Free Pc Tips And Tricks


Provides many computer tips in many categories including MS Office, PC troubleshooting, system
tuneup, internet tips, Cisco router tips, backup tips, VPN tips and many more.
visit :- http://www.computerfreetips.com/

Free online courses


free web based computer tutorials and training to users of all levels including web design, software, networking and more.

Learnthat.com

also designs online courses and offers consulting on computer and professional education.

For Computer Science Students

Free online computer science tutorials and solutions to the queries of the students. Lay Networks functions like a democracy system for students.
It is “Of the students, By the students and for the students."

Visit http://www.laynetworks.com/

Any doubt

Generally when we are reading an article or watching T.V we got a doubt , "How that Thing works ? "
Who will give the answer for that Question ?
There is a One website named as HowStuffWorks .It will clarify maximum of your doubts . .
If you have a doubt just go through it. . . .

Protect Your Computer

This home computer security article was written for the purpose of helping users secure their home computers against viruses, worms, and backdoors and specifically against the blaster worm and worms like it.

To help you protect your computer, it is helpful to understand how you get viruses, worms, trojans, and other bad software.

*
Attack - An attempt to gain unauthorized control of someone's computer.
*
Vulnerability - Typically, a software bug or misconfiguration which affects the operation of an operating system or other program run on a computer allowing it to be more easily accessed. Hackers, worms, viruses, and trojans use vulnerabilities to gain access to computer systems without the user's knowledge.
*
Virus - Malicious software that spreads by attaching itself to files or creating files that may be executed in some way. Usually it is sent to users as an email attachment. It may require a computer software vulnerability to spread depending on the type of program it uses to spread.




source :
*
Worm - Spreads without the user taking any action and usually exploits a bug (or vulnerability) in an operating system or some other program that may be running on a computer. This requires a computer software vulnerability to spread.
*
Trojan - A program which is usually given away for free which has a hidden purpose. It may be some type of file such as a video that user's may be interested in. The user would normally install and run this program although the installation would be so simple the user would be unaware of it. This program may or may not use a vulnerability to spread.
*
Hacker (for this discussion) - A person who deliberately attempts to manually break into other systems and use them without the knowledge of the owner. Usually hackers exploit computer software vulnerabilities on the victim's computer, however once they have control of a system it is not possible to be sure they are denied access again without reformatting the hard drive and re-installing the operating system.
*
Spyware - Spyware is not as serious a security concern as viruses, trojans,worms, and even hacker attacks, but many free programs contain spyware such as the current popular freezip program. Spyware is mainly a privacy concern than a security concern. Spyware does not take control of a computer system, but sends information to the spying entity about how the computer system is being used such as what web sites are being visited. The biggest concern with spyware or any other potentially malicious software is that it may download other code and install it on the user's system. Additionally it may hide itself from the user to prevent it from being removed.
*
Firewall - Firewalls in simple terms are used to limit remote access to specific parts of the operating system or programs running on the system. They may block incomming attempts to connect to an application or exploit a vulnerability. Firewalls remove many of the possible methods of breaking into a computer without permission. It will help prevent hackers, viruses, worms, and trojans. It may also block spyware from contacting the spying entity.
*
Backdoor - A program which allows an unauthorized user to have access to a victim's computer.


Solutions : -

These are basic and simple security requirements which must be followed in order to have a computer be anything close to secure.

1.
Every computer that connects to the internet in any form MUST have a personal firewall or be behind a corporate firewall. The type of connection is not important. A personal firewall is required for dial in connections, cable modem, DSL, ISDN, T1 and others. The ONLY exception is when there is some type of firewall already existing between the computer and the internet. Get a personal firewall and configure it according to the maker's instructions.
2.
Every computer must have virus protection and updates to the virus list database should be done at least twice a week. A full virus scan should be done at least once per week.

If you do not at least take the two measures listed above then you should not connect your computer to the internet. In the past I believed that I could just keep my system updated with security updates and did not need a personal firewall. This was a perfect formula for getting trojans, viruses, and backdoors and I ended up with four of them and had to reformat my hard drive and re-install my system.



There are also other security recommendations but the two above requirements are critical to all systems. The other security practice that should be done includes:

*
Updating your systems with security updates and service patches when they are considered stable, but this can be a technical decision. See the below paragraph about updating your system.

