Showing posts with label WhtasNew !!. Show all posts
Showing posts with label WhtasNew !!. Show all posts

Thursday, 4 June 2015

Commands That Every Windows User Should Know 2015

Commands That Every Windows User Should Know 2015


When you enter �services.msc� and press the Enter button, it will open up the Windows Services app where you can easily start, stop and configure other settings for each and every service individually. It�s quite helpful when you want to toggle a service.
services.msc run command
Entering �mstsc� into the Run dialog box opens the Remote Desktop Connection app which allows you to connect to another Windows computer over the local network or through the Internet. This helps you to use the host computer as if your own.
mstsc run command

If you want to quickly get your system information, then the �msinfo32? command is the way to go. At a glance, it will display all the system details including the hardware resources and software environment.
msinfo32 run command
This command opens the Backup and Restore window which allows you to quickly set a backup schedule or restore any of your previous backups.
The Computer Management app is where you can access almost all the advanced Windows modules like Event Viewer, Shared Folder, System Tools, etc.
compmgmt.msc run command
This command allows you to open the Windows Disk Cleanup utility. Once opened, simply select the drive your want to clean up and click on the �Ok� button.
cleanmgr run command
Windows Event Viewer is where Windows stores all the monitoring and troubleshooting messages. You can use this command to quickly access the Event Viewer application.
Every Windows user knows a thing or two about the Windows Control Panel, and using this command, you can quickly access the Control Panel with some stumbling around.
Microsoft Management Console (MMC) is an advanced Windows module which is mainly aimed at system administrators and power users as it sports all the tools required for configuring and monitoring a Windows system.
Whenever you want to check how your system resources are being utilized, simply use this run command, and it displays everything from your CPU to Dist to Network.
resmon run command
Want to quickly change your screen resolution? Simply enter this command in the Run dialog box and you are good to go.
Snipping tool is a very useful tool if you want to take quick snapshots. This lightweight tool even comes with its own basic image editor so that you can make necessary modifications to the snapshot.
Access the Windows Task Manager by right-clicking on the taskbar and selecting the option �Task Manager.� But another quick way is to type this command in the Run Dialog box.
Mouse properties are generally buried deep inside the Windows Control Panel, but you can easily access the same using this Run command.
main.cpl run command
Problem Steps Recorder (PSR) is a great utility to record and show a certain problem in Windows. Just use this simple command to access the tool.
psr run command
If you�ve installed Chrome or Firefox, you can easily launch those programs by entering these commands. Of course, you can launch any registered Windows program this way (ex: notepad).
Using this simple Run command, you can access the Windows Action Center without stumbling around or messing with the Windows Control Panel.
That�s all for now, and hopefully that helps. Do comment below sharing or discussing your favorite Windows Run commands.

More At - TekGyd- faceboook hacks
Read more...

10 ways to improve your Wi-Fi Performance 2015

10 ways to improve your Wi-Fi Performance 2015
Wireless networking can be more temperamental than the average British summer. A number of factors can reduce your wireless network's speed, which impedes streaming, online gaming, download times and web browsing.
10 ways to improve your Wi-Fi Performance 2015

