Pages

Showing posts with label Computer Information. Show all posts
Showing posts with label Computer Information. Show all posts

5 Important Tips to Choose a Good Web Hosting Provider

5:57 PM | , , , , , , , , ,

Here is your first bit of web host buying news, and it is not good: unless you happen to have some very sophisticated web tools at your disposal, you cannot be sure of your web host’s hosting services. However, just like buying any service, there are ways to avoid getting ripped off.Here are a few things you need to consider when buying web hosting:

Selecting-the-best-web-hosting-provider.[1]

A free web host comes at a cost
This is a burningly accurate statement which you ignore at your peril. Your first thought may be that if you use a free website service, then you have nothing to lose. But, what you in-fact have to lose is any and all the time and money you invest into building, developing and maintaining your website.

Most free services install adverts onto your website, which is going to cost you some credibility. Others will make it so that you cannot leave the host once you are on there, so you will have to leave your website where it sits and start a new one if you want to leave the host. Some free services have a very poorly maintained server, which is going to be hacked frequently, which means that anything you upload is not safe.

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

Be careful when reading reviews
If you are not at the stage where you are cynical about everything you read online, then please send five dollars to this site. If you are already cynical about everything you read, then be careful when it comes to hosting reviews.

Ideally, if you want to find a good hosting service, the you need to start looking at hosting reviews. But, do not look at the positive reviews because they are written by the hosting company. You need to look at the negative reviews. Think about it, when you pay for a service and they do their job, do you go online and write a good review about them? No, you do not. So, why would you believe all of the good reviews online?

You need to look at the bad reviews. You need to look for consistency within the negative reviews. For example, if you were buying a microwave and several negative reviews mentioned that its paint flakes off, then you may draw that conclusion that its paint probably flakes off. You need to do the same thing with the hosting service and look for consistencies throughout the negative reviews.

The distance selling laws apply
The people selling you hosting services should not be able to lie to you. If they say that they install the latest and most advanced virus checkers on their servers, then they have to by law, otherwise you can sue them. If they say that they give you a massive bandwidth amount, then they have to give you the amount they quoted.

This is because the distance selling laws allow you to sue the people who lie and mis-advertise to you. However, the laws do not apply across the world. If you are dealing with a company in the European Union, or with Canada, or in America itself, then the distance selling laws apply. If not, then people can lie to you about their hosting services and there is nothing you can do about it.

Concentrate on disk space and bandwidth
These are the things that are going to affect your website the most directly and in the most positive or negative manner. It is up to you to find the amount of disk space and bandwidth that you are going to need for your particular website. You really need to check to see if your host offers an upgrade service where you can buy more bandwidth or disk space.

If they do not then you need to look upon them with great suspicion, as it may mean that they are selling-on their own bandwidth and disk space, which is not going to be ideal for you. Plus, if you cannot upgrade then you risk having a popular website that you cannot expand, or that only a limited number of people can visit at one time.

Call their technical support staff
The bad hosts have great sales staff that answer right away, and terrible support or complaints staff that leave you on hold for a long time. Call the support or complaints staff to see how long it takes before you talk to a person. Also, do not go for a host that charges you more than the standard phone call rate for any sort of technical support.

Read More

hide-history-of-websites-you-visited

10:10 PM | , ,

We search for lots of information on the internet. But it is not necessary that others know about this. Whenever you visit any website this information is captured and stored in your computer in the form of 'cache', 'cookie', 'history', and 'windows registry'. There is a danger due to this. Whoever uses the same computer after you have used can find out which websites you have been visiting. If you have a personal computer that no one else will ever use, then you don't have to worry much about this. But if your home or office computer is shared then you better clear this history. In this tutorial let us see how to completely remove the recently visited websites from your computer.

 

  1. Cache Folder

      Every time you visit a website, every browser has the functionality to store the images, websites, urls etc in your hard disk somewhere in the temporary folders. This is useful to save bandwidth. When you visit the same website again, instead of downloading all the images again, the browser will retrieve them from the temporary folders from your hard disks and therefore increasing the speed and saving internet bandwidth. So when you finish browsing you can clear these temporary folders. This temporary folder is usually referred to as Cache. The exact location of this folder will differ based on the browser you are using. For instance if you use Internet explorer then this cache is located in the 'Temporary Internet Files' folder under your c:\Windows folder.