It is best to read a e-mail discussion group postings to determine the state of current patches and vulnerabilities. Microsoft and other vendors issue postings about security patches and vulnerabilities when they come out. One of the best mail listings to subscribe to for learning about Windows vulnerabilities and patches is at http://www.ntbugtraq.com



A couple of additional practices related to your computer which may be lifesavers are:

*
Back up your data - This should be done regularly to one or more of another computer, a writeable CD ROM drive, a zip drive, or tape drive. Remember if you should lose your data, everything you have done since your last backup will be lost. If you should find it necessary to re-install your system in the event of a security breach you will be glad you have done this. Also I have seen several hard drives fail and cause complete loss of data to users.
*
Create an emergency boot floppy for your operating system - You should learn how to do this for the operating system you are using. Instructions in this area are beyond the scope of this document.



Why do I need a firewall?

It would seem that if you keep your anti-virus definitions update with your virus protection program and you keep your system patched with the latest updates you would not need a personal firewall. Viruses would be immediately caught by your antivirus program, and your vulnerabilities would not exist since you always patch them immediately. This does not work for the following reasons:

1.
Viruses begin to spread before they are identified. The only way they are identified is when someone discovers their computer is behaving incorrectly and then they realize they have a virus. Then the virus updates are posted to anti-virus vendor websites such as Symantec. Therefore the virus can spread to you before it is identified and your system may be compromised and other unwanted items such as hacker backdoors may be placed on your system before the virus is removed. A firewall can also help prevent additional item from being placed on your system if you should get an unknown virus.
2.
Firewalls typically block most of the routes that viruses, trojans, worms, and hackers will try to use to gain access to your computer. A computer with a firewall is thereby much better protected than one without.
3.
It is likely that some vulnerabilies may not be patched before the attack occurs.
4.
Vulnerabilities like viruses must also be discovered. If a hacker discovers the vulnerability or someone writes a virus program to use an undiscovered vulnerability, a firewall may still be able to prevent the attack.

Even with all these measures there is no guarantee that your system cannot be compromised by a virus, worm, or hacker, but it is very likely that you will have much less trouble. Remember there is no guarantee that your hard drive will not break tomorrow so you should also back up your data to another computer, tape, or CD periodically when possible.


Firewall Recommendations

There are many personal firewalls that should work well, but it may be worth reading personal firewall reviews to find the best one when you are choosing one. Go to http://www.google.com and type "personal firewall reviews" to find sites that provide these reviews. I use Norton Personal firewall from Symantec, but zonealarm personal firewall is free for individuals and non profit organizations. It is available at http://www.zonelabs.com Please do not violate license laws when using this product. Since antivirus software is also an essential requirement to have a reasonably secure computer a nice convenient package is Norton's Internet security package from Symantec which can be found in many stores. It comes with both antivirus software and a personal firewall. The commercial version of ZoneAlarm's personal firewall also is very well recommended.



Configure your firewall before connecting to the internet. Most users should at this point read their documentation or run the provided firewall tutorial. You may get alerts while configuring or in one case I got an alert indicating that a specific program wanted to act as a server on the internet. Before answering the question I used another computer and went to http://www.google.com and looked up the name of the program the alert had specified. At this point I realized the computer had a virus. If you are told by the alert that a program wants to act as a server the likely answer to this question should be no, but it is best to look up the program name on Google to be sure. Also keep in mind any actions you may be taking which may prompt a program to access the internet to determine whather an action you took caused the internet access request to occur.


