Wednesday, 11 September 2013

How to make sure that links you open are not harmful, contain virus and malware ?


This is an obvious question, while surfing Internet, daily we come to links which point to a website which we never visited earlier. Though we can prevent us clicking on the new ‘suspicious’ link, but what if my friend had sent me and it’s urgent to access it, in this case how you would make sure your computer will stay safe ?

In this article we will learn how we can find whether the link contains virus, malware or trojan and is harmful or not.The best way to find whether the URL which you want to access is harmful or not is to scan it and check whether it contains malware, virus, trojan, keylogger or any such harmful program which may get installed in your computer automatically and harm your PC and steal your data.

Don’t worry, it’s not so difficult to scan a URL for malware, there are many of the online service which provide user option to scan any suspicious website and that too for Free. Suppose someone gave you any suspicious link such as www.example.com/abc/phis/hck.php then how would you find it’s safe or not ? You can make sure that URL is not harmful by first using free Comodo Web Inspector, visit siteinspector.comodo.com, enter the suspicious URL and click on START THE SCAN button, wait for few seconds for scan to complete and results will be in front of you, it will let you know whether it found any malware on site or not, if it says the link is harmful, don’t open the link, but if it says it’s safe then you can open the link.

Second free service to scan suspicious URL is Zulu URL Risk Analyzer, visit zulu.zscaler.com, enter the suspicious URL, click on Submit URL button, wait for some time, it will scan the website and give it a score from 0 to 100, where 0 means completely safe and 100 means completely harmful. This website scans all the elements and tells whether they are Belign, Suspicious or Malicious. Though this service is helpful in advance thorough scanning, it has also reported false positive on safe site.

Third free service which will help you to find whether URL is safe or not is VirusTotal, visit www.virustotal.com/en/#url and enter your URL and click on Scan it! button. Wait for few seconds and it will check the reputation of website from various directories and will check whether it was ever marked as suspicious or malicious or not. It will give you test results, and if you find that it’s not malicious then you can access the URL.

Interesting Facts About Windows from the History !!!



More than 70.39% of Internet users are currently running Windows, and there are 1,693,244,385 users. (As per 2012)

Bill Gates started Microsoft with Paul Allen in Gates’ 500-square-foot garage in 1975 with a huge vision—a computer on every desktop and in every home.

Microsoft currently employs 88,180 people who work across 32,404,796 square feet of Microsoft’s premises.

Microsoft shipped out the first copy of Windows 1.0 on November 20, 1985. Its TV commercial featured current CEO Steve Ballmer as an enthusiastic salesman.

Windows 1.0 only required a minimum of 256 kilobytes (KB), two double-sided floppy disk drives, and a graphics adapter card.

Control Panel made its first appearance in Windows 2.0.

Windows XP was compiled from 45 million lines of code.

****Why is the 250GB hard disk have less than 233 GB?



All Hard Disk manufacturer way of counting space is different from the way a software count a space.

This means to a Hard Disk Manufacturer, 1GB is 1000 MB, 1 MB is 1000 KB and so on.

Software or computer language recognize a space in terms of power of 2 say 21, 22,23 etc. hence a KB is 210 Bytes which is 1024 Bytes.

Lets do a little math:From a Manufacturer a 250 GB harddisk is 250 x 1000 x 1000 x 1000 =250000000000 Bytes From the Computer Language point of view a 250000000000 Bytes is:250000000000/(1024*1024*1024)=232.83 GB

Now you’ll see why your 250GB harddisk has only less than 232.83 GBspace in total. Well if you go with higher space like 500 GB and so on the space missing is increasing....

How To Use ProRAT?


ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).

Step 1: Download free software called PRO RAT.
Launch pro rat. Pro rat has a lot options as keylogger, screen shot, file manager, pc shutdown.

Step 2: You should create ProRat Server and send it to the target pc. To create server click on the bottom Create.

Step 3: Enter your IP address, if you don't know your IP address click on red arrow. Also add your email address that will be used to send email notification.

