Wednesday, August 31, 2011

How to make Applications "USB portable"

Here are the steps:

1. First of all you need to install VMware thinApp...
Download it

2. Now Before go to next step, if the software to which you want to make portable, is installed on your computer, then you need to uninstall it.

3. Now start Vmware thin App for creating Portable Application. For that go to start> All Programs> VMware> ThinApp Setup Capture

4. Now many Frames will open one by one, just press next in all, instead of some that i will explain in next steps. here is screen shot of first Frame.


5. Now A frame will open(as shown in screenshot),

5.1 first click on 'Advanced Scan location' and make sure that the drive is select where you install your softwares and press OK.

5.2 Now Click on 'Prescan'. After pressing Prescan, Scanning will start, So wait till scanning finish, be patient.

6. After finished Scanning, Simply Install the software to which you want to make portable on your system(same as you normally do).

7. After Installation of software, click on 'Postscan'. Now again Scanning will start.

8. After Completion of post scanning, Select the exe of the Application which u installed in step 6. and Press 'Next'.

9. Now select 'USB flash Portable media' and Press 'Next'.


10. In last step click 'Build'.

11. As sson as the previous step is finished, your application is now become portable, you can check that porable application by going to C:\Program Files\VMware\VMware ThinApp\Captures.

Here you will find a folder of that software which u hv created. Now open that folder. Search for a folder named 'Bin', open it. here you will found the exe of your Portable software.... Copy it and paste it into your USB... and use it anywhere :) !!!!

How to trace who is invisible on Facebook Chat ?

if any of your friend is invisible by same method then you can know easily by an application of FB named 'Online Now'. Using this application,without being online through ur FB chat you can know about all ur friends who are online on chat, no matter in invisible State or visible state.

Uninstall Windows Apps With A Right-Click ?

Always when you want to remove unwanted Windows programs, you usually have to head all the way to the Control Panel to remove it. But here is a way by that you can get uninstall option directly with a right click on the shortcut of the software you want to uninstall.


MenuUninstaller is a free software that adds an "Uninstall" option to the Windows context menu so you can remove programs right from their shortcuts.


How to use Menu Uninstaller:


Download MenuUninstaller, and install it on your system
after installing just right click on shortcut of software > click on uninstall




Friday, August 26, 2011

How to install Windows XP over Windows 7 in a dual boot ?


This case is applicable for users who have Windows 7 pre-installed on ‘C’ and want to install XP on their ‘D’ partition.The process for this is same as we did for Windows XP & Vista.

Follow the simple steps below to install XP after Windows 7.

1) Make a clean Install of Windows XP on ‘D’ partition of your hard drive. Assuming, Windows 7 is installed on ‘C’ partition.

2) After restarting system, you will directly boot into Windows XP. That’s because XP writes its boot loader over Windows 7. So, we need to restore the Win 7 boot loader.

3) To restore 7, you need to Boot from the Windows 7 DVD and “Repair your computer”. Check this article “How to Perform a Start-up Repair in Windows 7” to perform repair.

4) After repairing, your system will restart and boot into Windows 7.

5) Download and Install EasyBCD from http://neosmart.net/dl.php?id=1 on your Windows 7 to add boot entry for XP.

6) Launch the program and select ‘Add New Entry’. Under “Operating Systems” open the Windows tab, select the Type as “Windows NT/2k/XP/2k3” and click on ‘Add Entry’.

The entry for Windows XP would be added instantly. You can choose the default OS to boot and modify the boot menu time-out from “Edit Boot Menu” option.

Now restart you PC and you’ll be presented with two options, Windows 7 and Windows XP.

Select the OS you want to work on.

Thursday, August 25, 2011

some interview questions related to Networking IP layer :-

IP address or Internet Protocol address is the address of a device attached to an IP network (TCP/IP network). It is a must for every client, server and network device to have a unique IP address for each network connection (network interface). Every IP packet contains a source IP address and a destination IP address. As a device moves from one network to another, its IP address changes.

Networking - How would you define IP address?
Computers using the TCP/IP for communication are uniquely identified by a 32 bit address called as an IP address. The routers use the IP address information to forward the packet to the destination computer.

IP addresses are categorized as:
Private address: these IP addresses are used exclusively within a private network and not for public to see.

Public Address: these are registered IP addresses used for public.
Each IP address has a network address and a host address. IP addresses are expressed in four sets of three numbers, separated with dots. Each set is called as an octet because when converted to binary; it denotes eight binary.

Difference between Static and Dynamic IP.