But unlike the weather, there's more that you can do than merely moan about your network performance - in fact, there are many ways you can look at improving it. Here are ten suggestions for how you can get a faster wireless network, from tweaking your existing setup to looking at hardware upgrades.
new router
It sounds obvious that a more up-to-date router will be faster, but you may be unaware of how old and over-the-hill your existing networking kit is. A really old ISP-supplied router might be stuck on the ancient and painfully slow 802.11g standard, with a single antenna, and not enough processing capability to handle multiple devices at once.
All ISPs provide you with a router or modem when you sign up, usually with wireless capability. They're never usually that great, and replacing it with a new model could provide a significant boost to speeds.
Of course, this means reaching for your wallet. If all you want is better speeds for streaming YouTube videos or browsing, you certainly don't need the most expensive and feature-packed wire-less router you can find.
But you might not need to spend anything. If your ISP supplied your router, give them a call and see if they'll upgrade it for free. You might just be in luck.
router upgrade
If you want the fastest possible download speeds and the lowest latency when playing online games, a new router that supports 802.11ac, the latest wireless networking standard, is probably the best upgrade you can implement.
802.11ac means speeds roughly between two and five times faster than 802.11n. It significantly increases the amount of data that can be squeezed into each channel to 433Mbit/sec, with most routers capable of three streams, theoretically for total speeds up to 1300 Mbit/sec.
It also introduces Beamforming, a technology that calculates the rough position of connected computers and increases power in that direction, which can improve connectivity.
A major caveat though is that to see these speeds, your computer, smartphone or tablet will also need to support 802.11ac. The majority of the newest gadgets do, but if you have an older laptop, you'll need to buy a wireless dongle that supports 802.11ac, which you can just plug into a USB port.
802.11ac routers can be quite expensive, and the dongle is an additional cost on top. The cheaper routers retail for around �80 new (around $125, AU$160), but a second-hand router can be a lot less, and still offer a huge performance leap over older technology.
powerline
Why rely on wireless alone? If you're stretching a wireless signal from one end of the house to another, speeds are guaranteed to suffer. Powerline Ethernet means network data travels between computers over the electricity circuit in your home, offering potentially faster speeds than even the best wireless technology - and this complements, rather than replaces, your wireless network.
Modern Powerline Ethernet adaptors offer close to 1Gbit/sec speeds (500Mbit/sec each way). You'll see excellent latency times, and streaming video from a NAS will be beautifully quick.
But as with wireless, extra-long distances can affect performance, while the wiring in your home and interference from other devices can also reduce speeds.
Powerline Ethernet adaptors are a fixed, wired networking technology, which is great for stretching them to a desktop PC in the office, but no use for a tablet. Some products now solve this problem with built-in wireless capability at one end of the Powerline adaptors, offering a neat way to extend wireless coverage at the same time.
network bridge
A bridge is a repeater that extends the range of your wireless network. It copies all the settings, uses the same network name and password and dishes out IP addresses to clients from the same DHCP server.
For devices connecting to your wireless network, the bridge will be effectively invisible - all they will see is a single SSID. And you can use multiple bridges to extend the wireless network further. They're used extensively in hotels, large campuses or anywhere offering a single wireless network to users over a large area, and they work just as well in homes.
You can have both wired or wireless bridges. A wired bridge will be faster but is yet another device to rely on your wireless network. Consider combining a bridge with Powerline Ethernet (discussed in the last slide) to bring a solid wireless connection to another room.
repositioning
An obvious sounding adjustment you can make is to move your wireless router. Radio waves travel in a straight line from router to client device, and can be picked up from anywhere in a rough circle emanating from the router.
You should get better speeds around your home if the router is placed in a more central location.
Often, a modem or router will be gathering dust on the floor, right next to a telephone or cable point on an external facing wall, which is great for wireless speeds in the front garden, but not so good for upstairs back rooms. However, note that long telephone cables for DSL connections will degrade the signal.
change network channel
Buried in your router's built-in configuration software will be a set of options to configure your wireless network. Adjusting one of these settings, the wireless channel, can make a noticeable difference to your speeds. They're labelled between 0 and 13 and represent small differences in the exact wireless frequency your router uses.
You'll need to know the login details for your router's software, which are probably on a sticker underneath it. Every router is different, so we can't tell you exactly where to find the wireless channel setting, but it's often under an Advanced header in the Wireless menu.
In a built-up urban area, there are likely to be dozens of wireless networks in range of your computer, and the majority of these will be competing for space in the 2.4GHz radio spectrum.
The best thing to do is try a bit of trial and error, but you can check the congestion of any given channel by analysing the nearby wireless networks. A nifty piece of Windows software called InSSIDer (from Metageek) can be used for this, while on a Mac an app called Netspot will do the same thing.
It's worth looking at these settings anyway. If the option is set to automatically choose a channel, the router can change this while it is on sometimes, causing havoc for some devices that are currently connected. Changing to a fixed channel may help with stability.
Image Credit: Micjeyjaeer (Own work) [CC BY-SA 3.0], via Wikimedia Commons
5ghz
All 802.11n routers can operate at 2.4GHz, but most models now offer 5GHz as well. 5GHz is much faster than 2.4GHz, but you lose some range with it, with a sharp cut-off point beyond around 10 metres.
It's worth checking if switching your wireless network to 5GHz improves speeds. Once again, log in to your router's software and have a poke around the wireless settings.
It's important to note that many routers can output a network at 2.4GHz or 5GHz, but not both at once, although there are some exceptions. More often than not, routers can have two wireless networks, one at 2.4GHz, one at 5GHz, with two separate network names.
And as with 802.11ac, your computer needs to support the higher frequency, which is not entirely guaranteed.
QOS
If you have a lot of wireless devices, in a family home for example with multiple laptops, tablets and smartphones, when everyone is using the internet, things can get congested. A large file download can make it difficult for another user to stream video reliably, off iPlayer for example.
Instead of having a huge argument, you can avoid the potential need for counselling in later life by managing your bandwidth through a router's QoS (quality of service) function.
This can be a bit tricky to get right. It lets you prioritise certain applications on the network, and ensure they'll never be completely starved of bandwidth if another computer is using the connection.
You'll need to know your way around your router's software for this. First you need to switch each computer or device that will be included in the QoS list to a static (fixed) IP address. This will be in one of the Advanced Networking menus.
The exact way the QoS page is designed will vary greatly from router to router - but you should be able to create a list of the devices you wish to include, with the most important ones at the top, which are always reserved spare bandwidth when they use the connection, and other, less important devices, towards the bottom.
Likewise with applications, the priority goes to the port number and data type. Most QoS pages have presets for popular applications, but you might need to find out what port a certain game or application uses.
file sharing
File-sharing applications (particularly torrents) rely on both downloading and uploading to share files. If a computer is sharing and uploading torrents at full speed it is probably gobbling up all the available bandwidth. This will make it impossible to request web pages or do much else.
If you or another user does run one of these programs, then set the upload bandwidth to 1KB/sec, create an application rule for it in your router's QoS settings, and whenever possible, shut the application down rather than let it run in the background.
Guest network
Not every device in your home needs to run off wireless. The fewer devices that compete for wireless bandwidth, the better. For example you might have a games console and a TV streaming gadget like an Apple TV in the living room.
A long cable or a Powerline Ethernet adaptor and a network switch will mean both are guaranteed good network speeds and no longer compete for the same precious wireless bandwidth as the tablet, laptop or smartphone.
Enjoy !! :)
Read more...

