May I come in Sir?
Yes, Come in.
Good Morning all. May I sit down?
Sure, Please be seated.
So Mr. Raj, Tell me about yourself?
Showing posts with label Help Forum. Show all posts
Showing posts with label Help Forum. Show all posts
Tuesday, December 4, 2012
Tuesday, February 14, 2012
Dependent Factors - Calculation of GATE Marks, Score, Rank & Percentile
The following article showers light on the various dependent factors on which the calculations of GATE Marks, Score, Rank & Percentile are based. I have collected this data from various reliable sources and have compiled it in an easy-to-understand way so that you can have a clear idea about the intricacies behind these terms that decide your fate in GATE.Sunday, July 10, 2011
Get Google+ Invitation now....
Is it that you just can not resist the urge to use the brand new Social Networking gaint Google+ by Google?
So here comes the end of your awaitment. Get Started with the Amazing experience of Circles, Hangouts and Sparks of Google+.
Just provide your Google email-id in our wall and get the invitation in
seconds.
Monday, January 17, 2011
Facebook scam chain: Deleting inactive members
![]() |
| Facebook scam |
Well this is nothing but a hoax mail, so don't carry on the chain. Don't let the scammers rule Facebook. Official Facebook will never ask you to do such to prove the activeness of your account. They have other means to check so, you know well, i guess. All this is nothing but a Facebook noise to increase traffic on FB servers, & to see how far the spam can spread. They do indeed, are benefited by this.
To know more on this scam message see -
Details: Facebook hoax chain message
Saturday, December 25, 2010
Beginning Java Programming for Dummies, Best Book
![]() |
| Java for Dummies |
Specifically, Java is an Object-Oriented Programming(OOP) language developed by Sun Microsystems. Build after C++, the Java language was designed to be portable(Platform-Independent) across Operating Systems, both at the Source and at the Binary level.
Now to learn Java there are plenty of Books, but the problem most of the students face is that most of the books are written in a style such that the reader has to have a hand or some experience in programming in some other language like C++. Hence, I beleive the book 'Beginning Programming with Java for Dummies' by Bary Burd, Wiley Publication is the best book for learning Basic Java for those too who don't know C++ that well.
Sunday, August 22, 2010
Solution to X-Queen Problem in C
Recently, our honorable KG sir, in my college, threw a question to all my fellow classmates (including me) as an Assignment on to solve the X-Queen problem where X-denotes the Roll no. of the student. This urged me for an opportunity to help my classmates by providing them their unique source code in C based on the value of X.
Note, I only have 6 different algorithms (algos) currently & working on more algos. Also each single question has more than one distinct solution & my algos will only solve for one of them. Hence you can imagine that each distinct solution may have a distinct algo too i.e. i'm solving for a specific solution, whereas the programs on net give all generalized solutions.
Well, I will deliver the source code to you guys on a First Come First Serve (FCFS) basis, so hurry or KG will catch you as the Copy Cat. Provide your Name, E-mail ID & Roll No./Value of X in the Comment box below & i will send you the code directly to your Inbox. But hurry before my algos end.
Note, I only have 6 different algorithms (algos) currently & working on more algos. Also each single question has more than one distinct solution & my algos will only solve for one of them. Hence you can imagine that each distinct solution may have a distinct algo too i.e. i'm solving for a specific solution, whereas the programs on net give all generalized solutions.
Well, I will deliver the source code to you guys on a First Come First Serve (FCFS) basis, so hurry or KG will catch you as the Copy Cat. Provide your Name, E-mail ID & Roll No./Value of X in the Comment box below & i will send you the code directly to your Inbox. But hurry before my algos end.
Thursday, August 5, 2010
Hard Disk Maintenance - Windows Tools, Don't ignore
Don't ignore your Hard Disk maintenance.
| Inner view of a Hard disk |
Hence, there's a need of some routine maintenance of hard disks for fast, smooth, & healthy performance. The heuristic part is that every OS offers maintenance tools, but a handful of Enthusiasts use them.
Here, I'll discuss about 2 predefined tools in Windows OS viz.
Monday, August 2, 2010
Best 5 Download Managers for Windows
Of course, nowadays, one might not ask why not just use a good Web Browser to download files. Well, Web browsers cannot split up downloads into segments or threads like Download managers. Hence, I tested some of the download managers to deliver this post on the Best or Top 5 Download Managers.
The test was based on the following features, I looked for.
- Resume support
- Mirror Search support
- Flash Video download
- Prioritised downloads
- Categories downloads
- Bandwidth allocation
- Browser Plug-in
- BitTorrent support
- Scheduler
- Remote access
Thursday, July 29, 2010
How to Resize a Hard Disk Partition
Windows doesn't allow you to resize or partition a drive without losing data. Fortunately, there is an Award-winning Freeware application called EASEUS Partition Master that allows you to resize, reorder, move & basically manipulate the free space in a partition, that too quite easily with the user-friendly graphical interface (GUI).Suppose you have enough unused free space inside a previously created partition (say D:\ drive) but you are running out of free space in another partition (say E:\ drive). Now, if you want to shift or move that free space from drive D:\ to E:\ or you want to make a new drive (say F:\) for that unused free space of D:\ drive, then you surely need this software.
