If anybody wants to learn computer networking, he needs more than one computer. So that maximum learner can’t practice in home. VMware provide them virtual machine. A user can use or run several virtual machine at a time. Each machine behaves like an individual computer. We can use those machines and can practice networking in home. This is the best software I ever had.
How to use VMware?
At first you have to setup VMware workstation. Then you have to create a virtual machine.
You have to choose New virtual machine to create a virtual machine.
RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access and organization. With each item completely customizable there is no end to what you can add and launch from the dock.
Now with added Taskbar support your minimized windows can appear as icons on the dock. This allows for better productivity and accessibility.
Features:
Minimize windows to the dock
Real-time window previews in Vista
Running application indicators
Simple drag-n-drop interface
Multi-monitor support
Supports alpha-blended PNG and ICO icons
Icons zoom and transition smoothly
Auto-hide and Popup on mouse over
Positioning and layering options
Fully customizable
Completely Portable
ObjectDock Docklet support
Compatible with MobyDock, ObjectDock, RK Launcher, and Y'z Dock skins
Runs great on slower computers
Unicode compliant
Supports many languages and can easily be translated
A friendly user base :)
And best of all... its FREE!!!
If you want to check it out here download link RockDock
JDownloader is open source, platform independent and written completely in Java. It simplifies downloading files from One-Click-Hosters like Rapidshare.com or Megaupload.com - not only for users with a premium account but also for users who don't pay. It offers downloading in multiple paralell streams, captcha recognition, automatical file extraction and much more. Of course, JDownloader is absolutely free of charge. Additionally, many "link encryption" sites are supported - so you just paste the "encrypted" links and JD does the rest. JDownloader can import CCF, RSDF and the new DLC files.
JDownloader - a program designed to download automatically without entering a code with the most popular sharing services, even without GOLD / premium account. JDownloader automatically detects the control tests, supports multi-threaded downloading, automatically extracts files from archives, etc.
Just right click and copy link to download a file. You should not have to past or add it add those file automatically and cheak online status.
To began ........... Right Click the link and continue....................
It’s very simple all you have to do is use proxy in your browser setting and start browsing.
·Use IP address – This is the simplest way to bypass domain name based access restrictions.
·Use Google cache – If you are not bothered whether the content is latest on a site, Google cache is best. Do a Google search for the site and then click on the cached link below the search results.
·Use an Anonymizer – In this method you access a third party site which in turn routes your request to the required server. Some services provide URL encryption also. The problem is that most of these servers are no longer free. Do a Google search for the latest list as this is a very dynamic area.
·Use Online Translation Tools – In this method, we can use the translation service as a web proxy. Following are the best links I know of. Again Google is your best friend for more resources.
·Use Google Mobile search – Google mobile search works, but output may not be optimal. This is very similar to using a Web proxy.
·Use a public Proxy server – There are many free proxy servers out in the Web. Note that in order to use these you have to change internet connection settings in Internet Explorer or whatever browser you use.
·Get web pages via email – This is useful if you need a single Web page. Obviously accessing large files is not possible.
·Use Tor Distributed Proxy – Tor is an advanced proxy server using multiple anonymous servers for a single Web request. This requires an application to be downloaded and installed.
·Your own proxy server– This is an advanced technique and is probably the best. This requires your own proxy server hosted either at your home or at a hosting service provider. You can enable SSL encryption and prevent any snooping on the content as well. Also put some access control, otherwise someone can find the service and misuse it.
·Use alternate content providers – When everything fails, you can use alternate service providers. For example if Gmail is blocked at your place, you can take another obscure mail address and enable email forward at Gmail.
We can also banned from our security settings for own PC. First we can select Internet option of the browser.
Forensic Investigation: A forensic investigation is the search out of lawfully analyzing available, deleted, or "hidden" information and establishing evidence and facts that are to be presented in correct inlaw. The investigation is established by a forensic investigator. Forensics is a highly specialised career and there are only a few employment opportunities in the occupation.In modern times, the term is used for nearly all investigations and the ranging from computer or internet crimes to murders. This is may be a part of science relating legal evidence that is found in digital storage mediums as in computers and using internet. This field of forensic investigation has several areas including database forensics, firewall forensics, using cookie, URL history and Internet temporary files etc.
Forensic investigation provides:
ØTo retrieve deleted computer files
ØThe web sites that have been visited
ØThe files what have been downloaded
ØWhen files were last accessed
ØDetermination of when files were deleted
ØDiscovery of faxes or email messages and attachments sent or received.
The OS is a computer software that controls the execlution of computer programs and which may provide scheduling, debugging, I/O control, accounting, compilation, storage assignment, data management and related service.(American National Standards Institute (ANSI))