Friday 18 July 2014

Computer literacy basics

Easy Learn Computer will discuss about
computers ranging from the most basic.
Before going on to further yahap is useful to
know the basic computer first. In this case
the basic knowledge to be learned about the
introduction of Hardware and Software.
HARDWARE
Computer hardware can be divided into
several parts :
CPU (Central Processing Unit)
Input Device
Output Devices
Storage Device
CPU (Central Processing Unit)
The CPU is the most important part of a
computer. In it there is a lot of hardware to
connect and work processes input devices and
send the results to the Output Device. CPU
Unit consists of: main board, processor,
RAM / Memory, Power Supply, Input / Output
Controller, Display Controller, Multimedia
Controller, Network Controller.
Main board
Main board serves to put the whole device
controllers. Including Processor, RAM, Power
Supply, I / O Controller, Display Controller
and all the equipment is placed in the socket
provided by the main board. Manufacturer
Main board: Asus P5Series, AMPTRON,
Compaq, Chip PC, Gigabyte, ECS, Dell, IBM
Processor
Processor is the brain of the computer, such
as the human brain in all commands and
command results in the process by the
Processor. The processor is a chip that is
often called "Microprocessor" which is now
the size has reached Gigahertz (GHz). The
measure is a matter of the speed of the
processor to process data or information.
Part of Processors the most important part of
the processor that is divided into three:
Arithmetic’s Logical Unit (ALU) Control Unit
(CU) Memory Unit (MU) The more velocity and
higher processor technology, the better the
performance of the computer.
Interface = Socket 370 (P-3), Socket 478
(P-4), Socket A / B (AMD), PGA 778 (Dual Core
and up) For example, Intel P1, P2, P3, P4,
Dual Core, AMD Duron, Athlon, etc.
Manufacturers processors are widely
circulated in the market are AMD, Apple, VIA
Cyrix, IBM, IDT, and Intel.
RAM / Memory
Random Access Memory file storage program
executed by the computer functions. The
greater the capacity, the more closely the
process as well. My experience with the
system Windows XP CPU will be very
responsive to 2:00 GHz with 512MB RAM.
Type / Interface = EDO (oldest), SDRAM, DDR1,
DDR2, DDR3 (newest, fastest, cheapest)
Power Supply
Power Supply serves as the resources used to
use all the tools available on the computer.
Recommendations When Power Supply for
your computer is one that has great power,
better computer power advantages.
Pin Type: 12 Pin Interface (old type), 20 Pin
ATX, ATX 20 Pin + 4 Pin, ATX 24 Pin + 4 Pin
(Latest)
I / O Controller
Controller to manage devices connected to
the I / O ports (Port Serial, PS2, LPT).
Examples of devices that connect to the PS2
Mouse, Keyboard P2, Printer LPT.
Interface = ISA, PCI
IDE controller and SCSI
Controller
The controller is to manage the performance
of the devices connected to the IDE or SCSI
port. The tools are used to connect hard
drives, floppy disks, CD Rom.
Interface = ISA, PCI
Display Controller
Display Controller to produce a display to a
monitor or TV. There are two types of the first
on board, both are often called VGA Card.
VGA has its own RAM larger capacity, greater
RAM then the display on the monitor will be
more subtle. VGA Card also serves to reduce
load performance RAM / Memory on the use
of certain 3D games, 3D video, and programs
that require high-resolution graphics.
Example RAM VGA: 16, 32, 64, 128, 224, 256,
512, 1G.
Interface = ISA (Old Type), PCI (Old Type),
AGP, PCI-Express (New)
Manufacturer VGA: Nvidia, S3 Trio, SIS, ATI
Rage Series, etc.
Multimedia Controller
Multimedia Controller for producing sound
often called a Sound Card (Sound). Sound
Card Technology Today technology developed
to support 3D Surround 5.1 (mean 5 speakers
with 1 Central as Base 6 Channel).
Manufacturer: Realtek, CMedia, ESS, Creative
Sound Blaster. Interface = ISA, PCI
Network Controller / Network
Adapter / LAN Card
Network Controller / Network Adapter / LAN
Card are used as a port that connects two or
more computers. Usually used for Chat, File
Transfer, Database Programs, internet access
(if using a modem), Multi Player Games, etc.
Interface = ISA, PCI
INPUT DEVICE
Device used to enter commands.
Keyboard
This tool is to include input ASCII characters
to be translated so that the system will
generate an order.
Port Interface = Serial / PS2 / USB
Mouse
This tool is a pointing device (pointer) that
will help to access the computer.
Port Interface = Serial / PS2 / USB
Scanner
This tool will convert real image into Image
File (File Photo)
Port Interface = LPT / USB
Joystick
This tool as a game controller.
Port Interface = LPT / USB
Output Devices
That tool works issued the results of a
command input device.
Monitor
To display the results of the CPU.
