Monday, June 22, 2009

Google Docs for Computer Beginners


Sunday, June 21, 2009

Hiding Files and Folders in Windows Super Hide and Unsearchable Technique

With the normal hiding files and folders feature, we can’t expect good protection for files and folder as there in-built feature for searching hidden files and folders in windows.Super Hide files folders in Windows

With Super Hiding and Unsearchable feature it’s impossible to reveal any hidden file or folder in normal way. Files and folders will completely hide.

1. First open the Windows command prompt.
For that Go to START -> RUN and type CMD

2. In DOS prompt go to the location where the file or folder exist you need to hide.

  • Hiding Folders:
For a hide folder, you just need to type its name with the command given below. Replace the Folder name with the actual name of the folder you’re going to hide.
Now type
attrib +h +s FolderName
and press enter.

  • Hiding Files:
For files, you have to type the extension with the file name and hit the Enter.
Now type
attrib +h +s ‘FileName.Extension
and press enter.

3. To bring it those hidden files to normal state, type
attrib -s -h FileName
NOTE: Please make sure your file or folder name which you're going to hide doesn’t contain any space.

Tuesday, June 9, 2009

Different Between Virus, Worm and Trojan Horse

What is a computer Virus?

A computer virus is just a computer program. But the behavior and purpose of making this type of programs is quite different for a normal program.Virus worm trojan

The word “Virus” has become a common term a lot of people use to refer to worms and Trojans too, which is not exactly correct.

  • Virus -
A computer program that is capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission.

Some viruses attach to files so when the infected file executes, the virus also executes. Other viruses sit in a computer's memory and infect files as the computer opens, modifies or creates the files.

Some viruses display symptoms, and some viruses, damage files and computer systems, but neither symptoms nor damage are essential in the definition of a virus; a non-damaging virus is still a virus.

Virus is designed to spread from file to file on a single pc, it does not intentionally try to move to another pc, and it must replicate, and execute itself.

  • Worm –
Unlike viruses worms are do not infect other computer program files. These are parasitic computer programs and replicate by creating copies on the same computer, or can send the copies to other computers via a network. Often spread via IRC (Internet Relay Chat)

A worm doesn’t need a host file to move from system to system, whereas a virus does. These are copy itself (intentionally move) from pc to pc, via networks, internet etc.
Worms spread more rapidly than viruses.

  • Trojan Horse -
Trojan horse is a malicious program that pretends to be a benign application a Trojan horse program purposefully does something the user does not expect.

Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.

Sunday, June 7, 2009

Application Server and Internet Information Server

  • An application server:
This is a server program in a computer in a distributed network that provides the business logic for an application program.
Application and ISS server
The application server is frequently viewed as part of a three-tier application, consisting of a graphical user interface (GUI) server, an application (business logic) server, and a database and transaction server.


More descriptively it can be viewed as dividing an application into:

1. A first-tier, front-end, Web browser-based graphical user interface, usually at a personal computer or workstation

2. A middle-tier business logic application or set of applications, possibly on a local area network or intranet server

3. A third-tier, back-end, database and transaction server, sometimes on a mainframe or large server

As Internet Information Server is a group of Internet servers (including a Web or Hypertext Transfer Protocol server and a File Transfer Protocol server) with additional capabilities for Microsoft's Windows NT and Windows 2000 Server operating systems.

  • Internet information server:
IIS is Microsoft's entry to compete in the Internet server market that is also addressed by Apache, Sun Microsystems, O'Reilly, and others.

With IIS, Microsoft includes a set of programs for building and administering Web sites, a search engine, and support for writing Web-based applications that access databases.

Microsoft points out that IIS is tightly integrated with the Windows NT and 2000 Servers in a number of ways, resulting in faster Web page serving.

Thursday, June 4, 2009

Reasons to a Computer Restart itself Automatically

Might you your computer have facing this and the sound is annoyed. If the computer restart itself as a habit randomly or a in a time cycle then that could be done by malicious virus inside your system.Computer Restart Problem

  • A virus:
You need to make your computer virus guard up to date and make sure the virus program working properly. Also you need to be assuring that the antivirus program hefty enough for beating at least 99% viruses.

Here I’m trying to consolidate several reasons for a computer restart itself without knowing the user.