Static IP is also called as permanent address assigned to each device in a network, whereas Dynamic IP, a temporary address assigned to the device via DHCP software. IP address assigned to your service by your cable or DSL Internet provider is typically dynamic IP. In routers and operating systems, the default configuration for clients is dynamic IP.

What is the difference between public and private IP?

A public IP address allows equipment accessible to everyone on the internet. A private IP address is for private use within the network and allows many more PCs to be connected. If you are using a private IP and wants VOIP, you need to change to a public IP address.

What is Network Address Translation?
Network Address Translation acts as an agent between the Internet and a local network. It is a dynamic method which is used to minimize Internet connectivity needs. Network address translation describes the rewriting of the Internet Protocol (IP) addresses of data packets so that multiple transmissions require only one IP address.

What is subneting?
Subnet adds one level to the way IP address is represented. It logically organizes the network. For instance, it can logically group computers belongs to the finance department.

What is Routing Protocol?
Routing protocol is the way to send routing information between any routers in an autonomous system.

Explain the structure and use of internet addresses.
Each IP address is 32 bit long. In human language the IP addresses are written in dotted decimal notation. These are then converted to binary by the computer. Each IP address has two parts: Network identifier or a network ID and host ID. The current internet protocol standard is IPV4. The IP addresses are divided into three classes: a class A network, a class B network, and a class C network. Class A being the largest. The four digit numbers in an IPV4 address, each network of class A will have different first number, and then its network will be addressed by the rest of the three numbers, or three bytes. The IP addresses identify a machine to deliver packets and load web pages.

Digital Signatures?
Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender.

What is broadcast domain?
It is a logical area in a computer network where any computer connected to the network can directly transmit to any other computer in the domain without having to go through a routing device.

Diff b/w Bridge and switch
A bridge connects two different LAN networks. A switch is something like you can connect many computers to a switch and then one computer can connect to another through the switch. Switch is a unicast one to one connection.

What is a Router?
A router is a device or sometimes a software in a computer which decides the next network point to which a packet should be forwarded to reach its destination on Internet. It is usually included as part of the network switch and is located at a gateway, including each point-of-presence on the Internet. The router is connected to at least two networks and determines which way to send each information packet based on its understanding of the state of the networks it is connected to.

Describe the basics of internet routing.
When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables. Routing tables consist of a set of rules used to determine where these packets will travel. When a packet is received, a network device examines the packet and matches it to the routing table entry providing the best match for its destination. The packet keeps hopping until it reaches its destination.

Define gateway
A gateway is a network point that provides entrance into another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

What is firewall?
A firewall is a hardware or software installed to provide security to the private networks connected to the internet. They can be implemented in both hardware and software, or a combination of both. All data entering or leaving the Intranet passes through the firewall which allows only the data meeting the administrators’ rules to pass through it

What are the types of firewalls?

Packet Filtering Firewall:
This type of Firewall detects packets and block unnecessary packets and makes network traffic release.
Screening Router Firewalls:
It's a software base firewall available in Router provides only light filtering.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows and UNIX.
Hardware base Firewall:
Its device like box allows strong security from public network. Mostly used by big networks.
Proxy Server:
Proxy server allows all clients to access Internet with different access limits. Proxy server has its own firewall which filters the all packet from web server.

What is Ethernet technology?
Ethernet technology is a high speed broadcast bus technology. In this type, all the station shares a single ether channel and receives every single transmitted signal.

Some sql queries for beginners

SQL (Structured Query Language) is an ANSI standard computer language that allows you to access a database by execute queries, retrieve, insert, delete, update records etc. SQL is a standard language for accessing databases.

Q :What is SQL?
• SQL stands for Structured Query Language
• SQL is pronounced as /ˌɛs.kjuːˈɛl/
• SQL is designed for manipulate data in relational database management system

Q :What can you do with SQL?
• SQL can retrieve and update data from relational database management system by using data manipulation language.
• SQL can create and modify database schema and database objects such as tables, views, indexes... via data definition language.
• SQL can grant or revoke authorization to user through data control language.
SQL Data Manipulation Language (DML)
SQL data manipulation language (DML) is a main part of SQL statements. SQL DML allows you to retrieve data from the database tables in relational database management system (RDBMS). In addition, SQL DML allows you change or delete data from the database tables by using UPDATE and DELETE statements. Here are all the SQL statements related to the SQL data manipulation language:


SQL Syntax

1)SQL SELECT:-

SELECT Company, Country FROM Customers WHERE Country <> 'india'

SQL Result
Company Country
Wipro Delhi
HCL Noida
TCS Pune



2)SQL DELETE

SQL DELETE statement allows you to delete one or more records in a database table. The syntax of SQL DELETE statement is as follows:
1 DELETE FROM table_name
2 WHERE conditions