Step 4: Next go to general settings, 5110 is the port that you will connect to the target PC, you can change server password. You can give a fake error message, when the target launches your remote file, error message will be shown. You can type the error message whatever you want. You can use the option to bind with the file. You can bind server with any file. Under server extension I recommend to use EXE (has icon support ) or SCR (has icon support). Under server icon select any icon that you want that your server look out.

Step 5: Click on Create Server. Now you need to send server file to the target pc. There are many ways how you can do it. You can create server file that looks as image and email it to your friends . The most effective way by my opinion is to bind server file to the movie file and upload it to the torrent or rapidshare.

Step 6: After the target clicks on your server file, you'll be able to connect to the target PC. In main window of pro rat you'll see IP field. Type target PC IP Address. In the port field type 5110 and click Connect.

You’ll see the File Manager of hacked pc. You can download any file from the hacked PC

Thursday, 16 May 2013

RUN Commands !



1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting­ Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver
116. Wordpad - write

What is a Computer Virus ?



A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :-Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :-A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :-These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :-Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.
Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.
This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that you will be reading about.
Backdoor- A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.
Hijackers- A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
Spyware- A program that monitors your activity or information on your computer and sends that information to a remote computer without your Knowledge.
Adware- A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware.
There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.
Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.
Trojan- A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
Worm- A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.

HOW TO MAKE SYMBOLS WITH KEYBOARD


Alt + 0153... ™... trademark symbol
Alt + 0169... ©... copyright symbol
Alt + 0174... ®... registered trademark symbol
Alt + 0176...°..... degree symbol
Alt + 0177...±.... plus or minus sign

How to make smiley faces
Alt + 2 .....☻.....black smiley face
Alt + 15.....☼.....sun
Alt + 12......♀.....female sign
Alt + 11.....♂......male sign
Alt + 6.......♠.....spade
Alt + 5.......♣...... Club
Alt + 3............... Heart
Alt + 4.......♦...... Diamond
Alt + 13......♪.....eighth note
Alt + 14......♫...... beamed

Eighth note
Alt + 8721.... ∑.... N-ary summation(auto sum)
Alt + 251.....√.....square root check mark
Alt + 8236.....∞..... infinity
Alt + 24.......↑..... up arrow
Alt + 25......↓...... down arrow
Alt + 26.....→.....right arrow
Alt + 27......←.....left arrow
Alt + 18.....↕......up/down arrow
Alt + 29.....↔...left right arrow

Did U Know? Facts about computers and IT Field.

Did U Know?
Facts about computers and IT Field.

1.A byte means 8 bits and a nibblemeans 4 bits.
2.First harddisk available was of 5MB
3.Ethernet is the registered trademark 0f Xerox.
4.google uses over 10000 network computers to crawl the web
5.Google can be queried in 26 languages
6.The floopy disk was patented byallen shugart in 1946.
7.More than 80% of web pages are in english.
8. 88% percent web pages have very low traffic rate.
9. An average american is dependent on 250 computers.
10.Internet is most fastest growing platform for advertisement.
11.About one third of CDs are pirated
12.About 76% softwares used in india are pirated.
13.Only 10% of the webpages areused by the search engines
14."I am feeling Lucky" This button is used by negligibal no of people on net.
15.Bill gates&Paul Allen started a company called Traf-O-Data to monitor traffic flow.
16.The four largest software makers in the world are:
(a) Microsoft
(b) Adobe
(c) Sap
(d) Computer Associates.
17.Top Ten Supercomputers of Today's Generation Arranged according to the speed:
1. Bluegene/ ­ ­ L DD2 Beta-system(IBM).
2. Columbia (NASA).
3. Earth Simulator (NEC).
4. MareNostrum(Bar ­ ­ celona Supercomputer Center).
5. Thunder (Lawrence Livermore National Laboratory).
6. ASCI Q(Los Alamos National Laboratory).
7. System X(Virgina Tech).
8. Blugene/L DD1 Prototype(IBM).
9. eServer pSeries 655 cluster(Naval Oceanographic Office).
10. Tungsten(Nation­al Center For Supercomputing Applications).

