Skip to main content

Posts

Showing posts from July, 2012

How to configure VPN in an IPAD

Many a times we need to create a VPN (virtual private network) using our iPad. Well, you can create a VPN as iPad supports VPN connection.  To configure it, you need to follow these simple steps: 1] Go to Settings ,  2] then General > Network .  3] Select the VPN and move the slider to On ,   4] Add configuration window will open as shown in the figure. Then add a VPN configuration with your server and account details, you can connect the VPN to L2TP , PPTP (port) or any other port that you want to configure with it.The password is asked every time and the other fields such as Description , server , account Name are required.

Disable Lock Screen in Windows 8

If you like your PC to boot just as fast as possible then the new Windows 8 lock screen may not appeal. Don't worry, though, if you'd like to ditch this then it only takes a moment. 1] Click Start , type gpedit.msc in the Start Search box, and then press ENTER . It will launch GPEdit.msc (the Local Group Policy Editor) 2] Browse to Computer Configuratio n > Administrative Templates > Control Panel > Personalization .  3] Double click " Do not display the lock screen ", select Enabled and click OK . Restart and the lock screen will have gone.

Free Software to Monitor CPU Temperature

Monitoring CPU temperature is useful and necessary for Gamers and people puting lots of load on their computers. You can monitor your CPU temperature using this free software . You can easily monitor the tempreature of each core of the CPU as well as the load on each core . CoreTemp: CoreTemp is one of the best programs for monitoring my CPU’s temperature is a free windows software . CoreTemp shows you realtime temperature of each core on your CPU . First check your CPU against the list that CoreTemp supports . Most modern processors are compatible. Now follow the simple steps: 1] Go to http://www.alcpu.com/CoreTemp/ and click “ Core Temp 1.0 RC3 ” to download CoreTemp. It is free. Once you download it, install and launch it.    2] A simple program will get installed. First timers may find it difficult to use but I will make it simple for you. 3] Tj.Max is the max temperature that the manufacturer for your CPU suggests. This means...

What are sniffers in networking?

Sniffers monitor network data . A sniffer can be a self contained software program or a hardware device with the appropriate software or firmware programming. Sniffers usually act as network probes or "snoops." They examine network traffic, making a copy of the data without redirecting or altering it. Some sniffers work only with TCP/IP packets, but the more sophisticated tools can work with many other protocols and at lower levels including Ethernet frames. here is a simple figure of network cable.   Sniffers were tools used exclusively by network engineers. Today, however, these utilities have become popular on the Internet with hackers and the merely curious. The U.S. Federal Bureau of Investigation (FBI) has utilized a famous sniffer system called "Carnivore" to help detect illegal Internet communications. The below figure shows the process of network sniffing:

How to Carry your google Chrome Settings with You

If you are using multiple computers (at home, at work, etc.), you don’t need to worry about trying to setup the Chrome browser in the same way on all the computers you use. Instead, setup your bookmarks , extensions , themes , settings , etc, on your Chrome browser on one computer, and select “Sign in to Chrome” from the settings menu as shown below. This will ask you to enter your google username and password. This will save all your chrome settings on your google account. Next time when you sign up from another machine, all your chrome settings will be visible on the new system. If you make any changes to your chrome settings on this new system, it will be available on your other computers too. Use this feature only on the systems which you trust(good network shared with LAN) and not on public computers.

What is auto correct option in MS Excel, Word document

The auto correct option is the option from where you can correct the words and store the word for your dictionary. It is possible from the procedure as shown below. 1) Start MS Word. 2) After that type any sentence what you want or type the document you have been given, for example you type "sandstone", after that if you want to make a shortcut of that word, then go to File , option , 3 Then go to Proofing tab, after that go to autocorrect option button, then in the replace and with texts, you can place and replace your own words. 4 Also you can store and save your daily own hand writing words and any small sentance.

How to protect data from Stealing in an iPad

If you re carrying around sensitive data, you can enable a feature that will erase all the data on the device if someone inputs the incorrect pass code 10 times. Navigate to Settings > General > Passcode Lock > Erase Data.   then click on Enable button to erase the data.

How to find your applications in windows 8

Windows 8 comes with the new touch- oriented Metro Start screen, new apps, new interface conventions, even experienced PC users may be left feeling a little lost. The Win+X menu is useful, but no substitute for the old Start menu as it doesn't provide access to your applications. To find this, hold down the Windows key and press Q (or right-click an empty part of the Start screen and select All Apps) to reveal(to bring to view) a scrolling list of all your installed applications. Browse the various tiles to find what you need and click the relevant application to launch it. The basic skin of windows application is as shown below:

How to assign Keyboard Shortcuts for Programs

Application can be assigned to a shortcut key in Windows XP/Vista/7. The application would launch when the combination of keys is pressed which you entered as the Shortcut Key for that application. To create Shortcut key for any application in Windows: 1. Right click the program icon and select Properties . 2. Then select the Shortcut tab 3. Click in Shortcut key textbox 4. Enter the keyboard shortcut for that program. 5. Press OK to exit 6. Use the Keyboard shortcut combo to launch the application. The way i have used a combination of keys Ctrl+Alt+C to launch calculator application other applications can also be launched using Shortcut keys.

What is Windows Intune?