Wednesday, 3 June 2015

How to Hack a Computer Using Just An Image 2015

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view � it might hack your machine.


Yes, the normal looking images could hack your computers � thanks to a technique discovered by security researcher Saumil Shah from India.

Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.

Just look at the image and you are HACKED!


Shah demonstrated the technique during a talk titled, "Stegosploit: Hacking With Pictures," he gave on Thursday at the Amsterdam hacking conference Hack In The Box.

According to Shah, "a good exploit is one that is delivered in style."

Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.

To do so, Shah used Steganography � a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here's How to Hack digital pictures to send malicious exploits:


Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it's true purpose.

Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Pornand much porn.

However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image�s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The "Secret Sauce" behind Stegosploit � this is what Shah calls it.


"I don�t need to host a blog," Shah told Motherboard, "I don�t need to host a website at all. I don�t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate."
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image�s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.


Video Demonstration:


Shah demonstrated to Lorenzo Franceschi of Motherboard exactly how his hack works. He used Franceschi�s profile picture and then prepared a demonstration video using his picture as the scapegoat.

In the first video presentation, Shah shows a step by step process on how it is possible to hide malicious code inside an image file using steganography technique. You can watch the video given below:



In the second video, Shah shows how his Stegosploit actually works. His exploit works only when the target opens the image file on his or her web browser and clicks on the picture.

You are HACKED!

Once the image is clicked, the system�s CPU shoots up to 100 percent usage, which indicates the exploit successfully worked. The malicious code IMAJS then sends the target machine�s data back to the attacker, thereby creating a text file on the target computer that says � "You are hacked!"



Shah also has programmed his malicious image to do more stealthy tasks, like downloading and installing spyware on victim�s machine, as well as stealing sensitive data out of the victim�s computer.

The bottom line here is:


You should not presume the image files as "innocent" anymore, as they can hide malicious code deep inside its pixels that could infect your computers.

Therefore, always make sure before you click on one.


Shah has been working on the research [PDF] during his spare time for almost five years, but he has not tested his technique on popular image sharing websites like Dropbox or Imgur. He also admitted that his method might not work everywhere.

SOURCE- THEHACKERNEWS
Read more...

Monday, 1 June 2015

How To Run Large Games Without Graphics Card 2015

Play Games Without Graphics Card 2015

Run Large Games Withou Graphics Card

 1.) Using 3D-Analyze

  1. First of all Download the 3D analyze.
  2. Now install and run the 3D analyze.
  3. Now click on select option as below and then a window opens where you have to select the exe file of the game which you wants to run.
  4. Now you can see names, vendorID and deviceID of different graphics cards. Select any one of them and enter the VendorID and DeviceID in the column at the left side.
  5. Just click on Run button 

2.) Using SwiftShader

  1. First of all download the SwiftShader.
    Download Swiftshader 3.0 for x86bits
    Download Swiftshader 3.0 for x64bits
  2. Now extract the zip file of SwiftShader.
  3. Now copy d3d9.dll file from the extracted folder.
  4. Paste the d3d9.dll file to the game�s directory.
  5. Just click on exe file of your game where you placed the d3d9.dll file 
If You Have Any Query About This Article Please  Comment Below :) Enjoy !!

Read more...

Wednesday, 13 May 2015

CHIP � The World's First $9 Computer !!

Wait! What? A $9 computer? This is something magical.

A Californian startup lead by Dave Rauchwerk is currently seeking crowdfunding on Kickstarter to create a computer that will cost as much as $9 (or �6).


The new microcomputer, dubbed CHIP, is a tiny, Linux-based, super-cheap computer that's described as being "built for work, play, and everything in between!"