      You can either delete from this folder or you can delete it from your browser. Goto Tools-> Internet Options. Under the General tab click 'Delete Files' button.

 

2. History

     All the browsers also store the urls of every website you visit. This is used to show the address of the site on the 'Address Bar' when you start typing the first few letters of the web sited address; the browser will take from the history and prompt you for the full address. This makes your job easier so that you need not type the full address every time. But if you want to hide the sites you visit then you have to remove this history also. Internet explorer stores this history in a folder called 'History' under c:\Windows folder.

      Or you can delete history from your browser. Goto Tools-> Internet Options. Select the 'General' tab and click on 'Clear History' button. In the confirmation dialog box select 'OK'. This will clear your history.

3. Cookies

      Whenever you visit websites, some information about you and some information about that website are stored in your computer's hard disk. When you visit the same site again, the information stored in this cookie file will be read to identify you. This is especially useful for sites that can personalize the site for you and displays messages such as 'welcome your name' etc. But this cookie also stores the name of the site you visit so you should also delete these cookies if you want to hide the sites you visited.

      To delete cookies, go to Tools->Internet Options. And click on 'Delete Cookies' button. Or you can choose the security tab and click on 'Custom Level' button to disable or enable cookies.

4. Registry

      Another place in which the websites you visited are stored is the windows registry. It is not advisable to modify registries if you are not sure how to use them. Only those who are confident and willing to take risk should touch the registry. Click on 'Start->Run' and type 'regedit' and press enter. The windows registry will open. Now click on 'Edit->find' and type 'URL History'. In the right hand side you can see a list of website addresses that you visited. You can select them one by one and delete them. Programs, viruses and hackers.

Source: - http://www.allpctips.com/internet/hide-history-of-websites-you-visited.htm

Read More

UNIX IP Commands

12:02 AM | , , , , , , , , , , , , ,

Display Current Config for all NIC's: ifconfig

Display Current Config for dc0: ifconfig dc0

Assign multiple IP's: ifconfig dc0:0 192.168.1.2

Assign second IP: ifconfig dc0:1 192.168.1.3

Disable network card: ifconfig dc0 down

Enable network card: ifconfig dc0 up

Assign IP/Subnet: ifconfig dc0 inet 192.168.1.2 netmask 255.255.255.0

Assign Gateway: route delete default && route add default 192.168.1.1

You MUST be at the ROOT user to make/save any changes. You will need to save your changes in the /etc/rc.conf file. Network cards are referred to as dc0, dc1, dc2, etc based on their position on the PCI bus.

Special thanks to Romanov Sergey Vladimirovich from Moscow for the UNIX command.

- JMD COMPUTER INDIA

Source:
http://www.whatismyip.com/faq/unix-ip-commands.asp
Read More

Linux IP Commands

12:00 AM | , , , , , , , , , , , , , ,

Display Current Config for all NIC's: ifconfig

Display Current Config for eth0: ifconfig eth0

Assign IP: ifconfig eth0 192.168.1.2

Ping: ping -c 3 192.168.1.1

Assign multiple IP's: ifconfig eth0:0 192.168.1.2

Assign second IP: ifconfig eth0:1 192.168.1.3

Disable network card: ifconfig eth0 down

Enable network card: ifconfig eth0 up

View current routing table: route "or" route -n

View arp cache: arp "or" arp -n

Assign IP/Subnet: ifconfig eth0 192.168.1.2 netmask 255.255.255.0

Assign Default Gateway: route add default gw 192.168.1.1

Trace Route: traceroute www.whatismyip.com

Trace Path: tracepath www.whatismyip.com

DNS Test: host www.whatismyip.com

Advanced DNS Test: dig www.whatismyip.com

Reverse Lookup: host 66.11.119.69

Advanced Reverse Lookup: dig -x 66.11.119.69

You MUST be at the ROOT user to make/save any changes. Linux users, your distribution will determine the location of your network config file which will need to be updated and saved in order for the changes to remain in effect after rebooting. Network cards are referred to as eth0, eth1, eth2, etc based on their position on the PCI bus.

Special thanks to Gergely for the Linux commands!