Printer
As a means of printed documents. 1. Laser
printers, this printer to print quality
documents the approach documents have
been processed in a computer. 2. Ink-jet
printers, laser printers compared to New
Media, the initial cost of the printer type
more efficiently. 3. Dot matrix printer, this
being the most preferred type ON PC era. In
this type of printer, the image produced by a
collection of the check point spread short
distances so it looks uneven. 4. Plotter,
printers use a pen set to make World Prints
related engineering or architecture.
Manufacturer : Canon, Epson, HP, Lexmark,
Apollo, etc. Port Interface = LPT, USB
Speaker
As the sound output device. We can also use
earphones.
Storage Device
That the tool serves as a place to store data in
a file.
Fixed Hard disk / Hard Disk
Chasing placed inside the CPU, is used to
store files in a very large capacity. At present,
the production capacity of hard disk storage
has reached more than 512 GB.
1KB = 1024 B
1MB = 1024 KB
1GB = 1024 MB
For example, file documents / letters usually
only takes 200kb, 4MB MP3, Video CD
50MB / song, 700MB / CD full.
Interface = IDE, SCSI, SATA Manufacturer:
Samsung, Maxtor, Seagate
Floppy disk Drive
Floppy disk drive is the additional storage
that can be moved - moved / not fixed,
including the Removable disk. Since capacity
is only 1.44 MB floppy disk now abandoned
and turned to flash a current capacity up to
8GB, safer and maintenance free.
Interface = floppy interface
Manufacturer: Panasonic, Samsung
CD / DVD Drive
Used as a media reader CD (Compact Disk /
Disk tile) or a DVD. CD / DVDRW can be used
to read the CD / DVD, and burn to CD / DVD.
The storage capacity of a standard 700MB CD,
DVD 1 Layer 4.48 GB, 8.15 GB DVD 2 Layer.
Interface = IDE, SCSI, SATA
Manufacturer: Samsung, Liteon, LG, Pioneer
Other Device (Other Devices)
Flash Disk
Flash Disk is also included in the Storage
Device, floppy disk the same function, but
has a large capacity and maintenance free. My
experience using a floppy disk is very
uncomfortable and unsafe, because it must be
protected from dust, sunlight, water,
magnets, etc. A common mistake because
unreadable. Flash disk capacity from 512,
1GB, 2GB, 4GB, 8GB and growing.
Interface: USB
Bluetooth Adapter
This tool converts the digital data into a
particular frequency radio signals to connect
with other tools such as HP, other PCs,
Bluetooth Mouse, Bluetooth Speaker, etc.
Interface: USB
TV Tuner
This tool serves to convert the RF signal (TV
signals) into digital signals. With this tool for
watching TV on the computer is not a
problem. Usually equipped with a radio.
Interface: PCI / USB
External Hard Drive
Function and capacity similar to a fixed disk /
hard drive. The difference this device can be
taken anywhere, because it includes the
Removable Disk.
Interface: USB
SOFTWARE
Software is a program, device drivers, and
files on the computer. Namely;
Operating System (OS)
The operating system is the software that
controls the performance of the main system.
In determining the OS to consider the
compatibility (support for programs to third
parties, as well as support for hardware),
stability (Often Mistake or not), and Price
Range (OS Windows XP Home Edition for
dollar cost nearly 800ribu, Linux offers a free
OS such as Ubuntu).
Example OS, DOS 6.22, Windows 3.11,
Windows 95, 97, 98, 2000 Server, XP, 2003,
Vista, Linux Mandrage, Linux Ubuntu, Suse
Linux, etc.
Program Application
The application program is a supplemental
program to support the performance of the
computer. (Price Software Microsoft Office
Word, Excel Access to 1.7 million). Example
Applications, Office (Word, Excel, etc.),
Winamp, Power DVD, Pascal, Application
Games, etc.
Device Driver
All the hardware described above will not
work without a Device Driver is installed in
the Operating System. For example, the
printer cannot print without a Device
Driver. For Exsample : Suppose we want to
install a TV tuner card installed in the PCI
slot. Once the computer is turned on it will
be confirmation that the new hardware found
and then the computer asks Device Drivers for
new hardware. This could mean that the
computer wants to know what the name, the
function and workings of the new hardware
and ask identifier wheel / in the form of
software (usually included in the package
tool). After we gave the driver files in the
form of software, the computer will know that
the name of this tool is the TV Tuner, Brand
A, mounted on a PCI-X slot, and so on.
However, the operating system has been
equipped with many hardware-hardware
drivers that are often used in PCs. If we put a
new tool to the computer then the tool is
ready for use, it is called Tool Compatible.
Stay updated drivers so we can work
optimally. For example, flash, LX-300 Printer,
Monitor.

