Friday, 15 November 2013
Wednesday, 13 November 2013
Win 8 Keyboard Shortcuts
Who R Using Win 8 ??
Some Keyboard Shortcuts 4 them...
Windows key – brings up the Metro start screen. You can start typing to search for an app, just like the Win7 start menu.
Win + D – brings up the old Windows desktop.
Win + C – brings up the Charms menu, where you can search, share, and change settings.
Win + I – opens the Settings panel, where you can change settings for the current app, change volume, wireless networks, shut down, or adjust the brightness.
Win + Z – opens the App Bar for the current Metro application.
Win + H – opens the Metro Share panel.
Win + Q – brings up the Metro App Search screen.
Win + W – brings up the Metro Settings search screen.
Win + F – brings up the Metro File search screen.
Win + K – opens the Devices panel (for connecting to a projector or some other device)
Win + , (comma) – Aero Peek at the desktop.
Win + . (period) – Snaps the current Metro application to one side of the screen. (Right side)
Win + Shift + . (period) – Snaps the current Metro application to the other side of the screen. (Left side)
Win + J – switches focus between snapped Metro applications.
Win + Page Up / Down – moves the current app to the other monitor.
Win + Tab – opens the Metro application switcher menu, switches between applications.
You might notice that we didn’t show screenshots of how all these shortcut keys work, and there’s a reason for that: you need to test them out for yourself to really learn how they work.
Win+X – lunch kind of start menu, very useful
Windows Key + Print Screen saves a screenshot into your Pictures folder. It’s quite handy.
Some Keyboard Shortcuts 4 them...
Windows key – brings up the Metro start screen. You can start typing to search for an app, just like the Win7 start menu.
Win + D – brings up the old Windows desktop.
Win + C – brings up the Charms menu, where you can search, share, and change settings.
Win + I – opens the Settings panel, where you can change settings for the current app, change volume, wireless networks, shut down, or adjust the brightness.
Win + Z – opens the App Bar for the current Metro application.
Win + H – opens the Metro Share panel.
Win + Q – brings up the Metro App Search screen.
Win + W – brings up the Metro Settings search screen.
Win + F – brings up the Metro File search screen.
Win + K – opens the Devices panel (for connecting to a projector or some other device)
Win + , (comma) – Aero Peek at the desktop.
Win + . (period) – Snaps the current Metro application to one side of the screen. (Right side)
Win + Shift + . (period) – Snaps the current Metro application to the other side of the screen. (Left side)
Win + J – switches focus between snapped Metro applications.
Win + Page Up / Down – moves the current app to the other monitor.
Win + Tab – opens the Metro application switcher menu, switches between applications.
You might notice that we didn’t show screenshots of how all these shortcut keys work, and there’s a reason for that: you need to test them out for yourself to really learn how they work.
Win+X – lunch kind of start menu, very useful
Windows Key + Print Screen saves a screenshot into your Pictures folder. It’s quite handy.
BEST WEBSITES FOR DRIVERS
HERE ARE BEST WEBSITES FOR DRIVERS.
1- www.driverzone. com
2- www.opendrivers .com
3- www.notebook-dr iver.com
4- www.notebookera .com
Note- First 2 websites are best for your laptop drivers
1- www.driverzone. com
2- www.opendrivers .com
3- www.notebook-dr iver.com
4- www.notebookera .com
Note- First 2 websites are best for your laptop drivers
Tracing facebook user
Someone
has made your fake account….Don’t Worry…..Tracingfacebook user..
First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).
note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
When command prompt opens Type the following command and hit Enter.
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s.
The Next Step is to Trace that user using his IP address.
To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
http:// www.ip-adress.com/ip_tracer/
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.
Other netstat commands:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p option may be used to specify a subset of the default.
First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).
note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
When command prompt opens Type the following command and hit Enter.
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s.
The Next Step is to Trace that user using his IP address.
To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
http:// www.ip-adress.com/ip_tracer/
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.
Other netstat commands:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p option may be used to specify a subset of the default.
Saturday, 27 July 2013
Cybersecurity: US needs to build partnership with India
Times of India
The US needs to build up partnership with India
on cybersecurity issues, eminent American experts have said, noting
that New Delhi faces threat in the cybersphere from Pakistan, China and
non-state actors.
"The Indians' primary concern in cybersecurity is with Pakistan and Pakistani non-state actors or state-sponsored actors launching some kind of attack against India. Their second concern is Chinese espionage," James Lewis, Director and Senior Fellow, Centre for Strategic International Studies' Technology and Public Policy Programme, told lawmakers during a Congressional hearing.
"One of the things that works in our favour is they aren't particularly friends with the Chinese all the time, and they worry a lot about it. So we have an opportunity to work with India. The thing we have to avoid in doing that is giving the impression that we're trying to contain China," he said.
"The Chinese worry about this a lot. We do need to build up partnership with India, but we have to do it in a way that doesn't appear to be deliberately trying to contain China," Lewis said in response to a question during a hearing of the Asia and the Pacific Subcommittee of the House Foreign Affairs Committee on 'Asia: The Cyber Security Battleground'.
