Saturday, August 17, 2013

Error Codes

100 Continue 
101 Switching Protocols 
200 OK Action completed successfully
201 Created Success following a POST command
202 Accepted The request has been accepted for processing, but the processing has not been completed.
203 Partial Information Response to a GET command, indicates that the returned meta information is from a private overlaid web.
204 No Content Server has received the request but there is no information to send back.
205 Reset Content
206 Partial Content The requested file was partially sent. Usually caused by stopping or refreshing a web page.
300 Multiple Choices
301 Moved Permanently Requested a directory instead of a specific file. The web server added the filename index.html, index.htm, home.html, or home.htm to the URL.
302 Moved Temporarily
303 See Other
304 Not Modified The cached version of the requested file is the same as the file to be sent.
305 Use Proxy
400 Bad Request The request had bad syntax or was impossible to be satisified.
401 Unauthorized User failed to provide a valid user name / password required for access to file / directory.
402 Payment Required
403 Forbidden The request does not specify the file name. Or the directory or the file does not have the permission that allows the pages to be viewed from the web.
404 Not Found The requested file was not found.
405 Method Not Allowed
406 Not Acceptable
407 Proxy Authentication Required
408 Request Time-Out
409 Conflict
410 Gone
411 Length Required
412 Precondition Failed
413 Request Entity Too Large
414 Request-URL Too Large
415 Unsupported Media Type
500 Server Error In most cases, this error is a result of a problem with the code or program you are calling rather than with the web server itself.
501 Not Implemented The server does not support the facility required.
502 Bad Gateway
503 Out of Resources The server cannot process the request due to a system overload. This should be a temporary condition.
504 Gateway Time-Out The service did not respond within the time frame that the gateway was willing to wait.
505 HTTP Version not supported 

Friday, August 16, 2013

INTERNET ERROR CODES & THEIR MEANING:

In the following sections you will find Internet error codes and meaning. Moreover, you are able to solve the solution if you know the total meaning of this type of error messages. Let's discuss the Internet error codes and meaning:

Internet Error Code: 400
This type of error code refers bad request error. If you type wrong URL then this type of error message appears. To solve this error message, you should firstly check whether you are typing wrong URL name and type the correct URL so that server could understand your request.

Internet Error Code: 401
When you are trying to open any unauthorized access on any site or web-page or blog, you will find this type of error. To solve this type of error, you have to check your username and password if you are trying to open any webpage or blog.

Internet Error Code: 402
This is payment required error. If you forget to pay your monthly Internet usage bill or any other service related bill, you may find this type of errors. To solve this type of error, you have to pay the service provider.

Internet Error Code: 403
This error is occurred when you are trying to open any forbidden page and you are blocked by that domain.

Internet Error Code: 404
During the time of Internet browsing, if some page or link is missing then this type of error occurs. If you are trying to open the web page that was removed or re-named this type of error also occur. Actually there is no solution of this type of error because all things are maintained to particular webmaster to their own website. But you may check the URL spelling whether the page is actually exists or not.

Internet Error Code: 408
This type of error occurs due to time out. When the server are not able to deliver your request this type of error occurs. To solve this type of error, you should send the request with in time that the server set for you


Enjoy

CRACK BIOS Password :

1.Open CPU Cabinet
2.Remove CMOS (silver) Battery
3.after 2 minutes 4.place the Battery agin.


Enjoy

Tuesday, August 6, 2013

How To Create Undeletable And Unrenamable Folders ?


  •      Go to Start and then Click on Run
  •      Type cmd & hit enter (To open Command Prompt ).
  •     Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  •      Type D: or E: and hit enter
  •      Type md con\ and hit enter (md - make directory)
  •      You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  •      Open that directory, you will see the folder created of name con.
  •      Try to delete that folder or rename that folder windows will show the error message.


How to delete that folder ?
It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.

  •      Open Command Prompt
  •      Type D: ( if u created this type of folder in D: drive) & hit enter
  •      Type rd con\ (rd - remove directory)
  •      Open that directory and the folder will not appear because it is removed.

Enjoy


If your Pen Drive File Transfering speed is slow here is the way to speed up the coping files on pen drive

> Connect your pen drive
> go to "my Computer"
> Right Click on "Removable device" which is your Pen Drive letter
> Now Select the Last Option that is "Properties"
> Go to "Tools" option
> Select "check disk error" and Click OK
> Now Again Right Click on your Pen drive and Select "Format" option
> Click on "Default value"
> uncheck (unmark) the "Quick Format" option
> Click on Format

Note: Plz wait as this will take some time to finished


Enjoy
1 gram of your DNA can store at least 716800 GB of Data! The average total mass of DNA in an adult human body is almost 60-70 grams which can store at least 50176000 GB of data. In sum, you are a huge portable naturally-made hard drive!

HOW TO SET ADMINISTRATOR PASSWORD IN WINDOWS WITHOUT KNOWING EXISTING PASSWORD.

