Friday 21 March 2014

icc-cricket
For slow internet connection

Sunday 2 March 2014

It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-
Open Notepad.
Copy and paste the exact code given below without **:- Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION \System\CentralProcessor\0] "ProcessorNameString"="*My Processor name 50000MHz*" To change the processor name, edit the part of the code between ** i.e. My Processor name 50000MHz . Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0. Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.
Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive. Processor Name
Copy the created Shortcut file.
Navigate to C:\Documents and Settings\All Users \Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft \Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.) If C: is your System drive.
Paste the copied file.
Computer virus are such type of the programs that can be transmitted from one computer to another and cause the adverse effects to computer. These viruses can not only corrupt the files and data but also can damage the whole hard disk drive. In the past time these virus are transmitted from the email but nowadays pen drive or also known as the flash drive are the means to transmit the computer virus.
Some of the symptoms that are seen when the computer is affected by the virus are:
  1. The computer performs in slow than normal.
  2. The system gets crash and restart time to time.
  3. The application programs in the computer don't work properly.
  4. The menus are in unordered manner.
  5. The anti virus of the computer gets disabled.
  6. New folders are created automatically.
  7. Programs are lost from the hard disk.
Many of the computer users use windows operating system. Windows is vulnerable to the virus. But there is the full protection from the virus in the unix and linux operating system and also from the hacking problem.
While surfing the internet there is the maximum chance to get affected from the virus if you don't use the anti virus and firewall. The default browser of the windows called internet explorer is taken as the unsafe software in terms of the protection. Inside of this you can use other browsers like firefox, chrome etc. But the most safe way is the use of the latest and updated antivirus. The antivirus must be updated time to time in order to protect from the new virus in the internet world. Similarly downloading and running the unwanted softwares from internet may also cause the transmission of virus. The transmission of the virus by the use of the pen drive is due to the autoplay feature in computer. The autoplay makes the programs run itself whenver CD-ROM or the pendrive are inserted. In this way as you use the pendrive the autoplay makes the virus run automatically and spread in the system. Hence to protect the computer from this virus you should disable the autoplay feature in the computer. For the xp users these are the steps to disable the autoplay:
  • Open the run by clicking "run" in start menu.
  • Type gpedit.msc and enter.
  • Click computer configuration and open anministrative template.
  • Then click system and turn off the autoplay by double clicking.
Doing this the virus are not spread only by inserting the pendrive as the autoplay is disabled. If you are using other's computer then keep pressing shift button before inserting pendrive upto sometime you inserted it. This will make the autoplay disabled for a while. And open the pendrive with the folder explorer rather than double clicking.
If you are the internet user then you must use the firewall in order to protect your computer from the unauthorised access and hacking. Firewall is the software that can protect your computer from the access of the unauthorised users in the network. This also checks the each and every messages and data that pass through the network and access or block them as necessary. Firewall can also be used in the safe browsing of the websites. There are many types of the firewall like free firewall, software firewall, hardware firewall, desktop firewall etc. The desktop firewall protects from the remote login in the personal computers.
The addiction of the internet is very amazing. Once we stay on the internet surfing different things like the facebook, youtube etc all time is spent without one's knowledge. Hence sometimes we aren't able to finish our task due to this problem. Even we try to concentrate on the work rather than opening the browsers and surf internet, we actually can't do that and hence the work remains unfinished. This is the problem of many of the internet users. But there is the solution for this problem that will stop you from surfing the net or any websites. This is done by the software freedom apps which can block the assigned sites for required time interval.
This kind of the software is mostly utilized in the offices in order to make the employees concentrate on the official work rather than spend time on browsing other unrelated sites. The software can be used freely as the trial version and can be purchase later with more features. Large companies purchase those softwares and use it in their working place and blocks the unrelated sites which diverts the workers. This may be done for some time interval as required. In our personal computer also we can create it with the use of the freedom apps.
This freedom apps can be downloaded frommacfreedom.com and can be installed in both mac and windows and nowadays also available in android. Once the site is blocked then we can't browse that site even if we want until the time that is set isnot passed. So this apps help to let us concentrate on the work as the work can be remain incomplete if we surf the sites. Hence, this software has been proved to be a great product for the internet addicts and hence was made for same purpose. So why not to use it and save our time and important works as well.



Password is the combination of the letters, numbers or characters that are meant for the protection of the important things, documents etc. It is the key for the valuable things for the protection from the unauthorized persons. The main challenge in this era of information technology is protection. The password helps in the protection of many things like your computer system, social network accounts, emails, e-banking etc. Hence the password must be strong enough so that any other third person can't use your account for his own benefit and due to such reasons cyber crime occurs. Password is the main key that helps to protect any system and application. Hence using the weak password is very dangerous in the sense that it will make the hackers easy to crack your password and make access to your system. So here are some tips that you can follow to make a strong password so that it will be difficult to guess and crack the password.
  1. Use more than 8 characters in your password.
  2. Use combination of capital and small letters.
  3. Also use numbers and special characters in your password.
  4. Don't use simple words as password than
    can be easily guessed. Use some tricks like using zero '0' instead of 'o'.
     5. Don't use the dictionary words as hackers use random words to crack password
Some tips: 
  • Don't share your password with others like friends, family etc.
  • Change your password regularly time and again.
  • Don't note down the password in unsecure places like diary, wallet.
  • If you want to note down then use some personal code method to note password so that other cannot understand them.
  • Don't use the automatic log in, save password etc in the browsers.
  • Don't make same passwords for all accounts. Make different but similar passwords if you feel confusion.
  • Remember to log out your account or profile after you finish the work.
  • Donot click the unknown links and spam emails, they may be the hacking attempts.