2

VMware............. Networking practice tools .............


If anybody wants to learn computer networking, he needs more than one computer. So that maximum learner can’t practice in home. VMware provide them virtual machine. A user can use or run several virtual machine at a time. Each machine behaves like an individual computer. We can use those machines and can practice networking in home. This is the best software I ever had.


How to use VMware? 

At first you have to setup VMware workstation. Then you have to create a virtual machine.
 

You have to choose New virtual machine to create a virtual machine. 


Then another window arrived and showed welcome to the new virtual machine wizard
 Click Next
 Click Next

  Click Next


  Click Next
  Click Next
  Check Power on the virtual machine after creation Click Finish
 Then setup like all windows
Then you get your individual virtual machine

The main disadvantage of VMware is, you machine should have at least 1GB ram and Pentium 4




0

RoketDock ...................





RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access and organization. With each item completely customizable there is no end to what you can add and launch from the dock.
Now with added Taskbar support your minimized windows can appear as icons on the dock. This allows for better productivity and accessibility.

Features:

  • Minimize windows to the dock
  • Real-time window previews in Vista
  • Running application indicators
  • Simple drag-n-drop interface
  • Multi-monitor support
  • Supports alpha-blended PNG and ICO icons
  • Icons zoom and transition smoothly
  • Auto-hide and Popup on mouse over
  • Positioning and layering options
  • Fully customizable
  • Completely Portable
  • ObjectDock Docklet support
  • Compatible with MobyDock, ObjectDock, RK Launcher, and Y'z Dock skins
  • Runs great on slower computers
  • Unicode compliant
  • Supports many languages and can easily be translated
  • A friendly user base :)
  • And best of all... its FREE!!!
 If you want to check it out here download link  RockDock

It also support in windows 7
0

The Best Downloader for download a link like rapishare, hotfile etc.

 


JDownloader is open source, platform independent and written completely in Java. It simplifies downloading files from One-Click-Hosters like Rapidshare.com or Megaupload.com - not only for users with a premium account but also for users who don't pay. It offers downloading in multiple paralell streams, captcha recognition, automatical file extraction and much more. Of course, JDownloader is absolutely free of charge. Additionally, many "link encryption" sites are supported - so you just paste the "encrypted" links and JD does the rest. JDownloader can import CCF, RSDF and the new DLC files.






JDownloader - a program designed to download automatically without entering a code with the most popular sharing services, even without GOLD / premium account. JDownloader automatically detects the control tests, supports multi-threaded downloading, automatically extracts files from archives, etc.


Just right click and copy link to download a file. You should not have to past or add it add those file automatically and cheak online status.


To began ........... Right Click the link and continue....................

The Download link jdownloader 0.9.999(portable)
0

How to visit a banned website ..............


It’s very simple all you have to do is use proxy in your browser setting and start browsing.
·         Use IP address – This is the simplest way to bypass domain name based access restrictions.
·         Use Google cache – If you are not bothered whether the content is latest on a site, Google cache is best. Do a Google search for the site and then click on the cached link below the search results.
·         Use an Anonymizer – In this method you access a third party site which in turn routes your request to the required server. Some services provide URL encryption also. The problem is that most of these servers are no longer free. Do a Google search for the latest list as this is a very dynamic area.
·         Use Online Translation Tools – In this method, we can use the translation service as a web proxy. Following are the best links I know of. Again Google is your best friend for more resources.
·         Use Google Mobile search – Google mobile search works, but output may not be optimal. This is very similar to using a Web proxy.
·         Use a public Proxy server – There are many free proxy servers out in the Web. Note that in order to use these you have to change internet connection settings in Internet Explorer or whatever browser you use.
·         Get web pages via email – This is useful if you need a single Web page. Obviously accessing large files is not possible.
·         Use Tor Distributed Proxy – Tor is an advanced proxy server using multiple anonymous servers for a single Web request. This requires an application to be downloaded and installed.
·         Your own proxy server– This is an advanced technique and is probably the best. This requires your own proxy server hosted either at your home or at a hosting service provider. You can enable SSL encryption and prevent any snooping on the content as well. Also put some access control, otherwise someone can find the service and misuse it.
·         Use alternate content providers – When everything fails, you can use alternate service providers. For example if Gmail is blocked at your place, you can take another obscure mail address and enable email forward at Gmail.


We can also banned from our security settings for own PC. First we can select Internet option of the browser.
0

Forensic investigation ..................


Forensic Investigation: A forensic investigation is the search out of lawfully analyzing available, deleted, or "hidden" information and establishing evidence and facts that are to be presented in correct inlaw. The investigation is established by a forensic investigator. Forensics is a highly specialised career and there are only a few employment opportunities in the occupation.In modern times, the term is used for nearly all investigations and the ranging from computer or internet crimes to murders. This is may be a part of science relating legal evidence that is found in digital storage mediums as in computers and using internet. This field of forensic investigation has several areas including database forensics, firewall forensics, using cookie, URL history and Internet temporary files etc.

Forensic investigation provides:
Ø  To retrieve deleted computer files
Ø  The web sites that have been visited
Ø  The files what have been downloaded
Ø  When files were last accessed
Ø  Determination of when files were deleted 
Ø  Discovery of faxes or email messages and attachments sent or received.

0

The encryption Mathod of windows xp................

Encryption: In windows XP have file and folder security policy called encryption mathod. It secured a file from other users.


The process of encryption :-


 
1)      Select a file to encrypt and go to its properties.

 
Figure: Properties of selected file or folder




 
2.    On the General tab, click the Advanced button. Select the Encrypt contents to secure data check box, and then click OK.




Figure: Advance attributes
 

 
3.    In the Encryption Details dialog box, click Add to add a user from the local computer or from Active Directory.



2.    In the Select Users dialog box, click the user’s certificate, and then click OK.

Figure: user selection

 


0

What is a operating System?

The OS is a computer software that controls the execlution of computer programs and which may provide scheduling, debugging, I/O control, accounting, compilation, storage assignment, data management and related service.(American National Standards Institute (ANSI))