1. GO TO CONTROL PANEL

2. CLICK ON " ANDMINISTRATIVE TOOLS"

3. NOW CLICK ON " COMPUTER MANAGEMENT "

4. NOW GO TO SYSTEM TOOLS

5. DOUBLE CLICK ON LACAL USERS AND GROUPS

6. THEN FINALLY UNDER USERS U WILL SEE ALL THE USER ACCOUNTS INCLUDING ADMIN ACCOUNT.

7. NOW RIGHT CLICK ON ADMINISTRATOR AND CLICK SET PASSWORD

8. IT WILL NOT ASK FOR PREVIOUS PASSWORD SO U DON'T NEED TO KNOW IT.

9. NOW ALL DONE..! !!

Top 10 Spam Attacks

Unsolicited commercial email has plagued users for so long that it is viewed as part of the online or email experience—as inevitable as rain, and just as irritating. This time-consuming annoyance has very few fans, especially considering the fact that, more often than not, it contains scams, bogus offers, and other fraudulent propositions. In any case, here are the top ten worst spam attacks that most anyone with an email account are familiar with:

1. Nigerian Scam Spam: These Nigeria-based con artists claim to be surviving spouses, businesspeople, government officials, or what-have-you requesting your help to assist them in paying "taxes" in order to access their money. In return, you'll be given a share of the "pot". Needless to say, this is all just a front to steal your money, personal credentials, and so forth.

2. Phishing Spam: Phishers have victimized millions of people by posing as legitimate institutions asking you to validate or confirm your bank account though a spam link. They typically send a URL to a rogue site that looks quite a lot like its genuine counterpart but is merely used for crafty identity and account theft.

3. Home-Based Jobs Spam: This is spam that promises home-based jobs that deliver instant pay for minimal work (e.g., craft assembly, envelope-stuffing, claims processing, and so on). However, these ads don't usually talk about the hidden costs and expenses on your part as well as the lack of tenure on these so-called professions.

4. Weight Loss Spam: These are unsolicited promotions for ineffective creams, patches, or pills that will purportedly help you lose weight without the need for exercise or diet; most if not all of these drugs are universally worthless.

5. Foreign Lottery Spam: This is an email that showcases phony foreign lotteries with enticing odds or a message that alleges that you've already won a contest you have no memory of joining in the first place. All you need to do to claim your prize is pay some special "fees" or send your contact details to the "contest officials".

6. Panacea Spam: Snake oil was once claimed a panacea, otherwise known as a cure-all. There's no such thing as a cure-all or miracle cure, so getting spam promoting such a product is dubious at best.

7. Check Overpayment Spam: This is an email response to your online auction posting or ad. The swindler, for whatever reason, writes a check for more than the amount of what you're selling, and requests you to give back the difference once you deposit the check. These checks are counterfeit, and by the time they bounce, you'll be the one accountable for the whole amount.

8. Pay-in-Advance Credit Offer Spam: You've been allegedly pre-qualified for a credit card or low-interest loan and you're required to pay a processing fee of hundreds of dollars to claim the offer. To be clear, any advanced payment fee for such a proposal is a rip off.

9. Debt Relief Spam: This spam promises you a way to consolidate your bills into one monthly payment scheme without the need to borrow money. However, these scams typically involve bankruptcy proceedings, which can negatively impact your creditworthiness in the long run.

10. Investment Spam: These emails promise investments with little or no risk and high rates of return profits. In reality, this is the type of con wherein the promoters get more out of the investment than the participants (e.g., a Ponzi scheme).



Enjoy

Top 10 Most Secure Operating Systems

The security of a given anything, even operating systems (OS), tends to be a difficult or even controversial issue to examine. The only, truly secure operating systems are those that lack contact to the outside world (e.g., a DVD player's firmware). As for any other OS, they'll inevitably have some sort of vulnerability or weakness that can be exploited. In fact, any networked OS can be exposed by careful abuse of its configuration—no exceptions. All the same, here are the top ten most secure operating systems on the planet today.

1. OpenBSD: By default, this is the most secure general purpose operating system out there. The proof in the pudding? The fact that it suffered only two remote attack vulnerabilities in the last decade serves as solid evidence of its stringent security and strict auditing policy. Moreover, OpenBSD lacks a large enough attack surface (care of running numerous web applications) for hackers to exploit.

2. Linux: Linux is a superior operating system. When customized it can be set up to extremely secure. Linux has an impressive vulnerability patching policy. 

3. Mac OS X: This Apple-made OS handles user permissions better than, say Windows XP, but it still contains an indecent number of vulnerabilities and remote exploits in its systems. That, coupled with Apple's slow response to many of its security issues, has landed this operating system at the bottom of this list.