Monday, July 26, 2010
How to Install Windows 7 from USB Drive
Bootable Non-Live way - Only for installation.
Here, I give a short & simple way to install Windows 7 into your system from a USB drive.The benefit you get with this native support for USB installation is that you can easily install Windows 7 on ultra portable machines & netbooks which don't have optical drives and at the same time, the speed you get while installing from a USB drive is much faster than installing it from an optical drive. So why not give it a try.
Follow the following steps to start off:
Here, I give a short & simple way to install Windows 7 into your system from a USB drive.The benefit you get with this native support for USB installation is that you can easily install Windows 7 on ultra portable machines & netbooks which don't have optical drives and at the same time, the speed you get while installing from a USB drive is much faster than installing it from an optical drive. So why not give it a try.
Follow the following steps to start off:
The Correct Definition of a Laptop has changed
Ya, you read it correctly, the proper definition of a Laptop has come a long way & it's incomplete now to consider them just a Laptop anymore.
Bit confused, actually today, here, I will show you a lowdown on
Portable computer Form-Factors:-
Saturday, July 17, 2010
Hacking FAQs
I get a lot of emails about hacking & it is hard for me to answer each question frequently. So I have organized some of the most Frequently Asked Questions (FAQs) about Hacking this time.
- What is 'Hacking'?
- Who is a 'Hacker'?
- What is the Hacker Terminology?
- How do I hack?
- What do I need to be able to hack?
- What is The Hacker Toolbox?
- How do I secure my computer from being hacked?
What is 'Hacking'?
Computer hacking is the process of changing computer software & hardware to do something outside of the original vendor’s purpose. Hacking is an art of exploiting loopholes/bugs in a software/module
Who is a 'Hacker'?
Many people believe that hackers are computer criminals. They don't recognize the fact that criminals and hackers are different & Media is responsible for this. Actually Hackers are good and extremely intelligent people who use their knowledge in a constructive manner to help organizations, companies, government, etc. to secure secret information on the net. Hackers are the one who like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they were not intended to do.
What is the Hacker Terminology?
Since hacker terminology changes lot over a period of time some of the terminologies here may not still be relevant when they are being used. Inspite of this, most of the terminology will stay and only change slightly if it does.
- Hacker: Person who modifies something to perform in a way that was different than it was made for.
- Cracker: Who break into a computer system for an offensive purpose, e.g. defacement. A cracker is a hacker.
- Ethical Hacker: People who hack into systems for defensive purposes.
- White hat hacker: People with defensive security intentions, similar to ethical hacker. White hat hackers existed before ethical hackers.
- Black hat hacker: A hacker with malicious or offensive intentions.
- Gray hat hacker: Combination of white and black hat hackers. White hats are technically gray hats because black hat hackers can use the tools that white hats use.
- Vulnerability: A weakness of a system that could lead to compromised security. Somebody may write a script to exploit this vulnerability.
- Exploit: A defined method of hacking vulnerability.
- Black Box Attacks: Security testing with no knowledge of network infrastructure, e.g. attacking a company from the net.
- White Box Attacks: Security testing with full knowledge of the network infrastructure.
There's no easy way to hack. Read any information you can find on hacking. Read hacking forums & check out hacking websites. Learn a programming language like C++. Get a book like Hacking for Dummies which will teach you a lot. The best way to start hacking is to teach oneself !!!!
What do I need to be able to hack?
You need to understand how computer's operating system works, networks & protocols works, security settings and general PC knowledge. After this you need hacking tools which help you to hack.
What is The Hacker Toolbox?
Apart from their own ingenuity, the main resource hackers rely upon, is computer code. While there is a large community of hackers on net, only some hackers actually program code. Many hackers download code written by other people. There are different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations — once a skilled hacker knows how a system works, he can design programs that exploit it.
Malicious hackers use programs to:
- Log keystrokes: These programs allow hackers to review every keystroke a computer user make.
- Hack passwords: There are many ways to hack someone’s password, from educated guesses to algorithms that generate combination of letters, numbers and symbols.
- Infect a computer or system with a virus: A hacker might install a virus by infiltrating a system, but it is much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages.
- Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. Another way a hacker might gain backdoor access is to infect a system with a Trojan horse.
How do I secure my computer from being hacked?
The best way is to having a basic knowledge of computer security and related topics such as Virus, Trojans, spyware, phishing etc. is more than enough to secure your computer. Install a good antivirus like Kaspersky and a firewall.
Friday, July 9, 2010
Error Report
Oops Something Went Wrong !!!
A new Bug has been found.
Error: 005X26AF3H Invalid Redirection
I will try to fix the problem.
Please try again later...
Click here for Technical details
Go Back to Homepage
![]() |
| Abhinav the Prince |
Subscribe to:
Comments
(
Atom
)



