Thursday, 24 September 2015

Use of All Functional Keys

f1    =   Help

f2    =   Rename

f3    =   Search

f4    =   Close

f5    =   Refresh

f6    =   Highlight

f7    =   Spell Check

f8    =   Safe Mode

f9    =   Compile

f10  =   Menus

f11  =   Full screen

f12  =   Save

Android Code & It's Function


Differences Between Database & Datawarehouse


Disable USB ports on Windows PC

1. Click on Start.
2. Click on Run. If you cannot find RUN, type it in the search box.
3. Type "regedit" without quotes. This will launch the Registry Editor.
4. Navigate to

     HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR 

5. In the work area, double click on Start.
6. In the Value Data box, enter 4.
7. Click on OK.
8. Close Registry Editor and refresh your desktop.
9. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6. 

Types of Hackers


White hat hacker :

A white hat hacker is someone who has non-malicious intent whenever he breaks into security systems and whatnot. Instead of taking malicious advantage of exploits, a white hat hacker notifies the system's owners to fix the breach before it is can be taken advantage of. The hackers looks after the vulnerabilities in a system or network that a malicious hacker can take as an advantage. A white hat that does vulnerability assessments and penetration tests is also known as an ethical hacker.

Black hat hacker :

A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent whenever he goes about breaking into computer security systems with the use of technology such as a network, phone system, or computer and without authorization. A black hat will maintain knowledge of the vulnerabilities and exploits they find for a private advantage, not revealing them to the public or the manufacturer for correction. 

Grey hat hacker :

A grey hat hacker is one who exhibits characteristic of both white hat hacker and grey hat hacker. A grey hat is a skilled hacker who sometimes will act legally and other times may not. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits. Sometimes, they offer to repair vulnerable site in place of a small amount.  

Script kiddie :

A script kiddie is an amateur or non-expert hacker wannabe who breaks into people's computer systems not through his knowledge in IT security and the ins and outs of a given website, but through the prepackaged automated scripts (hence the name), tools, and software written by people who are real hackers, unlike him. He has little knowledge of how the script works and he tries to execute that with his little knowledge!!   

Elite hacker :

Elite hackers are hackers among the community of hackers who are above average but treated as special by the society. They’re the masters of deception that have a solid reputation among their peers as the cream of the hacker community. 

Difference between Core i3 , Core i5 & Core i7

Thursday, 2 April 2015

Remove Shortcut Virus using CMD

Type this Command in Command Prompt :

attrib -h -r -s /s /d z:*.*

where, z= drive name