- JMD COMPUTER INDIA

Source: http://www.whatismyip.com/faq/linux-ip-commands.asp
Read More

DOS / Windows IP Commands

11:58 PM | , , , , , , , , , , ,

Display Connection Configuration: ipconfig /all

Display DNS Cache Info: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping www.whatismyip.com

Trace IP address Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

- JMD COMPUTER INDIA

Source: http://www.whatismyip.com/faq/dos-windows-ip-commands.asp
Read More

IP Address Management

10:39 PM | , , , , , , , , , ,

What is IP Address Management or IPAM?

By breaking down and assigning your internal IP block into segments allows faster troubleshooting when monitoring the network and seeing an erratic IP. Because you’ve segmented the IPs out, you’ll know exactly which segment it’s coming from and can narrow down finding it faster.

Why manage IPs?

Easily track when network monitor software shows errors. If you’re logged on locally to a User’s computer and you’re mapping batch file didn’t run and you need to get a file from one of your servers you don’t have to know the server name, you can simply type \\192.168.1.x to get access to the server you’re needing the file from.


In the scenario I explain below, we’ll have 1 External IP, 5 servers ((Static) 1 handles DHCP (2k3)), 10 printers (Static), 200 wired PCs/users (DHCP).


There are several different ways to set up exact scenarios. This scenario will explain IP Address Management (IPAM) for a small network using my experience and knowledge.


For ease of use, we’re going to say that this is in a brand new facility where no IPs have been assigned and you, as the LAN Admin, have just been told your internet connection is in place and ready to use (this is where the single external IP comes from).


You already know how many devices will be connected to your network in the beginning so it’s now time to lay out a plan. Since most everyone is familiar with the 192.168.1.x IPs, I’ll stick with those. Technically, your first IP is 192.168.1.0 and your last is 192.168.1.255 which gives you 256 IPs. I don’t know of anyone that uses 192.168.1.0. Since we’re human, the first number to us is 1. To a computer, the first number is 0. I don’t think .255 is useable so really, you have 254 IPs available. Your 5 servers should get your first 5 IP addresses and assign them statically even though you can control static assignment in DHCP. You don’t want there to be any chance of these servers losing their IP addresses so you don’t want them to depend on DHCP for IP assignment.


Server 1 also happens to be your DHCP server: 192.168.1.1
Server 2: 192.168.1.2
Server 3: 192.168.1.3
Server 4: 192.168.1.4
Server 5: 192.168.1.5


You have to account for growth so leave .6 through .9 open for future servers whether they’re physical or virtual, they’ll need an IP.


You have 10 printers that will be used by multiple users. IPs in the next segment of the block can be statically assigned at the printer or via the DHCP server…your choice. Every office has a “main” printer/copier/fax. Give it 192.168.1.10. If you think far enough in advance and know that Group 1 will use printer 1 then assign printer 1 192.168.10.11, printer 2 for Group 2 would get 192.168.10.12, etc. all the way through .19. In my experience, if there’s any one piece of equipment you’ll add to your network more than any other, it’ll be a printer. Somebody in one of those groups will get tired of walking 15 feet to the printer and suck up to the boss to get their own printer. Then, people within 5 feet of that person will want to share with them so they don’t have to walk 15 feet to get their stuff either. So that printer will need to be on the network vs. just connected directly to the complainers PC and shared. Lucky you. By the way, remember at the beginning I said this was a brand new facility….hopefully, the people that ran the network drops put in 2 cables at each requested location. Otherwise, you’ll either need to run a cable or take the easy way out and install a 5 port switch. Trust me when I say leave plenty of IPs open for future printers. I would assign .10 through .29 for printers. This gives you 20 IPs for printers so you’ll have 10 IPs free after installing the initial 10 printers.


Finally, we have 200 PCs that will all be hardwired to the LAN and will each need an IP. Starting at .30 going through and including .254 gives you 225 IPs. I’d start my scope in DHCP at .40 through .254. That gives you 215 IPs for users (15 extra) and that also leaves 10 IPs open at the lower range (.30 through .39) for device growth. One thing I didn’t mention yet was managed switches. They’ll need IPs. You can do those at the high end of the spectrum so they’re “out of the way”. Maybe assign them .254, .253, .252, etc. depending on how many you have.