Updating Your Windows System

*
Windows 95 - If your operating system is Windows 95, you should update it to Windows 98, 2000, or XP because Windows 95 is no longer supported by Microsoft.
*
Windows 98/Me - Use the web site at http://windowsupdate.microsoft.com to get your updates. It is said on the NTBugtraq email group that this is not always reliable however. Also you should update your Internet Explorer browser to version 6 or above by using the site at http://www.microsoft.com/windows/ie/downloads/critical/ie6sp1/download.asp
*
Windows 2000 - Download and install Windows 2000 Service Pack 3 at http://www.microsoft.com/windows2000/downloads/servicepacks/sp3/default.asp Service Pack 4 is now out but still has some unresolved questions that administrators are dealing with but it can be downloaded at http://www.microsoft.com/windows2000/downloads/servicepacks/sp4/default.asp Update your Internet Explorer browser to version 6 or above by using the site at http://www.microsoft.com/windows/ie/downloads/critical/ie6sp1/download.asp Review the critical updates at http://www.microsoft.com/windows2000/downloads/critical/default.asp and install them. Windows 2000 Also has an autoupdate utility which can be configured from the control panel. It is said on the NTBugtraq email group that this is not always reliable however.
*
Windows XP Home - You can find out about updates at http://www.microsoft.com/windowsxp/pro/downloads/
*
Windows XP Professional - You can find out about updates at http://www.microsoft.com/windowsxp/pro/downloads/

source : some of internet websites

Free Text books for C.S.E

Especially for Computer Science and Engineering , I.T Text Books you can download from below link .

free e text books

Hi friends here you can download the engineering text books & all professional text books freely

. . . . .Click Below Link . . . . . .


************************
************************

DOS Commands

there’s no replacement for the *nix shell for network based computing tasks, but Micro$oft still has its roots deep . For those who find working via the GUI meclancholy, here’s a list of DOS commands you might want to try out on your Windows machine. This can be useful anyone interested in churning out more information from the network.

ADDUSERS : Helps Add or list users to/from a CSV file
ARP : Address Resolution Protocol
ASSOC : Change file extension associations
ASSOCIAT : One step file association
AT : Schedule a command to run at a later time
ATTRIB : Change file attributes

BOOTCFG : Edit Windows boot settings
BROWSTAT : Get domain, browser and PDC info

CACLS : Change file permissions
CALL : Call one batch program from another
CD : Change Directory - move to a specific Folder
CHANGE : Change Terminal Server Session properties
CHKDSK : Check Disk - check and repair disk problems
CHKNTFS : Check the NTFS file system
CHOICE : Accept keyboard input to a batch file
CIPHER : Encrypt or Decrypt files/folders *
CleanMgr : Automated cleanup of Temp files, recycle bin
CLEARMEM : Clear memory leaks
CLIP : Copy STDIN to the Windows clipboard.
CLS : Clear the screen
CLUSTER : Windows Clustering
CMD : Start a new CMD shell
COLOR: Change colors of the CMD window
COMP : Compare the contents of two files or sets of files
COMPACT : Compress files or folders on an NTFS partition
COMPRESS : Compress individual files on an NTFS partition
CON2PRT : Connect or disconnect a Printer
CONVERT : Convert a FAT drive to NTFS.
COPY : Copy one or more files to another location
CSVDE : Import or Export Active Directory data

DATE : Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG : Defragment hard drive
DEL : Delete one or more files
DELPROF : Delete NT user profiles
DELTREE : Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR : Display a list of files and folders
DIRUSE : Display disk usage
DISKCOMP : Compare the contents of two floppy disks
DISKCOPY : Copy the contents of one floppy disk to another
DNSSTAT DNS : Statistics
DOSKEY : Edit command line, recall commands, and create macros
DSADD : Add user (computer, group..) to active directory
DSQUERY : List items in active directory
DSMOD : Modify user (computer, group..) in active directory

ECHO : Display message on screen
ENDLOCAL : End localisation of environment changes in a batch file
ERASE : Delete one or more files
EXIT : Quit the CMD shell
EXPAND : Uncompress files
EXTRACT : Uncompress CAB files

FC : Compare two files
FDISK : Disk Format and partition
FIND : Search for a text string in a file
FINDSTR : Search for strings in files
FOR : Loop command: all options Files, Directory, List
FORFILES : Batch process multiple files
FORMAT : Format a disk
FREEDISK : Check free disk space (in bytes)
FSUTIL : File and Volume utilities
FTP : File Transfer Protocol
FTYPE : Display or modify file types used in file extension associations

GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

HELP Online Help
HFNETCHK Network Security Hotfix Checker

IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP

KILL Remove a program from memory

LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files

NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights

PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who’s logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory

QGREP Search file(s) for lines that match a given pattern.

RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration

TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file

USRSTAT List domain usernames and last login

VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label

WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands

XCACLS Change file permissions
XCOPY Copy files and folders
This list is not exhaustive . Most commands will work well, however please don’t fume up as some of these might not work on your machine due to version dependencies

Jntu previous papers for all years n all branches

Hi friends You Can download jntu all old Question papers.

Click here for Previous papers

******************************************************************
** We are not responsible for any consequences
**
******************************************************************

Free Secured 3D browser . . .

We are using a browser for browse the web........we are using so many browsers but here i will tell you a 3D browser that is WYZO ! yes it is 3D browser you can download and use it . it is different from other browsers.it Provide security also. . . . . .

You can download the browser from below link

www.wyzo.com

free E-mail to your mobile

Yes you can get E-mails to your mobile without spent 1 paisa. Its true you can receive every email to your mobile freely no need to install any software or anything.
  • Works on all existing mobile phones
  • No GPRS required
  • No special software required
  • Instant New Email Notification
  • Receive Complete Email
  • Global Functionality (Receiving SMS is free everywhere)
  • Activation and setup takes less than 5 minutes
  • Emails are stored in an encrypted format on our server.
  • Works with any ISP or Mailing solution(eg.MS Exchange, Lotus Notes or any Linux based solutions)
www.m3m.in

free university results on you mobile..

Yes you can get alerts from Jntu kakinda , hyderabad , ananthapuram freely. . . . . .

You can get news alerts , jokes , technology news and so on for free just click the below link


http://labs.google.co.in/smschannels/browse

These alert service are provided by google. . . . . . . . .

If you want security for ur computer

Hi friends . . . . .
When you are using internet you have to install some of security softwares.in internet there is a chance for attacking the viruses , malware or spyware etc.and some of websites has dangerous contents so we have to browse the internet with the help of some security softwares like anti-virus , firewall , site advisers etc

FREE anti-virus :-

www.avast.com

www.free-av.com

free.avg.com

www.pctools.com/free-antivirus

etc. . . . . .

FREE Firewall :-

www.pctools.com

www.personalfirewall.comodo.com

www.zonealarm.com

www.firewallguide.com/freeware.htm


SiteAdvisor :-

www.siteadvisor.com

free system cleaning software

CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)

Click below

www.ccleaner.com

free games and comics,jokes,timepass websites

You can play games online without downloading anything . .

www.zapak.com
www.indiagames.com
www.flash-games.net
www.games2win.com
www.neopets.com
www.kongrgate.com

If you want to play Different games following links useful

www.ogame.com
www.tribalwars.net
www.mybrute.com


If you want to read Interesting stories below websites are helpful for you

www.ctrlaltdel-online.com
www.thenoobcomic.com
www.lfgcomic.com
http://comics.com


Here You can watch the videos of dogs , cats some funny videos

http://icanhazcheeseburger.com

http://failblog.org

http://engrish.com

www.blogthings.com

You Have a best idea , but no one is there if you want to share the idea with other people visit the below websites. . . . . . .

www.neogaf.com

http://i-am-bored.com


Note : - These are collected from various sources , we are not responsible for any consequences

Travel Information

Hi friends Here i will put some of websites for travel purpose.
If You want to travel in INDIA the following websites will help you. . . . . . . . . . .


www.travelocity.co.in
www.yatra.com
www.cleartrip.com
www.makemytrip.com
www.redbus.in
www.ticketvala.com
www.railtourism.com
www.railtourismindia.com
www.travelchacha.com
www.merucabs.com


Here some websites will help you for lodges , food ,tiffin details. . . . . . . . .

www.travelguru.com
www.nivalink.com
www.oktatabyebye.com

Some of state tourism websites. . . . . . . .

www.keralatourism.org
www.rajastantourism.gov.in
www.aptourism.in
www.tourisminindiawww.incredibleinida.org
www.tourism-of-india.com
www.Visitsingapore.com


Visiting places and historical events in that Places

www.infohub.com
www.trivaga.co.uk
www.cultureholidays.com
http://travel.mapsofindia.com
www.indiatravelogue.com
www.worldtravelguide.com
www.zoomtra.com
www.lonelyplanet.com

Subscribe via email

Enter your email address:

Delivered by FeedBurner