4. Windows Server 2008: Say what you will about a Microsoft operating system's security; at the very least, they know how to improve and they've gone through the very worst security threats that the Internet can dish out. This iteration of Windows Server has improved backup and recovery, user account control, web server (IIS) role, and server role security configuration.

5. Windows Server 2000: This operating system is so secure that it took nearly a decade before Microsoft can come up with a better one. This OS for network servers, notebook computers, and corporate workstations continues to get monthly security patches even after nine years since its release.

6. Windows Vista: Microsoft attempted to fix the security issues that has plagued Windows 95, 98, ME, and XP, but they ended up alienating consumers instead. The main complaints that people aimed against the polarizing OS—confusing security policies and the lack of backward compatibility with older applications—were actually security measures that were supposed to make Vista a lot more protected from breaches and hacker penetrations.

7. Windows Server 2003: The good news is that Windows Server 2003 is still a more secure OS than Windows XP. The bad news is that, security-wise, it's even worse than its earlier prototype, Windows Server 2000. Nevertheless, it features competent security improvements like default disabling of vulnerable services and a built-in firewall.

8. Windows XP: It became one of Microsoft's greatest and most long-running releases (mostly because of Vista's failure to connect to the general Windows-using consumer base). Tragically, it's also one of the most non-secure operating systems of all time as well.Because this OS runs a lot of network services by default and allows users to access full privileges by default, it also gets hacked and breached on a nigh-daily basis by default as well.

9. HP-UX 11i: Even though it's not one of the most commercially successful operating systems in the market today, this Unix-based Hewlett-Packard OS has been included in this list because of its superior security policies to several more popular operating systems (namely, Mac OS X, Solaris, and Linux).

10. Solaris: This Sun Microsystems Unix-OS variant is on the lower notches of this article's security hierarchy because it's not inherently security-focused. Because of certain business-related circumstances as well, most of the Solaris source code has already been published via the OpenSolaris project.

Always install the latest patches for the Operating System that you are running.

Enjoy

Thursday, August 1, 2013

Enjoy


Samsung Chromebook: Unboxing & Review

New Samsung chrome book.


Samsung Chromebook: Unboxing & Review


Enjoy

Different Types of Processors

There are many different processors on the market. However, there are only a few that you should consider purchasing. Whether you're buying a computer off the shelf, building it from scratch or upgrading your CPU, you must put some time and thought into which processor to buy. The choice you make today will affect your computer's speed and functionality for years to come.

Types
There are two primary manufacturers of computer microprocessors. Intel and Advanced Micro Devices (AMD) lead the market in terms of speed and quality. Intel's desktop CPUs include Celeron, Pentium and Core. AMD's desktop processors include Sempron, Athlon and Phenom. Intel makes Celeron M, Pentium M and Core mobile processors for notebooks. AMD makes mobile versions of its Sempron and Athlon, as well as the Turion mobile processor which comes in Ultra and Dual-Core versions. Both companies make both single-core and multi-core processors.

Features
Each processor has a clock speed which is measured in gigahertz (GHz). Also, a processor has a front side bus which connects it with the system's random access memory (RAM.) CPUs also typically have two or three levels of cache. Cache is a type of fast memory which serves as a buffer between RAM and the processor. The processor's socket type determines the motherboard type where it can be installed.

Function
A microprocessor is a silicon chip containing millions of microscopic transistors. This chip functions as the computer's brain. It processes the instructions or operations contained within executable computer programs. Instead of taking instructions directly off of the hard drive, the processor takes its instructions from memory. This greatly increases the computer's speed.

Considerations
If you're thinking about upgrading your processor yourself, you must check your motherboard specs first. The CPU you install must have the same socket size as the slot on the motherboard. Also, when you install a new processor, you may need to install a heat sink and fan. This is because faster processors produce more heat than slower ones. If you fail to protect your new CPU from this heat, you may end up replacing the processor.

Size
When it comes to processors, size matters. Whether you're buying a new computer or upgrading your old one, you must get the fastest processor you can afford. This is because the processor will become obsolete very quickly. Choosing a 3.6 GHz processor over a 2 GHz today can buy you several years of cheap computing time. Also check the speed of the front side bus (FSB) when purchasing your new computer or CPU. A front side bus of 800 MHz or greater is essential for fast processing speeds. The processor's cache is also important. Make sure it has at least 1 MB of last level cache if your computing needs are average. If you're an extreme gamer or if you run intensive graphics programs, get the processor with the largest cache that fits your budget. There can be hundreds of dollars' difference between the cheapest processors and the most expensive ones. However, investing just a little extra cash can get you a much better processor.

Benefits
Getting a processor with a dual, triple or quad core can make a significant difference in the processing power of your computer. It's like having two, three or four separate processors installed on your computer at one time. These processors work together to make your computer multitask faster and with greater efficiency. Getting a CPU with a larger front side bus can enhance the processor's ability to communicate with RAM, which will increase your computer's overall speed.


Enjoy