IPAM can get pretty deep especially if you’re dealing with 100’s of PCs and devices. This is where subnetting comes in. I’ll go into further detail in another article, but just for gee whiz this is the tip of the iceberg on subnetting:


For example, 192.168.1.1 with a subnet of 255.255.255.0 is not on the same network as 192.168.2.1 with a subnet of 255.255.255.0 even though they both might be in the same building. However, if you change the third octet in the subnet to 0 like this 255.255.0.0 now 192.168.1.1 with a subnet of 255.255.0.0 and 192.168.2.1 with a subnet of 255.255.0.0 are on the same network. The 255 is sort of a true/false in simple terms, but can get pretty complex if you’re trying to keep networks separate. I’m not a subnet guru by any means, but if you Google subnet calculator you can get a pretty good appreciation for its complexity.

Source: http://www.whatismyip.com/faq/ip-address-management.asp
Read More

multimedia presentation using power point

10:12 PM | , , , ,

How to create effective multimedia presentation using power point?

To present one's ideas across clearly, most of us us Microsoft Office Power Point. MS Powerpoint is a great application to create and do stylish and informative presentations. These days, people are using power point to include video clips and audio clips to create a multimedia presentation. Here are some tips on how to use video clips and create a power point presentation.

  1. The size of the video
    After inserting video files into presentations the size of the presentation file (.ppt) becomes too big. Therefore to run this presentation a powerful computer with more system memory is required. Due to this reason, some do not show the video clip on 'full screen'. Instead they use a smaller screen for the video. For example in a 640 x 480 resolution monitor a 320 x 240 size video clip will be smaller when viewed. Therefore it is best to keep the size of the video as 640 x 480. A video with this size (640x480) will appear clear on all monitors with different resolutions such as 640x480, 800 x 600, 1024x768, 1280x1024.
  2. Compression
    Most of the people choose the MPEG 2 video compression format. However, Microsoft's Widows Media Video (WMV) and Real Network's Real Video compression methods are also pretty good.

    Between Widows media video and Real video which is better? Which takes the least CPU time and processing power? Even an average computer can run Windows media video files and hence most of them choose windows media video. Moreover this WMV format is most suitable for Powerpoint. Hence I suggest to use the MWV format for compression for use in power piont.
  3. Book marking a scene or a frame in a video
    If you are going to insert a very big video into the power point presentation it is better to use the software Windows Media Encoder File Editor. When you download the windows media encoder, this file editor is also downloaded together with this software. Using this software you can bookmark important scenes in the video. The presenter can jump to any book marked scene in the video while doing the presentation.
  4. How to Insert a video inside the presentation
    There are three ways how you can insert video into a powerpoint presentation. Let us see which method is the best.

    1. Insert Movies and Sounds is the mostly used method. A window will be shown within the slide where you can insert the video and play it by clicking on the window.

    2. Insert Object is another method where you can insert the Windows media player as the object. Once you have inserted the media player object right click on this object and choose 'properties'. In the properties window you can show the media controls and in the 'Custom' button you can browse and select the video file stored in your hard disk. This insert object method is the best to show media controls such as Volume control, slider bar, zoom in, zoom out, full screen etc.

    3. Action Button. The above two methods are not suitable to show real video and quick time videos inside the power point presentation. But if you have only real video or quick time format video then you can use the 'Action Button' option from the 'Slide Show' menu. Using the action button option you can run any windows applications from within the presentation. So using this option you can choose real video or the quicktime player. If you click the action button the player will be started and the video will run.
Source:- http://www.allpctips.com/software/howto-create-multimedia-powerpoint-presentation.htm
Read More

what is application software and Operating system

10:09 PM | , , , , , ,

what is an Operating system?

To run the installed programs in your computer, to manage the system memory, to manage the file structure in your harddisk, to identify the file extensions and application types and use them accordingly, an operating system is required. Without this operating system, no computer can work. Some of the populare operating systems are Microsoft Windows, Unix, Linux and Solaris.

What is an Application software?

An application written to solve a specific need or requirement is an application software. This can be further classified into customized application software and generic application software. Some example of a generic application software are MS Office, Adobe Photoshop, Macromedia freehand etc. Customized application software are applications developed for a particular company to suit their workflow and automate their processes. There are many software development companies that develop this type of applications.

Source:- http://www.allpctips.com/software/applicationsoftware-operatingsystem.htm
Read More

Imaging software equivalent to Photoshop

10:07 PM | , , , , ,

Is there a free Imaging software equivalent to Photoshop? What is GIMP?