If you want to remove employee number 3 just execute the following query:
1 DELETE FROM employees
2 WHERE employeeID = 3


3) SQL INSERT :-
1 INSERT INTO table_name (column1, column2…)
2 VALUES (value1, value2,…).
example of inserting data into the Shippers table by using SQL INSERT statement.
1 INSERT INTO Shippers (companyName, phone)
2 VALUES ('Shippers','1-800-222-0451')

Insert multiple records into a database table
SQL INSERT statement also allows you to insert multiple records into a database table at a time. Here is the syntax:
1 INSERT INTO shippers(companyName,phone)
2 VALUES ('zte','1-800-782-1235'),
3 ('cms','1-800-225-1234')

4)SQL UPDATE
1 UPDATE table_name
2 SET column1 = value1,
3 column2 = value2
4 WHERE condition
Ex:- Suppose one of employee in the company get married and need to change her last name, so you have to make the change by using the SQL UPDATE statement. Here is the query to do so:
1 UPDATE employees
2 SET lastname = 'ram'
3 WHERE employeeID = 3.


How to Speed Up PC Performance

Slow Speed of computer is the main problem to do work is you also frustrate from slow speed of your computer. After follow these steps you will surly able to speed up your computer must read this blog for rise your computer speed.


Here are these tips to rise up your computer speed :-

1) Operating system choice:-

You will be amazed to know that your choice of choosing right windows or operating system could play a significant role on your CPU's performance.

2) Partitions:-

If there are having more number of partitions in your computer, it would help your windows more to find required data easily from your hard disk, when you run any file or program. I would suggest you to have more partition each having at least 5 GB memory and maximum 20 GB.

3) Follow these steps to check start up data when your computer is start after boot :-

Go to START->Run then type "MSCONFIG" then you can see which your memory consuming programs are.

If you do not want to do anything above and want shorter way with shorter improvements then create new user account and delete previous one. You will observe a slighter change and this also removes many errors if present in windows.

4)Defrag your hard drive :-

De-fragmenting your hard drive puts your data back into sequential order, making it.Easier for Windows to access it. As a result, the performance of your computer will Improve.
An excellent registry cleaner will allow show you how to speed up your PC
Using defrag techniques.

5) Use a Window's Optimization Tool :-

Using a Windows Optimization tool can give you a big boost in the the performance department. This takes the work out of your regular maintenance of organizing files, defragging your hard drive and other optimization task.

6) Manage Your Startups :-

By managing your Windows startup programs and services you can free of vital CPU resources that can re-allocated your PC performance. This is a quick and easy tweak learn how to speed up PC CPU access time.

7) Clean Windows Temp Files

Your Windows Temp files can swell to enormous sizes. This will eat up free space that could be allocated for applications you would like to use.

Wednesday, August 24, 2011

How does a computer virus harm the computer?

Virus can to much harmful for our computer like :-

1) Damage files
2) Damage programs
3) Delete files
4) Corrupt the operating system

Also,there are 4 types of viruses
1) General Viruses :- General computer viruses are packages of software that hide alongside other programs that seem valid. In most cases the virus is so small, and so well hidden, that by the time a user realizes it has "piggybacked" with his downloaded program, the virus has already started to cause its damage. Most general viruses act like human viruses. They do this by entering your system, and then taking advantage of it by using its components to duplicate itself and spread.

2)Trojans :- A trojan virus, sometimes referred to as a trojan horse, is named after its historical namesake. Just like the trojan horse in world history, a trojan disguises itself as something that it's not, but does not make itself known until it has made it onto your computer. Trojans can masquerade as games, programs or documents that you download online. Once you open the executable file, the trojan installs instead of the program and infects your computer. The trojan can then cause its damage, sometimes even erasing your hard disk. Unlike a general virus, a trojan is unable to duplicate itself automatically.

3) Worms :- A worm is an infection that exploits network connections. When a worm downloads itself onto your computer it uses network connections to other computers, as well as security holes to duplicate itself and spread. A worm uses one computer on a network system to scan all the other computers it is connected to for security holes. Once the worm finds a hole on another computer on the network, it copy and pastes itself into that computer by exploiting the security hole. It continues replicating until it runs out of computers to infect.

4)Email Viruses :- An email virus spreads as an attachment to an email. Sometimes this attachment can be seen, and other times it can't. Some email viruses can load onto your computer simply by opening an email into the preview frame. Once the virus has been opened, it automatically downloads its attachment to your computer. Some email viruses can also hijack your computer and send out copies of itself to everyone on your contacts list.