Karl Rauscher, Chief Technology Officer and Distinguished Fellow, at the East West Institute, said New Delhi's decision to create this National Cyber Coordination Centre is in the right direction.
Noting that India is recognised as the leading producer of international spam, he said: "Their co-ordination with external experts to root out these botnets and sources of spam is really critical not only for India but for the rest of the world, particularly English-speaking countries."
Congressman Steve Chabot said, "Cooperation with India is an important aspect of US efforts to rebound towards Asia, especially in regards to trade and military cooperation."
"The Indians' primary concern in cybersecurity is with Pakistan and Pakistani non-state actors or state-sponsored actors launching some kind of attack against India. Their second concern is Chinese espionage," James Lewis, Director and Senior Fellow, Centre for Strategic International Studies' Technology and Public Policy Programme, told lawmakers during a Congressional hearing.
"One of the things that works in our favour is they aren't particularly friends with the Chinese all the time, and they worry a lot about it. So we have an opportunity to work with India. The thing we have to avoid in doing that is giving the impression that we're trying to contain China," he said.
"The Chinese worry about this a lot. We do need to build up partnership with India, but we have to do it in a way that doesn't appear to be deliberately trying to contain China," Lewis said in response to a question during a hearing of the Asia and the Pacific Subcommittee of the House Foreign Affairs Committee on 'Asia: The Cyber Security Battleground'.
Karl Rauscher, Chief Technology Officer and Distinguished Fellow, at the East West Institute, said New Delhi's decision to create this National Cyber Coordination Centre is in the right direction.
Noting that India is recognised as the leading producer of international spam, he said: "Their co-ordination with external experts to root out these botnets and sources of spam is really critical not only for India but for the rest of the world, particularly English-speaking countries."
Congressman Steve Chabot said, "Cooperation with India is an important aspect of US efforts to rebound towards Asia, especially in regards to trade and military cooperation."
How to stop receiving ads on Gmail

According to the Huffington Post, Google has recently included the feature of sorting emails as per their content in Primary, Social, Promotions and other categories and puts all the ad mails into its designated place.
However for those who want to get rid of ad emails from their inbox, they can simply click the 'X' on each ad to remove it and Google , as it records the ad response behaviour, will soon realize the kind of ads a user does not want.
Additionally, one can also click on the gear in the top-right on the main Gmail page and under the menu, click on 'Configure inbox' and just uncheck the box next to 'Promotions' and if wants to get rid of Gmail's new tabs altogether one can uncheck all of the boxes except 'Primary'.
The report added that when the Promotions tab is disabled, the ads would still show up in the inbox and Google will show the ad one way or another.
Your face is the new credit card :
No more swiping cards! A new technology that allows
customers to use their facial features instead of swiping a credit
card to purchase goods has been developed by a Finnish company.
The technology provided by Uniqul, works by recognizing the customer's face and then linking it to the individual's bank account . So instead of swiping a credit card to purchase goods, the customer gazes into a camera.
Uniqul claims its service is secured with military-grade algorithms , 'The Australian' reported . Uniqul's Ruslan Pisarenko said the technology — which is due to roll out next month — has the ability for transactions to be completed instantly and can even distinguish between identical twins, 'News Limited Network' reported. According to Pisarenko, "the face is a PIN and it's more like a complete way to identify a person.
But in some cases where the system is not 100% accurate, it will ask a person to input their PIN as security," he said. There is no payment card involved, nor is a mobile or wallet needed. Customers sign up to the technology by registering their identification and bank details. Once the items are scanned through the customers' details will flash up on a screen and they click "OK" to confirm the transaction.
The new tech is similar to facial recognition identification which is used by international travellers at airports in Australia. The company is getting ready for deployment of the system in Helsinki, news website goodnewsfinland.com reported.
The company said its patent pending technology allows to reduce time spent on transactions close to zero seconds.
The technology provided by Uniqul, works by recognizing the customer's face and then linking it to the individual's bank account . So instead of swiping a credit card to purchase goods, the customer gazes into a camera.
Uniqul claims its service is secured with military-grade algorithms , 'The Australian' reported . Uniqul's Ruslan Pisarenko said the technology — which is due to roll out next month — has the ability for transactions to be completed instantly and can even distinguish between identical twins, 'News Limited Network' reported. According to Pisarenko, "the face is a PIN and it's more like a complete way to identify a person.
But in some cases where the system is not 100% accurate, it will ask a person to input their PIN as security," he said. There is no payment card involved, nor is a mobile or wallet needed. Customers sign up to the technology by registering their identification and bank details. Once the items are scanned through the customers' details will flash up on a screen and they click "OK" to confirm the transaction.
The new tech is similar to facial recognition identification which is used by international travellers at airports in Australia. The company is getting ready for deployment of the system in Helsinki, news website goodnewsfinland.com reported.
The company said its patent pending technology allows to reduce time spent on transactions close to zero seconds.

Subscribe to:
Posts (Atom)