Use pendrive to increase RAM of your computer!


1.insert an empty pendrive.
2.goto properties.
3.click 'quick boost or ready boost'
set allocation value to maximum.
4.chose 'allocate this device'
5.hit ok.
That's it!! Now the pendrive acts as external RAM,thus making the pc to work faster.

Friday, 12 April 2013

ShortCuts

Ctrl + Escape or Win: Display start menu.
Shift + F10 or AppsKey: Display context menu.
Win + E: Open Windows Explorer.
Win + R: Open Run dialog.
Win + M: Minimize all windows.
Win + Shift + M: Undo minimize all windows.
Win + D: Toggle minimize all windows.
Win + B (XP only): Activate system tray. Arrow keys select, Enter double-clicks, and AppsKey or Shift + F10 right-clicks.
Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
Win + Control + F: Open Find dialog. (Computers)
Win + U: Open Utility Manager.
Win + F1: Open Windows help.
Win + Pause: Open System Properties dialog.
Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
Win + Shift + Tab: Cycle through taskbar buttons in reverse.
Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.
Alt + Shift + Tab: Display CoolSwitch; go in reverse.
Alt + Escape: Send active window to the bottom of the z-order.
Alt + Shift + Escape: Activate the window at the bottom of the z-order.
Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
Shift while a CD is loading: Bypass AutoPlay.
Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
Ctrl + Shift + Escape (XP Only): Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
Printscreen: Copy screenshot of current screen to clipboard.
Alt + Printscreen: Copy screenshot of current active window to clipboard.
Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.
Ctrl + Alt + Up Arrow: Undo inversion.

Generic

Ctrl + C or Ctrl + Insert: Copy.
Ctrl + X or Shift + Delete: Cut.
Ctrl + V or Shift + Insert: Paste/Move.
Ctrl + N: New... File, Tab, Entry, etc.
Ctrl + S: Save.
Ctrl + O: Open...
Ctrl + P: Print.
Ctrl + Z: Undo.
Ctrl + A: Select all.
Ctrl + F: Find...
Ctrl + F4: Close tab or child window.
F1: Open help.
F11: Toggle full screen mode.
Alt or F10: Activate menu bar.
Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
Escape: Remove focus from current control/menu, or close dialog box.

Generic Navigation

Tab: Forward one item.
Shift + Tab: Backward one item.
Ctrl + Tab: Cycle through tabs/child windows.
Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
Enter: If a button's selected, click it, otherwise, click default button.
Space: Toggle items such as radio buttons or checkboxes.
Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
Ctrl + Left: Move cursor to the beginning of previous word.
Ctrl + Right: Move cursor to the beginning of next word.
Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in RichEdit controls.
Ctrl + Down: Move cursor to beginning of next paragraph.
Shift + Left: Highlight one character to the left.
Shift + Right: Highlight one character to the right.
Shift + Up: Highlight from current cursor position, to one line up.
Shift + Down: Highlight from current cursor position, to one line down.
Ctrl + Shift + Left: Highlight to beginning of previous word.
Ctrl + Shift + Right: Highlight to beginning of next word.
Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
Ctrl + Shift + Down: Highlight to beginning of next paragraph.
Home: Move cursor to top of a scrollable control.
End: Move cursor to bottom of a scrollable control.

Generic File Browser

Arrow Keys: Navigate.
Shift + Arrow Keys: Select multiple items.
Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
(Letter): Select first found item that begins with (Letter).
BackSpace: Go up one level to the parent directory.
Alt + Left: Go back one folder.
Alt + Right: Go forward one folder.
Enter: Activate (Double-click) selected item(s).
Alt + Enter: View properties for selected item.
F2: Rename selected item(s).
F7: New folder.
Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
Delete: Delete selected item(s).
Shift + Delete: Delete selected item(s); bypass Recycle Bin.
Ctrl while dragging item(s): Copy.
Ctrl + Shift while dragging item(s): Create shortcut(s).

