Archive for 2014
WHY ANTIVIRUS SOFTWARES ARE NEEDED ?
WHY ANTIVIRUS SOFTWARES ARE NEEDED ?
Without an antivirus software your computer is at high risk to be infected during you chat with friends, download files from the Internet, open email attachments, launch various applications and games, visit websites, etc.
Virus infections can cause the system to freeze, applications to close unexpectedly, display unwanted popups, redirect home and search page, block the Internet, delete and modify system and user files and many more unwanted malicious behavior.
Computer viruses affect every PC user in every part of the world. They are transmitted through e-mails, web pages, networks, and digital media such as ipods, USB Flash drives and even CDs. I recommend to use the good Anti Virus Software.But to get a reliable software you have to spend some money !!!!
most of the cases we are not interested to spend our pocket money to buy a internet security.
now I am giving you the most reliable antivirus in free with a 365 days license .
note : it is not like so called trial version .
Now follow some simple steps
Without an antivirus software your computer is at high risk to be infected during you chat with friends, download files from the Internet, open email attachments, launch various applications and games, visit websites, etc.
Virus infections can cause the system to freeze, applications to close unexpectedly, display unwanted popups, redirect home and search page, block the Internet, delete and modify system and user files and many more unwanted malicious behavior.
Computer viruses affect every PC user in every part of the world. They are transmitted through e-mails, web pages, networks, and digital media such as ipods, USB Flash drives and even CDs. I recommend to use the good Anti Virus Software.But to get a reliable software you have to spend some money !!!!
most of the cases we are not interested to spend our pocket money to buy a internet security.
now I am giving you the most reliable antivirus in free with a 365 days license .
note : it is not like so called trial version .
Now follow some simple steps
- Open Kaspersky 2012 or 2013 License Manager (from lower right corner).
- Click ‘Activate the application with a new license’ button. (Delete any trial key first, by clicking the red X next to the key).
- Select ‘Activate commercial version’ and enter the activation license code as 11111-11111-11111-1111X
- Wait activation wizard message->Click OK
- Wait for wrong activation code message->Click OK->
- Screen will appear with KEY FILE BROWSE
- Browse to the key location and activate kaspersky .
- download link : downlaod , download 2 .
Thank you .Take a deep breathe .
Have a nice day . keep in touch with techelectro .
Sunday, 16 February 2014
Tag :
Internet Magic
Free cell phone tracking software
Free cell phone tracking software -Cell phone locator-GPS tracker
MobiWee
MobiWee currently supports Windows Mobile, Android, iPhone, and BlackBerry devices. Users can remotely Locate and track their device, retrieve their information, then lock, wipe, encrypt, delete certificates (for the corporate user), and shutdown their device from any web browser- even if the SIM card has been removed.Find My iPhone
Once you enabled Find My iPhone on your handset, you can:1. Locate your iPhone on a map.
2. Set a passcode lock remotely.
3. Display a message or play a sound on your lost handset.
4. Protect your privacy with Remote Wipe.
InstaMapper
InstaMapper is a free service that allows you to track a GPS-enabled mobile devices online in real time.1. Lots of storage.
2. Access to raw data.
3. Location sharing.
Buddyway
Buddy is a free GPS track maker for mobile devices that allows you to track any handset or PDA with built-in GPS (or with Bluetooth GPS receiver) in real time.1. Track any GPS-enabled device in real-time online.
2. Save trips for later reference.
3. Share the trips with desired people or keep them private.
4. Capture and comment on particular locations of your trip (in real-time) directly from your handset.
5. Import and save trips to Google Earth to visualize them in 3D-mode and more.
6. View route statistics and charts: route length, route duration, avg. & max. speed, altitude changes, etc.
7. Setup alerts on desired regions and get alerted when nearby.
8. See the list of supported devices on the website.
Mobile tracking system
Mobile Tracking System 1.51 is a free mobile phone tracker, it allows you tracing a handset’s location via Gps.1. Tracking a mobile device’s location from a GSM mobile device or GPS receiver.
2. Tracing your current location from a GSM cell phone or GPS receiver.
3. Add or edit a cellid directly from the mobile client.
4. Realtime any user tracking (if allowed by user).
5. Send and receive e-mail messages directly to and from the MTS client.
6. Send and receive MTS chat messages.
7. Send and receive files.
Tag :
Software
Hide your IP address
How do you hide your IP address?
The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):
VPN Services
A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs. VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.Website-Based Proxy Servers
A Website-based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:Browser Configured Proxy Servers
There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server and proxy risks.There are a variety of types of these proxy servers:
- Transparent Proxy
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address. - Anonymous Proxy
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address. - Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address. - High Anonymity Proxy
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.
Tag :
Computer Magic
Computer - Number System
Computer - Number System
A computer can understand positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number.
A value of each digit in a number can be determined using
- The digit
- The position of the digit in the number
- The base of the number system (where base is defined as the total number of digits available in the number system).
Decimal Number System
The number system that we use in our day-to-day life is the decimal number system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the successive positions to the left of the decimal point represent units, tens, hundreds, thousands and so on.Each position represents a specific power of the base (10). For example, the decimal number 1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position, and 1 in the thousands position, and its value can be written as
(1x1000)+ (2x100)+ (3x10)+ (4xl)
(1x103)+ (2x102)+ (3x101)+ (4xl00)
1000 + 200 + 30 + 1
1234
As a computer programmer or an IT professional, you should understand the following number systems which are frequently used in computers.
S.N. | Number System & Description |
---|---|
1 | Binary Number System Base 2. Digits used: 0, 1 |
2 | Octal Number System Base 8. Digits used: 0 to 7 |
4 | Hexa Decimal Number System Base 16. Digits used: 0 to 9, Letters used: A- F |
Binary Number System
Characteristics- Uses two digits, 0 and 1.
- Also called base 2 number system
- Each position in a binary number represents a 0 power of the base (2). Example 20
- Last position in a binary number represents a x power of the base (2). Example 2x where x represents the last position - 1.
Example
Binary Number: 101012Calculating Decimal Equivalent:
Step | Binary Number | Decimal Number |
---|---|---|
Step 1 | 101012 | ((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10 |
Step 2 | 101012 | (16 + 0 + 4 + 0 + 1)10 |
Step 3 | 101012 | 2110 |
Octal Number System
Characteristics- Uses eight digits, 0,1,2,3,4,5,6,7.
- Also called base 8 number system
- Each position in a octal number represents a 0 power of the base (8). Example 80
- Last position in a octal number represents a x power of the base (8). Example 8x where x represents the last position - 1.
Example
Octal Number: 125708Calculating Decimal Equivalent:
Step | Octal Number | Decimal Number |
---|---|---|
Step 1 | 125708 | ((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) + (0 x 80))10 |
Step 2 | 125708 | (4096 + 1024 + 320 + 56 + 0)10 |
Step 3 | 125708 | 549610 |
Hexadecimal Number System
Characteristics- Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
- Letters represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15.
- Also called base 16 number system
- Each position in a hexadecimal number represents a 0 power of the base (16). Example 160
- Last position in a hexadecimal number represents a x power of the base (16). Example 16x where x represents the last position - 1.
Example
Hexadecimal Number: 19FDE16Calculating Decimal Equivalent:
Step | Binary Number | Decimal Number |
---|---|---|
Step 1 | 19FDE16 | ((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10 |
Step 2 | 19FDE16 | ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10 |
Step 3 | 19FDE16 | (65536+ 36864 + 3840 + 208 + 14)10 |
Step 4 | 19FDE16 | 10646210 |
Tag :
Computer Magic