For handling images in computers most of us use Adobe Photoshop. There is no doubt that Photoshop gives unlimited features for creating and handling images. Printing works, Banners and magazine designs all need images. Photoshop is widely used for all these. But Adobe photoshop is not free. It is illegal to use pirated copies of the software. However a free software is available which can do most of the things photoshop can do. It is called GIMP.

GNU Image Manipulation Program is the full form of GIMP. This is a very popular free open source software that runs on many operating systems and can create, edit and manipulate images much like photoshop. You can download this GIMP software freely from http://www.gimp.org for Windows, Linux, Mac Os or Linux Os.

Do not just download the software from the above website. You can also get details from there about how to install, how to use GIMP from this website.

What is GIMP?

GIMP is an acronym for GNU Image Manipulation Program. Some call it as General Image Manipulation Program.

To draw images, to handle images, to enhance images GIMP is very useful. Almost everything you do in Photoshop can be done using GIMP. And it is Free. Free software foundation has released this software under the GNU (General Public Licence). Therefore you can even view the source code of this software freely. You can also copy this software and distribute it freely.

How to install GIMP?

If you want the full source code of GIMP and want to compile it yourself then goto www.gimp.org and download the appropriate file for your operating system. Then install it on your computer. Instead if you want the pre-built binary packages of GIMP, download the latest installer from http://gimp-win.sourceforge.net . (recommended) In Windows, installation is very easy by running the executable file. Let us see how to install GIMP in linux. Give this command in your computer.

tar-zxvfgimp-2.0.1.trar.gz

Now the compressed files will be extracted. Now goto the extracted folder and give the following three commands.

/ Configure

make

make uninstall

What are the features available in GIMP?

There are many tools available in GIMP. Paintbrush, airbrush, ctone, blur, sharpen are tools related to painting. There are tools to handle text too. Other tools to change images such as rotation, scaling, flipping, sheearing are also available. Selection tools such as square, oval or freehand tools are available. GIMP can handle image formats such as Tiff, Gif, Jpeg, Bmp, PPm image formats. You can convert images from one format to another format. Other tools such as layers, transparency and scripts are also available.

You can create images according to your imagination. You can get tools from the menu bar or right click and choose from the shortcut menu.

You can convert the created image to CMYK format to print. Colour mixer is another important feature.

As noted above, GIMP has many features as in Adobe photoshop and is freely available. However, GIMP is inferior it photoshop in some ways in terms of quality and power.

Source:- http://www.allpctips.com/software/What-is-GIMP.htm

Read More

What is Linux?

10:03 PM | , , , , ,

Linux is an operating system that is now gaining popularity and competing against the Operating System giant, Microsoft. In 1993, a student in Finland, Linus Torralds, created Linux. Both home PCs as well as network Computers need an Operating System to function. Both home users and companies spend millions of dollars in purching these operating systems such as Microsoft Windows or Unix. How nice it will be if we can get a free Operating System. Well, Linux is a free open source Operating System that anybody, home user or companies can download and use it freely.

Linux is based on the Unix operating system. Linux solves all your needs. You can linux in a single computer or in a networked enviroment where there are thousands of computers.
But home users still have many doubts and questions about Linux. In this section we will see some of the frequently asked questions about linux.

There are many advertisements selling Linux. Isn't Linux Free?

Linux is totally FREE. You can download Linux from Internet. But if your internet connection is slow, then it may take several hours or even days to download linux and its related applications using your dial-up connection. Just calculate the phone charges and the internet connection charges for this time. If you have a high speed broadband then you will find no problem to download linux from the internet directly.

But to solve the issue for 'dial-up' users many companies download linux and copy it into CDs and sell them. The cost of the CD disk, the cost for sending the CD to your house, and for the service they provide, these companies may charge a meagre amount for the Linux CD. But if you directly download from Internet, it is totally free.

What is Redhat, SuSe?

These are names of companies that market and sell Linux. The heart of the Linux OS is its Kernel. These companies add many utilities and applications based on this kernel and sell it. There are many such companies such as RedHat, Mandrake, Debian, SuSe etc. The linux offered by these companies are called Linux Distributions or simply 'Distros'. The Kernel in all these Distros will be the same. But the utilities and applications may be different in different distros.

Can I copy the linux CD from my friend and install it in my computer?

By all means, Yes. You can make as many copies of the Linux CD of your friend. It is legal.

Is it very difficult to use Linux?