Thursday 17 July 2014

How to find serial key of any software

1) Go to Google.com
2) Then type Software Name 94FBR
3) Replace Software Name with the name of
software whose serial key you want to find
4) Example: To find serial key of Nero i will
type Nero 94fbr
5) Now press Enter and you will find serial
key

Sunday 13 July 2014

Convert Your laptop Webcam into Security

Yes now you can convert your wecam into
security cam , with the help of # BootCam
software its a freeware software .
now whenevr you start your laptop, it
capture a picture from your webcam and
save it into "Souce" directory with the
current date and time,
you can check who were accessing your
laptop behind you!!
pls follow these step to install BootCam--
Step-1 Download BootCam(Not available on
net) totally devloped by Hacking iN team if
you need it then contact us.
Step-2 after downloading Paste "BootCam"
Folder into C:/ drive(Not mandtory , you can
paste,where you want)
Note that- it does not hav any installation
wizard(wizard is under devloping mode)
Step-3 Copy load.exe file and paste shortcut
into startup folder of windows(Start->all
programe->statup)
Now Goto to the BootCam Directory Look for
"Source" Directory , it cantain all of pic
which were capture at the time of startup.

Security Tips for Beginners :

***********************************
1 : Do not open links and files received from
un-trusted people.
2 : Do not open junk emails that you
received on your gmail, yahoo, hotmail or
any other source.
3 : Always use the latest version of Anti-Virus
and keep it up-to-date in Windows OS.
4 : if you are using linux/ubuntu or any
other linux based operating system then you
don't need anti-virus. just open your
terminal and enable firewall by entering this
command
sudo ufw enable
5 : Remember, Once your account is Hacked,
it can not be recovered easily, so follow the
tips below related to your accounts.
6 : To secure your facebook accounts use
your mobile number as an extra layer.
7 : Never use same passwords for your
primary e-mail and for your facebook
account. it will help you in Recovering your
account.
8 : Change your passwords after 1 month on
regular bases if you have joined Hacking
groups and pages.
9 : Be careful in getting auto-likes etc from
websites.They might give you a trouble.
10 : Do not install un-official apps/games in
your facebook , because they sometimes are
created to Hack accounts.