  • Downloaded updates need to install
A computer can be restart because automatically downloaded an update package needs install its updates and work out this by itself restarting the computer. Probably these could be malicious programs.

  • Overheating:
Overheating of the parts also cause for this kind of matter. In fact the proper response of a computer to overheating is the power off. Nothing is gained by restarting. However overheating could cause the BIOS or power supply to malfunction causing it to restart.

You can improve the airflow through the machine or invest in a water-cooling system. These are favored by gamers, who put a lot of stress on machines heating them up.

  • Microsoft Auto Update:
Microsoft Auto Update can force a reboot to the after countdown (Many pc's are set to do this at 3am by default) if the update requires a dll reload/change.

  • Remotely Shutdown:
Also someone can use shutdown -i which is a command to remotely shutdown a computer all they would need is an IP address (Internet protocol Address).

Wednesday, June 3, 2009

Dynamic IP Address vs Static IP Address

Computers use IP addresses to locate and talk to each other on the Internet. It is the unique identifier of a computer on the net.

A dynamic IP is an address that is assigned your computer temporarily by ISP when you connect to the internet.Static Dynamic IP Address

For the duration of you connected it will remain the same IP address but when you disconnect and reconnect you will probably be given a new (different) IP address. The IP address you had before will be given to someone else.


A static IP address is an IP address that is assigned to you computer by an Internet service provider (ISP) to be its permanent address on the Internet. Every time you’re connected the same IP address will be assigned.

If you need to make your dynamic IP address into static IP probably you have to contact your ISP (Internet service provider) and ask them for assign you a static IP. So you can have an IP address permanently assigned to you which you can use every time you are connected.

Making your IP address static cannot done yourself because an IP address needs to be globally unique, you can't just pick one for yourself as you desire. It needs to be assigned to you by your ISP.

  • Advantages of having Dynamic IP:
1. If you have a hole in your firewall and a dynamic IP, then every time you disconnect and reconnect any hacker who found you by your IP address on the first visit, will much more difficult to find you again because your address will be different.

2. Fixing IP bans from Forums, chartrooms and etc.

3. Override Time limitations which are depend on the IP address (I.e. Rapidshare).

  • Advantages of having Static IP:
The only reason I know why you would need a static IP is if you want other users to be able to connect to your computer through internet. (I.e: Web server)

What is the Meaning of Word Bandwidth?

The word Bandwidth has several related meanings, here is the list of means of Bandwidth in several phases.Bandwidth

  • Bandwidth (Computing) or digital bandwidth
A rate of data transfer, throughput or bit rate, measured in bits per second

  • Bandwidth (signal processing) or analog bandwidth, frequency bandwidth or radio bandwidth:
A measure of the width of a range of frequencies, measured in hertz

  • Spectral line bandwidth:
The width of an atomic or molecular spectral line, measured in hertz

Bandwidth can also refer to some other specific areas too:

  • Bandwidth (linear algebra)
The width of the band of nonzero terms around the diagonal of a matrix

  • In kernel density estimation
Bandwidth describes the width of the convolution kernel used

  • In business jargon
The resources needed to complete a task or project

  • Bandwidth (radio program)
A Canadian radio program

Tuesday, June 2, 2009

What does the HTTP Stand For?

HTTP stands for Hypertext transfer protocol (a communications protocol). A protocol use to transfer hypertext requests and information, between servers and browsers.

Hypertext Transfer Protocol is the method used to transfer information on the World Wide Web (WWW). HTTP is a request/response protocol between clients and servers.HTTP HTTP/1.1 is the version of HTTP in common use today.

Client :
Such as a web browser, spider, or other end-user tool, is referred to as the user agent.

Server :
Server is which stores or creates resources such as HTML files and images, is called the origin server. In between the user agent and origin server may be several intermediaries, such as proxies, gateways, and tunnels.

An HTTP client initiates a request by establishing a Transmission Control Protocol (TCP) connection to a particular port on a remote host. An HTTP server listening on that port waits for the client to send a Request Message.

  • HTTP Request methods
HTTP defines eight methods indicating the desired action to be performed on the identified resource.

1. HEAD
this is useful for retrieving meta-information written in response headers, without having to transport the entire content.