If you learn and know the linux commands then it is easy to operate your computer. The Character User Interface in Linux requires you to know and remember the commands. But using the 'Graphical User Interface' of Linux, anybody can use Linux without the need to learn and remember the commands. You can use desktop environments such as 'Gnome' or 'Kde' to get the graphical user interface. This GUI environment will be similar to the Windows environment.

Do all hardware work with Linux?

Some old hardware may not work with linux. But all the recent and new hardware works well in linux. A common hardware problem is with the 'winmodem'. If you are using this type of internal winmodem, then you may have to buy the latest modem.

Are there applications for Linux? Are they free?

There are plenty of applications for linux. Most of them are free. Open Office, GIMP, Real Player, MTV, Doom are some examples.

I do not want to stop using Windows. Can I still use Linux?

Yes you can. This is called Dual booting or Multibooting. You can install linux in a separate partition. Whenever you boot, you can select whether you want to boot from windows or linux.

Source:- http://www.allpctips.com/software/what_is_linux.htm
Read More

What is Multibooting?

10:00 PM | , , , ,

Multibooting is the ability to install and use more than one Operating System in the same computer.

Generally most of us use just one operating system in our computers such as Windows or Linux. But there are people who install and use more than one operating systems in their computers. Some of the people who do this are:

  • Computer students
  • Computer teachers
  • Programmers and developers who would like to test, how their application will behave in different operating systems
  • Testers

Such users who have installed more than one operating systems in their computers will see a menu with a list of operating systems that they have installed. They can choose the operating system with which they want to boot from the list. Likewise they have switch between different OS by rebooting and selecting the OS. This is called multibooting.

How to install more than one Operating Systems in one computer?

1. Disk Partitioning

If your computer has two hard disks and they are not partitioned then you can two different Operating Systems on each of this hard disks. If you have only one hard disk and it is partitioned then you can install different OS on each of these partitions. Each OS needs to have a separate partition.

You can use FDISK to partition the harddisk in windows. This is not an easy tool to use. While partitioning, the data in the harddisk will be lost. Therefore you need to backup the data before partitioning.

If you are not so sure about using this command, there are other more user friendly applications available for partitioning. 'Nortan Partition Magic' is one such tool. You can get this tool, This is not a free tool. 'Ranish partition manager' is a free tool but it is a bit difficult to use.

If you like to use windows and linux in your computer, then install Windows first and partition your hard disk and then install Linux in the other partition.

2. Virtual Machine (VM)

Those who want to use multiple OS in their computers can use Virtual Machines. VM is now very popular. By the use of software, VM creates a Virtual environment for different OS. You have installed many applications in your computer. VM is another application. To switch between one OS to another, run the VM application first and then switch to the other OS. Then the VM will generate a virtual environment for the other OS. The other OS will then think that it is using the computer entirely by itself.

Using the Multibooting method only one OS can be run at a time. The selection is done while booting.

Using VM, more than one OS can run simultaneously. Each OS will run without knowing the existence of the other OS. But this will reduce the computer speed and performance. Some of the popular VM are Microsoft Virtual PC (www.microsoft.com) and VMware Workstation (www.vmware.com)

3. Emulators

Sometimes you may not need the full fledged OS. But you may want to use a specific feature of an OS. For instance you may not want the full 'Linux' OS but you want the base shell of Linux to run linux based applications on your computer.

In Windows, you may want to see the look and feel of 'Linux' and you want to run 'Linux' commands on the windows OS. For this there are emulators available for different OS.

For example, you can use Cygwin which is a free tool to emulate the Unix OS under windows. You can download this tool from (www.cygwin.com).

Source: - http://www.allpctips.com/software/whatis-multibooting.htm
Read More

Tutorial to Hide visited websites from others

9:48 PM | , , , , , ,

We search for lots of information on the internet. But it is not necessary that others know about this. Whenever you visit any website this information is captured and stored in your computer in the form of 'cache', 'cookie', 'history', and 'windows registry'. There is a danger due to this. Whoever uses the same computer after you have used can find out which websites you have been visiting. If you have a personal computer that no one else will ever use, then you don't have to worry much about this. But if your home or office computer is shared then you better clear this history. In this tutorial let us see how to completely remove the recently visited websites from your computer.