Saturday 12 July 2014

HOW TO PROTECT UR SITE FROM SQLi

This is simple tutorial for beginners on
how to protect your site against SQL
Injection and this
tutorial will also help you check if your site
is vulnerable
to SQLi and how to make it resistant to SQLi.
What is SQL Injection?
SQL stands for Structured Query Language,
and it is the language used by most website
databases. SQL Injection is a technique used
by hackers to add their own SQL to your
site’s SQL to gain access to confidential
information or to change or delete the data
that keeps your website running. I’m going to
talk about just one form of SQL Injection
attack that allows a hacker to log in as an
administrator – even if he doesn’t know the
password.
Is your site vulnerable?
If your website has a login form for an
administrator to log in, go to your site now,
in the username field type the administrator
user name.
In the password field, type or paste this:
x’ or ‘a’ = ‘a
If the website didn’t let you log in using this
string you can relax a bit; this article
probably doesn’t apply to you. However you
might like to try this alternative:
x’ or 1=1–
Or you could try pasting either or both of
the above strings into both the login and
password field. Or if you are familiar with
SQL you could try a few other variations. A
hacker who really wants to get access to
your site will try many variations before he
gives up.
If you were able to log in using any of these
methods then get your web tech to read this
article, and to read up all the other methods
of SQL Injection. The hackers and “skript
kiddies” know all this stuff; your web techs
need to know it too.
If you were able to log in, then the code
which generates the SQL for the login looks
something like this:
$sql =
“SELECT * FROM users
“WHERE username = ‘” . $username .
“‘ AND password = ‘” . $password . “‘”;
When you log in normally, let’s say using
userid admin and password secret, what
happens is the admin is put in place of
$username and secret is put in place of
$password. The SQL that is generated then
looks like this:
SELECT * FROM users WHERE username =
‘admin’ and PASSWORD = ‘secret’
But when you enter x’ or ‘a’ = ‘a as the
password, the SQL which is generated looks
like this:
SELECT * FROM users WHERE username =
‘admin’ and PASSWORD = ‘x’ or ‘a’ = ‘a’
Notice that the string: x’ or ‘a’ = ‘a has
injected an extra phrase into the WHERE
clause: or ‘a’ = ‘a’ . This means that the
WHERE is always true, and so this query will
return a row contain the user’s details.
If there is only a single user defined in the
database, then that user’s details will always
be returned and the system will allow you to
log in. If you have multiple users, then one
of those users will be returned at random.
How to resist against SQLi
Fixing this security loophole is not so
difficult. There are several ways to do it. If
you are using MySQL,, the simplest method
is to escape the username and password,
using the mysql_escape_string() or
mysql_real_escape_string() functions, e.g.:
$userid = mysql_real_escape_string($userid);
$password = mysql_real_escape_string
($password);
$sql =
“SELECT * FROM users
“WHERE username = ‘” . $username .
“‘ AND password = ‘” . $password . “‘”;
Now when the SQL is built, it will come out
as:
SELECT * FROM users WHERE username =
‘admin’ and PASSWORD = ‘x\’ or \’a\’ = \’a’
Those backslashes ( \ ) make the database
treat the quote as a normal character
rather than as a delimiter, so the database
no longer interprets the SQL as having an OR
in the WHERE clause.
This is just a simplistic example. In practice
you will do a bit more than this as there are
many variations on this attack. For example,
you might structure the SQL differently,
fetch the user using the user name only and
then check manually that the password
matches or make sure you always use bind
variables (the best defence against SQL
injection and strongly recommended!). And
you should always escape all incoming data
using the appropriate functions from
whatever language your website is written in
– not just data that is being used for login.

What is God Mode And How To Activate It In Windows 7 ???

To Activate God Mode :
Follow these simple steps to enable God
Mode :-
Make a New folder on your desktop.
Name it as ”God-Mode.
{ED7BA470-8E54-465E-825C-99712043E01C}”.
God mode is a feature in Windows 7 which
gives you total access to all your computers
Administrative Settings. This feature lets
users access all of the operating system’s
control panels from within a single folder.
God Mode is a simple folder that brings all
aspects of Windows 7 control in a single
place. It collects all of the Control Panel
functions, interface customization,
accessibility options, just about every aspect
of controlling Windows 7 into a single place