1. GET
Requests a representation of the specified resource. By far the most common method used on the Web today.

2. POST
Submits data to be processed to the identified resource. The data is included in the body of the request. This may result in the creation of a new resource or the updates of existing resources or both.

3. PUT
Uploads a representation of the specified resource.

4. DELETE
deletes the specified resource.

5. TRACE
Echoes back the received request, client can see what intermediate servers are adding or changing in the request.

6. OPTIONS
Returns the HTTP methods that the server supports. This is used to check the functionality of a web server.

7. CONNECT
Converts the request connection to a transparent TCP/IP tunnel, usually to facilitate SSL-encrypted communication (HTTPS) through an unencrypted HTTP proxy.

HTTP servers are supposed to implement at least GET and HEAD methods and, whenever possible, also the OPTIONS method too.

Monday, June 1, 2009

13 things to Consider Before Choose an ISP

Choosing an ISP (Internet Service Provider) is not easy as there is huge competition amid ISPs. Mainly telephone and cable companies may provide this service and there are many other companies to choose from as well.ISP - Internet Service Provider

Some of these Internet service providers just provide the basics e-mail and access to the Internet and some other provides extra benefits, such as their own online shopping malls, chat rooms and etc.

Here are some criteria to consider when choosing an Internet Service Provider (ISP)

1. Will you usually access to the Internet only from one location or do you travel and need to work from different locations using a laptop computer? If you travel then you definitely want an ISP with either a nationwide access number or an ISP with many dial-up local access numbers.

2. If you travel be sure your ISP provides POP3, SMTP, and Webmail services. You need to be able to receive and send your e-mail using any e-mail reader (Eudora, Outlook Express & etc) and using a web-based interface, not just using the ISP's own interface.

3. Ask from your friends and relatives about the provider they’re using and if they're happy with that service.

4. Find out about the features different providers offer and decide which are most important to you.

5. A price is so important. Some providers charge flat monthly fees and some charge by the minute and others may give you a choice or combination of both. Consider a cheaper provider, but make sure they have the services you do need.

6. If you plan to connect through a phone line choose a service that has a local number to dial in. So you won't have to pay toll-charges while you're online.

7. Some ISP offer discounts if you sign up for a long-term contract and pay in advance. But reality is companies come and go. So find how those companies behave past, how much we can rely on them.

8. Do you want newsgroup access? Make sure your ISP provides that.

9. If you are planning to have your own website, be sure your ISP allows FTP access, so you can upload your pages, preferably using your choice of FTP software not just theirs.

10. Do you want to use the "home page" space provided by your ISP to host your business pages? If so find out will your ISP let you have your own domain name? How much extra will they charge for hosting your own domain name?

11. Find out the provider's privacy policy. What information is collected about you, how that information is used, and how you can control your personal information.

12. Pay attention to security. Know how your personal information is protected from inappropriate access by others outside and inside the company.

13. Look for companies you can reach both online and offline. If you need help and that have customer service 24 hours a day, seven days a week.

What is a POP Mail Account ?

POP account is an account from which we retrieve the mails from the mail server.POP Mail

POP stands for "Post Office Protocol". IMAP means “Internet Message Access Protocol”.

These are the standard interfaces between an e-mail client program and the mail server.

POP3 and IMAP4 are the two common access protocols used for Internet e-mail. POP3 is the version 3 of the POP protocol. It provides message storage that saves incoming e-mail until users log on and download it.

POP3 downloads the entire message with attachments when mail is checked.


IMAP4 can be configured to download only the headers, which display to/from addresses and subject. The user can then selectively download messages and attachments.

  • Details you need to Configure a POP Account
  1. The name of your ISP's mail server that holds your email. Typically it's something like "mail.example.com"
  2. The name of the account you were assigned by your ISP. This may or may not be your email name, or something like it, or something completely unrelated.
  3. Password to your account.
With the properly configured you are able to download the email that your mail server has been collecting on your behalf.

Note: All of this really applies only to email programs that you run on your computer, like Outlook, Eudora and etc.

Web-based email, such as Hotmail, Yahoo, AOL and etc, simply display the email directly from their servers in your web browser. No configuration needed, other than logging in to the account.