In tree pane, if any:
Left: Collapse the current selection if expanded, or select the parent folder.
Right: Expand the current selection if collapsed, or select the first subfolder.
NumpadAsterisk: Expand currently selected directory and all subdirectories. No undo.
NumpadPlus: Expand currently selected directory.
NumpadMinus: Collapse currently selected directory.

Accessibility

Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.

Microsoft Natural Keyboard with IntelliType Software Installed

Win + L: Log off Windows.
Win + P: Open Print Manager.
Win + C: Open control panel.
Win + V: Open clipboard.
Win + K: Open keyboard properties.
Win + I: Open mouse properties.
Win + A: Open Accessibility properties.
Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
Win + S: Toggle CapsLock on and off.

Remote Desktop Connection Navigation

Ctrl + Alt + End: Open the NT Security dialog.
Alt + PageUp: Switch between programs.
Alt + PageDown: Switch between programs in reverse.
Alt + Insert: Cycle through the programs in most recently used order.
Alt + Home: Display start menu.
Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
Alt + Delete: Display the Windows menu.
Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.

Mozilla Firefox 1.x

Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
Ctrl + (1-9): Switch to tab corresponding to number.
Ctrl + N: New window.
Ctrl + T: New tab.
Ctrl + L or Alt + D or F6: Switch focus to location bar.
Ctrl + Enter: Open location in new tab.
Shift + Enter: Open location in new window.
Ctrl + K or Ctrl + E: Switch focus to search bar.
Ctrl + O: Open a local file.
Ctrl + W: Close tab, or window if there's only one tab open.
Ctrl + Shift + W: Close window.
Ctrl + S: Save page as a local file.
Ctrl + P: Print page.
Ctrl + F or F3: Open find toolbar.
Ctrl + G or F3: Find next...
Ctrl + Shift + G or Shift + F3: Find previous...
Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
Ctrl + H: Open History sidebar.
Escape: Stop loading page.
Ctrl + R or F5: Reload current page.
Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
Ctrl + U: View page source.
Ctrl + D: Bookmark current page.
Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
Alt + Left or Backspace: Back.
Alt + Right or Shift + Backspace: Forward.
Alt + Home: Open home page.
Ctrl + M: Open new message in integrated mail client.
Ctrl + J: Open Downloads dialog.
F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
Shift + F6: Switch to previous frame.
Apostrophe ('): Find link as you type.
Slash (/): Find text as you type.

BBCode (This forum's posting)

While text is selected:
Alt + B: Format text in bold.
Alt + I: Format text in italics.
Alt + U: Format text as underlined.
Alt + Q: Format text as a quote.
Alt + C: Format text as code.
Alt + L: Format text as a list.
Alt + O: Format text as an ordered list.
Alt + P: Format url as a hotlinked image.
Alt + W: Format url as a hyperlink.

GMail

Must have "keyboard shortcuts" on in settings.
C: Compose new message.
Shift + C: Open new window to compose new message.
Slash (/): Switch focus to search box.
K: Switch focus to the next most recent email. Enter or "O" opens focused email.
J: Switch focus to the next oldest email.
N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
P: Switch focus to the previous message.
U: Takes you back to the inbox and checks for new mail.
Y: Various actions depending on current view:
Has no effect in "Sent" and "All Mail" views.

* Inbox: Archive email or message.
* Starred: Unstar email or message.
* Spam: Unmark as spam and move back to "Inbox."
* Trash: Move back to "Inbox."
* Any label: Remove the label.

X: "Check" an email. Various actions can be performed against all checked emails.
S: "Star" an email. Identical to the more familiar term, "flagging."
R: Reply to the email.
A: Reply to all recipients of the email.
F: Forward an email.
Shift + R: Reply to the email in a new window.
Shift + A: Reply to all recipients of the email in a new window.
Shift + F: Forward an email in a new window.
Shift + 1 (!): Mark an email as spam and remove it from the inbox.
G then I: Switch to "Inbox" view.
G then S: Switch to "Starred" view.
G then A: Switch to "All Mail" view.
G then C: Switch to "Contacts" view.
G then S: Switch to "Drafts" view.