  1. Cache Folder

    Every time you visit a website, every browser has the functionality to store the images, websites, urls etc in your hard disk somewhere in the temporary folders. This is useful to save bandwidth. When you visit the same website again, instead of downloading all the images again, the browser will retrieve them from the temporary folders from your hard disks and therefore increasing the speed and saving internet bandwidth. So when you finish browsing you can clear these temporary folders. This temporary folder is usually referred to as Cache. The exact location of this folder will differ based on the browser you are using. For instance if you use Internet explorer then this cache is located in the 'Temporary Internet Files' folder under your c:\Windows folder.
    You can either delete from this folder or you can delete it from your browser. Goto Tools-> Internet Options. Under the General tab click 'Delete Files' button.

  2. History

    All the browsers also store the urls of every website you visit. This is used to show the address of the site on the 'Address Bar' when you start typing the first few letters of the websited address, the browser will take from the history and prompt you for the full address. This makes your job easier so that you need not type the full address every time. But if you want to hide the sites you visit then you have to remove this history also. Internet explorer stores this history in a folder called 'History' under c:\Windows folder.

    Or you can delete history from your browser. Goto Tools-> Internet OPtions. Select the 'General' tab and click on 'Clear History' button. In the confirmation dialog box select 'OK'. This will clear your history.

  3. Cookies

    Whenever you visit websites, some information about you and some information about that website is stored in your computer's hard disk. When you visit the same site again, the information stored in this cookie file will be read to identify you. This is especially useful for sites that can personlize the site for you and displays messages such as 'welcome your_name' etc. But this cookie also stores the name of the site you visit so you should also delete these cookies if you want to hide the sites you visited.

    To delete cookies, goto Tools->Internet Options. And click on 'Delete Cookies' button. Or you can choose the security tab and click on 'Custom Level' button to disable or enable cookies.

  4. Registry

    Another place in which the websites you visited are stored is the windows registry. It is not advisible to modify registries if you are not sure how to use them. Only those who are confident and willing to take risk should touch the registry. Click on 'Start->Run' and type 'regedit' and press enter. The windows registry will open. Now click on 'Edit->find' and type 'URL History'. In the right hand side you can see a list of website addresses that you visited. You can select them one by one and delete them. programs, viruses and hackers.

Source: - http://www.allpctips.com/internet/hide-history-of-websites-you-visited.htm
Read More

Different types of Internet connection and their advantages and disadvantages.

9:13 PM | ,

Which Internet Connection plan to choose?

Internet has become part and parcel of our lives. Not only for individuals but even for a country's economic growth, scientific growth, organizations' success, Internet is very essential. The companies that offer these internet connections are called ISPs (Internet Service Providers). These ISPs offer many different internet connection plans. How to select the best connection plan for home use or for offices? The following tips will give you an overview of different types of internet connections, their advantages and disadvantages.


PSTN Dialup


Public Switched Telephone Network (PSTN) dialup uses your phone connection to connect your computer to the internet. You need a modem, phone line and a computer for a PSTN dial up connection.

Advantages of PSTN dial up

  1. This is the basic internet connection and all the ISPs provide this type of dial up.
  2. To install PSTN dialup and to use it is very cheap and affordable.

Disadvantages of PSTN dial up

  1. The speed of a typical PSTN modem is 56KBPS. Therefore the speed of the internet connection will be slower than this.
  2. During the time you are connected to the internet, you have to pay the telephone charges.
  3. While you are connected to the internet you cannot use your telephone to call anyone because you are using that phone line for connecting to the internet. You also will not receive any calls from outside during this time.

ISDN dialup


Integrated Services Digital Network (ISDN) dialup uses a higher end digital telephone line to dial up. To use this type of connection you need ISDN telephone line, computer and a 'Terminal Adapter'.

Advantages of an ISDN dialup

  1. While you are connected to internet using ISDN dialup connection you can use your ISDN phone to make phone calls simultaneously.
  2. When you are making phone calls while connected to the internet then the speed of internet will be 64KBPS.
  3. If you are using the ISDN phone line just for internet then the speed of internet will be 128KBPS.

Disadvantages of ISDN dialup

  1. Not every place has ISDN connection.
  2. Even if your place has this facility, it is expensive to get an ISDN dialup connection from your ISP.
  3. Not all the ISPs provide ISDN dialup plan.