Windows Intune is an integrated, cloud based client management solution that provides you tools, reports, and upgrade licenses to the latest version of Windows OS. Windows Intune helps to keep your computers up to date and secure, and lets your users more securely access and install targeted licensed software applications and perform other common tasks, from virtually anywhere. It simply can be treated as a cloud service that helps you centrally manage and secure your PCs through a simple, web-based console. It was launched in July 2011.  Who can use it? Windows Intune is primarily aimed at small and medium enterprises and service providers who want to manage up to 500 Microsoft Windows computers. Simply, it is not for individual users. Smaller enterprizes having less no of PCs can also use it. It will simply be the substitue for your server. Features of Using Windows Intune: It is a web based service, provides friendly user interface which...

How to Create a Custom Bullet in MS Word Document

We make use of bullets to represent a list in our documents. Bullets available in Microsoft Word are limited. To make our documents more presentable we can create and import custom bullets. Custom bullets make documents look better and more professional. Here is the procedure to create and import custom bullets. 1) Open Microsoft Word and your document. 2) Right Click on an empty space of the document and click Bullets -> Define New Bullet . 3) In " Define New Bullet" window, choose " Picture " option which can be found under the Bullet character section.  4) You will be taken to the bullet pictures list. To import your own bullet, click Import .   5) Use the pop-up explorer window to choose your image and click Open . 6) Choose the newly imported bullet from the Bullet picture window by double-clicking on it. 7) After choosing your new bullet, you can preview it in the Define New Bullet win...

Basic Computer Operations

A computer basically performs five major operations or functions irrespective of their size and make. These are 1) it accepts data or instructions by way of input, 2) it stores data, 3) it can process data as required by the user, 4) it gives results in the form of output, and 5) it controls all operations inside a computer. 1. Input: This is the process of entering data and programs in to the computer system. You should know that computer is an electronic machine like any other machine which takes as inputs raw data and performs some processing giving out processed data. Therefore, the input unit takes data from us to the computer in an organized manner for processing. 2. Storage: The process of saving data and instructions is known as storage. Data has to be fed into the system before the actual processing starts. It is because the processing speed of Central Processing Unit (CPU) is so fast that t...

How to Hide the Local Area Cable Unpluged Notfication Icon?

So many times you feel it annoying when you see a message in notification area, typically when you are using wireless network. That message tells you "Local area cable is unpluged" You get an urge to just hide this notification forever. Because it becomes a distraction sometimes. Here is the procedure to get rid of this notification. Open the Control Panel . Click the Appearance and Themes icon and then Taskbar and Start Menu icon or if displaying Control panel in classic view just click the Taskbar and Start Menu icon. In the Taskbar and Start Menu Properties window click the Customize button. Select the Local Area Connectio n and choose the option to Always hide . Click ok and close all remaining windows.

What happens when you press the power button on your computer ?

You can choose what happens, when you press the power button on your computer case (or the edge of a laptop). The computer can shut down, sleep, hibernate, or do nothing. You can apply the same setting to all of your power plans or you can apply different settings to individual power plans.  To apply the same setting to all power plans 1.    First Goto Control Panel to open Power Options . 2.    On " Select a power plan" page, in the left pane, click Choose what the power buttons do . 3.    On " De fine power buttons and turn on password protection page ", next to When I press the power button , choose what you want your computer to do when you press the power button.  If you have a laptop, you can choose separate settings for when your laptop is running  on battery and when it's plugged in 4. Click Save changes .

What is an embedded system?

An embedded system is a computer system that is specially designed to perform specific tasks within a larger system often with real time computing constraints. It is   embedded   as a part of a complete device that inculdes hardware and mechanical parts to acheive the tast of embedded system. By contrast, a general-purpose computer, such as a   personal computer   (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. eg: Washing Machines, Micro Waves etc. Embedded systems contain processing cores that are typically either microcontrollers or   digital signal processors   (DSP).   The key characteristic, however, is being dedicated to handle a particular task. Since the embedded system is dedicated to specific tasks, design engineers can optimize it to reduce the size and cost of the product and increase the reliability and performance. Some embedded systems are m...

Basic Linux Command-line Tips and Tricks for Beginners

Here are some basic linux command tips and tricks to follow. 1.  Everything in Linux is a file including the hardware and even the directories. 2.  #  : Denotes the super(root) user 3. $  : Denotes the normal user 4.   /root : Denotes the super user’s directory /home : Denotes the normal user’s directory. 5.   Switching between Terminals $ (Symbol)   Ctrl + Alt + F1-F6 : Console login $ (Symbol) Ctrl + Alt + F7 : GUI login 6.  Use of Tab : Instead of typing the whole filename if the unique pattern for a particular file is given then the remaining characters need not be typed and can be obtained automatically using the Tab button. 7.    ~ (Tilde) : Denotes the current user’s home directory 8.    Ctrl + Z : To stop a command that is working interactively without terminating it. 9.   Ctrl + C : To stop a command that is not responding. (Cancellation). 1...

What is a CSV file and how to create it?

You might have come across this word CSV file. You have needed it somewhere; you might have read like this “Provide a CSV file.” Or you may just have read it on internet. So what a CSV file is? CSV is a short form of comma separated values. It is any file containing text that is separated by comma.  e.g Text can also be separated with any other special character. Creating a CSV file is as simple as creating a text file. It can be created in any text editor. It is mostly created using Microsoft Excel or Open Office Calc. We will see how to create a CSV file using a text editor and Microsoft Excel. Notepad (or any text editor): To create a CSV file in a text editor open a new text editor program, such as Notepad. Once open write the text data you wish the file to contain and separate each field or column of data with a comma and each row with a new line Title1,Title2,Title3 one,two,three example1,example2,example3 As an example, if...