Windows 8 keyboard shortcuts



Knowing at least some of the Windows 8 keyboard shortcuts will make your Windows 8 experience much more enjoyable. Try to memorize these top Windows 8 shortcut keys.

- Press the Windows key to open the Start screen or switch to the Desktop (if open).
- Press the Windows key + D will open the Windows Desktop.
- Press the Windows key + . to pin and unpin Windows apps on the side of the screen.
- Press the Windows key + X to open the power user menu, which gives you access to many of the features most power users would want (e.g. Device Manager and Command Prompt).
- Press the Windows key + C to open the Charms.
- Press the Windows key + I to open the Settings, which is the same Settings found in Charms.
- Press and hold the Windows key + Tab to show open apps.
- Press the Windows key + Print screen to create a screen shot, which is automatically saved into your My Pictures folder.

See our Windows shortcuts page for a full listing of all Windows shortcuts.

Differences between FAT and NTFS


Should I format my device in FAT or NTFS?
FAT
File Allocation Table is a primary computer file system for various operating systems, mostly DOS, including DR-DOS, OpenDOS, freeDOS, MS-DOS, Microsoft Windows (up to and including Windows Me). FAT is also used for removable flash drives and memory cards.

File system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. The chart below shows in what FAT system a flash drive or memory card should be formatted.

FAT16 FAT32 exFAT
Default format for memory cards and flash drives up to 2GB 4GB-32GB 64GB and above

NTFS
NTFS is the standard file system of Windows NT, including its later versions Windows 2000, Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008. NTFS is intended for use in Windows system drives (Hard Disk Drives and Solid State Drives).

NTFS has several improvements over FAT such as improved support for metadata and the use of advanced data structures for reliability, and disk space utilization, plus additional extensions such as security access control lists and file system journaling.

Notes for Flash Drives:
- Formatting the flash drive as NTFS will make it unwriteable on a Mac computer. Most Mac computers can read NTFS, but not write.
- NTFS is a journaled file system, this creates more read/write activities. Therefore, it MAY decrease life expectancy of your flash drive.
- Once the device is formatted as NTFS, you MUST use "Safely Remove Hardware" to remove your device.

Monday, 4 March 2013

What do "Cc:" and "Bcc:" mean?

Cc: stands for "carbon copy." Anyone listed in the Cc: field of a message receives a copy of that message when you send it. All other recipients of that message can see that the person you designated as a Cc: recipient received a copy of the message.

Bcc: stands for "blind carbon copy." This is similar to the Cc: feature, except that Bcc: recipients are invisible to all the other recipients of the message (including other Bcc: recipients). For example, if you send a message To: johndoe@yahoo.com and Bcc: janedoe@yahoo.com, then johndoe sees himself as the message's only recipient. Janedoe, on the other hand, is "in the know"—she can see that you sent the message To: johndoe, and that you blind-copied her. To add an entry in the Bcc: field, click the "Show BCC" link to the right of the "To:" field.

What are seeds and leechers (peers) in torrents?

Number of seeds and leechers (peers) play an important role in determining the download speed of torrent file. So what exactly is meaning of torrents (bittorrent, utorrent) seeds and leechers?

What are seeds?

A seed is a client that has a complete copy of the data of a certain torrent. Once your BitTorrent client finishes downloading, it will remain open until you click the Finish button (or otherwise close it). This is known as being a seed or seeding.

What are leechers?

A leecher is a client that is currently downloading the data of a torrent. A leecher does not have the complete file, otherwise it would be called a seed.

Conclusion:
Seeds have the complete file and are actively sharing ... peers are downloading the file and have part of it and usually are sharing pieces also ... high numbers of each are best for speed ... low numbers of seeds and high peers will make it slow .. low numbers on each will make it slow ......