcat | lzma
Mmach | mail | mailcompat | mailx | make | man | merge | mesg | mii-tool | mkdir | mkfs |modprobe | more | mount | mt | mv | myisamchk | mysql
Nnc | neqn | netstat | newalias | newform | newgrp | nice | niscat | nischmod | nischown |nischttl | nisdefaults | nisgrep | nismatch | nispasswd | nistbladm | nl | nmap | nohup | nroff |nslookup
Ood | on | onintr | optisa
Ppack | pagesize | passwd | paste | pax | pcat | perl | pg | pgrep | pico | pine | ping | pkill |poweroff | pr | printenv | priocntl | printf | ps | pstree | pvs | pwd
Qquit
Rrcp | readlink | reboot | red | rehash | remsh | renice | repeat | replace | rgview | rgvim |rlogin | rm | rmail | rmdir | rn | route | rpcinfo | rsh | rsync | rview | rvim
Ss2p | sag | sar | scp | screen | script | sdiff | sed | sendmail | service | set | setenv | setfacl |sethostname | settime | sftp | sh | shred | shutdown | signals | sleep | slogin | smbclient |sort | spell | split | stat | stop | strftime | strip | stty | su | sudo | swapoff | swapon | sysinfo |sysklogd
Ttabs | tac | tail | talk | tar | tbl | tcopy | tcpdump | tee | telinit | telnet | test | time | timex |todos | top | touch | tput | tr | traceroute | tree | troff | tty
Uul |  umask | unalias | uname | uncompress | unhash | uniq | unlzma | unmount | unpack |untar | until | unxz | unzip | uptime | useradd | userdel | usermod
Vvacation | vedit |  vgrind | vi | view | vim | vipw | vmstat
Ww | wait | wall | wc | wget | whereis | whatis | which  | whilewho | whoami | whois | write
XX | xargs | xfd | xhost | xlsfonts | xorg | xset | xterm | xrdb | xz | xzcat
Yyacc | yes | yppasswd | yum
Zzcat | zip | zipcloak | zipinfo | zipnote | zipsplit
* In addition to each of the above explanations, additional information about a specified command for your Unix or Linux variant can be found by using the Mancommand.
 
Designed by