Leased Line Internet Plan


In both ISDN dialup and PSTN dialup you need to dial up from your computer before getting connected to the internet. And you close this connection when you no longer need internet connection. If you need a continuous connection 24 hours of the day and 7 days a week then you need a 'Leased Line' also known as 'dedicated line'. This type of permanent connection is called 'Always On'.

Advantages of Leased Line

  1. You get 'Always on' connection 24 hours every day.
  2. The speed of the internet ranges from 2.4 KBPS to 2G based on your subscription.

Disadvantages of Leased Line

  1. The disadvantages of a leased line is that it is very expensive.
  2. Since your computer is always connected to the internet your computer is exposed to many vulnerabilities such as viruses and spywares. So you may need to secure your computer using firewall and Antivirus software

DSL

  1. Digital Subscriber Line (DSL) also uses a normal PSTN phone line. But using DSL you can use both internet and phone simultaneously. Therefore many prefer DSL to PSTN dial up.

Advantages of DSL

  1. The speed of DSL connection is fast. 64 KBPS, 512 KBPS, 1.5MBPS and higher speed can be achieved in DSL connections.
  2. DSL also provides 'Always On' connection 24 hours a day always.
  3. You can also use your phone while using internet

Disadvantages of DSL

  1. More expensive
  2. You need an ADSL modem to connect but the distance between this modem and your computer cannot be more than 18,000 feet.

Source: - http://www.allpctips.com/internet/adsl-leased-line-dialup-isdn-pstn-internet-connection.htm

Read More

downloading files and programs from internet

9:08 PM | , ,

How to download files and programs?
When you are browsing the internet, you stumble upon a program, shareware or freeware that you would like to download and install on your computer. Just follow these steps to do that.

  1. First bring the cursor on top of the file or program that you wish to download. The arrow cursor will turn from 'arrow' to a 'hand'. Then click on that place.
  2. Then, click on 'Save' or 'Save to disk'. You will be prompted to select the location in your computer harddisk where you would like to store this file. A good practice is to make a folder in your C drive with the name 'downloads' and then use this folder for all your downloaded files and programs. Otherwise, you can choose your desktop as the destination, so that when the download is finished you can easily locate the file from your desktop.
  3. Now the file will start downloading. While it is being downloaded a small dialog box with the title 'Saving Location' will show the % of the file that is already downloaded. Once it is fully downloaded the dialog box will show 'Download completed'. You will also get a 'Beep' sound.
  4. Once the download is complete, you can click on the 'open' button on the 'download competed' dialog box.
  5. 4.1 If the file you downloaded is an .EXE (Executable) file then the application will install itself on the computer.
  6. 4.1 If it is a .zip file then the WinZip program will open the file with its contents. In this case you can extract all these files to any of your local folders and then look for an .EXE program such as install.exe or setup.exe and double click on it install the application.
  7. Source: http://www.allpctips.com/internet/downloadingprograms.htm
Read More

What is Downloading, Uploading Installing and Un-Installing

10:11 PM | , ,

Downloading, Uploading, Installing and Un installing are most favorite words in the usage of computer and Internet. Let’s see about this.

Downloading:
We are copying a file from a network or an Internet to our computer is called downloading. We need not to do so much work for this. In Internet it displays, if you want this facility click here to download. If we click the link it will ask the place to store the file then we select the directory. The file will start to download. It shows the message it contain the rate and time.

Uploading:
This is the reverse process of downloading. That is we can copy the files from can computer to a network or the Internet. Generally the process is run by F.T.P. some of the Internet website provide the way to upload the files through their browsers.

Installing:
Mostly the peoples confuse both downloading and installing. Installing means process of our computer is preparing for run a program. Generally its have a setup program to run when we are executing the setup program it ask some questions. We give to answer for this questions then it start copy the files to your computer for run the particular program. If we want to run the program we may click the icons in the desktop. Otherwise select the program from star/program menu.

Un Installing:
This is also the reverse process of installing while installing the program. It will copy the files in your computer. When we don’t want the program it’s hard task find and delete the files. Because of that the developers are create one exe file for uninstalling with that program.

We can see the file in program directory. Otherwise we can uninstall the file by select the Add/Remove Program option in control panel. Here all the installed programs are arranged in alphabetical order. We can select the program from the list, which is wanted to uninstall.

- JMD Computer         Keep Comment

Source: - http://www.allpctips.com/windows/downloading-uploading-installing-uninstalling.htm

Read More