Project 'Chip' that hit Kickstarter on Thursday has already blown its target goal of $50,000 to raise over $1 Million from almost 19,638 people at the time of writing with 26 days left in its campaign.

Let�s have a look on what does this $9 buy you?


And the answer is a lot � more than what you could expect for just $9.

CHIP packs a 1GHz R8 ARM processor, 4GB of internal flash storage, 512MB of DDR3 RAM, Bluetooth, and Wi-Fi � something you do not find in even the modern microcomputer, Raspberry Pi.

If look at the output front of the CHIP, it features a single full-sized USB port, headphones output, microphone input, a composite video output (with options for VGA and HDMI via an adapter) that even supports older televisions, and a micro USB that supports OTG.

You just have to attach this Raspberry Pi-based motherboard to a mouse, keyboard, or game controller for more functionality or connect to a monitor via an adapter for VGA or HDMI cables.

A whole lots of applications


chip-smallest-computer
The CHIP can access thousands of open source applications such as Chromium for browsing the Web, LibreOffice for editing documents and spreadsheets, VLC Media Player for playing audios and videos, and other programs for coding, torrenting, and photo editing, among others.

You can even download additional applications and programs as long as you do not run out of memory.

The CHIP is the second project Next Thing Co. has crowdfunded via Kickstarter. The company�s first project funded was a digital camera known as Otto powered by the Raspberry Pi.

The idea behind the CHIP is to put this super-cheap computer into the hands of as many people as possible including students, teachers, makers, hackers, grandparents, children, and inventors to surf the Internet, play games, save documents and do other computer things � all for $9.

Book your CHIP Now


The CHIP is scheduled to ship out to backers in December of this year, with worldwide availability expected to ship in May 2016 if everything goes according to plan.

If you are interested to have one, you can pre-order the basic CHIP at $9 over at Kickstarter. Moreover, interested backers are left with 26 days to join the $9 computer movement.

Like Us On Facebook

Read more...

Sunday, 10 May 2015

Android M - Latest Google Android OS to be Unveiled This Month !!

While majority of smartphone users are waiting for Android 5.0 Lollipop update for their devices, Google is soon going to launch the next version of Android at its official Google I/O 2015 developer event May 28 in San Francisco.


Android M � The name of the latest version of Android mobile operating system was spotted at the Google I/O 2015 schedule under the "Android for Work Update" Session, which says�
"Android M is bringing the power of Android to all kinds of workplaces."
According to the company, this will open up "huge new markets for hundreds of Millions of devices to workers at small businesses, logistics, deskless workers, and warehousing jobs."
However, Google appears to have since removed any mention of Android M from Google's I/O website, most probably the company wants to keep it as a surprise for Android users.

Considering the full Android releases with starting letters in alphabetical order, � Android M � strongly believes to be the next version of the Android operating system.

When the Google launched Android 5.0 at its developer conference last year, it was known by the name "Android L" before the company revealed its final name "Lollipop" months later.

Some More highlights:


The schedule also includes another session "Voice Access" known as "Your app, now available hands-free," which suggests that Google wants its users to control every feature of Android apps by their own Voice Command.
As the Voice Access session says, "In this talk, we introduce Voice Access, a service that gives anyone access to their Android device through voice alone."
The main highlights of the Google I/O schedule are yet Android M, which will eventually get some sweet sugary name too like all the previous versions of Android OS.

Till then, What do you think the "M" will stand for? Will it be Mousse, Muffin, or something else?
Read more...

Monday, 4 May 2015

21 Things you can buy for the same price to a gold apple watch

There are often debates over the price of Apple products and new technology in general, but no piece of technology has more skepticism around it�s price tag right now than the Gold Apple Watch.
Considering that some of these gold watches have broke the $20,000 mark, it�s apparent why the skeptics have popped up. So is it worth it? And what would you have to sacrifice to buy one of these little pieces of technological gold?
This beautifully laid out infographic is going to show you 21 things you could get for the price of one Gold Apple Watch. Some of these are just for fun, but many of these can give you a realistic idea of the trade-off you would be making by purchasing one of these watches.
You�ve got to make the ultimate decision to buy or not to buy, but once you see these 21 alternatives, the decision should be a little clearer.
So would you rather have a Gold Apple Watch, a daily pizza or 19 dalmatians? The choice is yours, my friend. Sure, these watches are pretty amazing, but so is a 6 year membership to Equinox gym. Which one would benefit you more?
Perhaps you could use a newer car or a wedding dress (though you probably wouldn�t need 13).
You might not even be considering purchasing a $20,000 watch, but why not do a cost comparison with every large purchase? Next time you spend over $500 (or whatever you consider a large purchase), write a list of 10 things you could buy instead of that item. Make sure they are 10 things that you want and you might be surprised to find that your money is better spent elsewhere.
Read more...