Saturday, September 10, 2011

10 Best Hacker Movies (Films about Computer Hacking) of All Time

I have here my top 10 list or my all time favorite hacker movies or films that involve computer hacking. Feel free to share yours on the comment section later on:


10. Swordfish
If you are a big fan of Halle Berry and of course, computers, then this movie is for you. This action-packed film involves a high-tech robber/villain named Gabriel Shear (John Travolta) against Stanley Jobson (Hugh Jackman), a super hacker convicted by the FBI but who is trying to stay clean. Gabriel is the leader of a covert counter-terrorist unit called Black Cell who wants to steal $9.5 billion worth of money from a secret government slush fund (codenamed Swordfish). But since it's locked up behind a complicated encryption system, he offers the desperate Stanley $10 million to hack into the system and steal the money for him.


Top 10 Best Games of 2010-2011

1. Call Of Duty: Black OpsXbox-Call-of-Duty-Black-Ops___512747
Call of Duty have always been a favorite among the game geeks since the first series. They were voted the best action/shooting game multiple times throughout their franchise.
The Call of Duty black Ops takes on the legacy superbly with awesome graphics, gameplay and story. The campaign is exciting and varied and the multiplayer mode is just too exciting. A Zombie series have been included in this game.
The Game is easily the best of 2010! The only problem of the game is that it gets over very quickly.

Top 10 Expensive Laptops in the World 2011


Top 10 Expensive Laptops in the World 2011
10. Acer Ferrari 1100: $3000
Acer Ferrari laptop is built just like the Ferrari car. It’s built with ultralight design that wear resistant carbon fiber chassis. The laptop is built using AMD Turion X2 Dual Core CPU, 4 GB of RAM and of course all other features like Wifi. With the good specification of hardware, it’s hoped that it will get the maximal speed like Ferrari car. It’s a worthed buying with $ 3000. The reason to buy this most expensive laptop usually for the performance and of course for appearance.
10

Create Your Own Customized Run Commands


Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
Create Shortcut

Hacking & Security Related Movies

Swordfish (2001)
Swordfish (2001)
Hackers 2: Takedown
Hackers 2: Takedown
Antitrust (2001)
Antitrust (2001)
Sneakers (1992)
Sneakers (1992)
Die Hard 4 (2007)
Die Hard 4 (2007)
The Net (1995)
The Net (1995)
Hackers (1995)
Hackers (1995)
Tron (1982)
Tron (1982)
Tron: Legacy (2010)
Tron: Legacy (2010)
WarGames (1983)
WarGames (1983)

Hide partitions without using any software

  1. Go to Start->Run.
  2. Type DISKPART and press Enter.
  3. In the console type list volume to see all the drives available on your PC.
  4. Now select the drive which you want to hide. Suppose you want to hide D see the volume number opposite to Ltr D.
  5. In My PC it is volume 4 for drive D(might be different in your computer) .
  6. Now to hide drive D type Select volume 4 .(Select the appropriate number according to your system)
  7. Then type remove letter d , this will hide your drive.
  8. Now to get your drive back type Select volume 4 and then type assign letter d .
  9. See this image

Top 10 Richest Person in Technology 2011 | Net Worth

1. Bill Gates
tech -1
Net worth: $53 billion
Despite his net worth rising $13 billion since last year, software visionary Gates dropped in rank to the world’s second richest man, beaten by Mexican telecom mogul Carlos Slim Helu. A big reason for Gates’ larger fortune: Microsoft shares rose 50% in the last 12 months. Other investments include Four Seasons hotels, Televisa and AutoNation. Gates stepped down from day-to-day duties at Microsoft in July 2008 to focus on philanthropy at the Bill & Melinda Gates Foundation.

Access Multiple Gmail accounts in Firefox without logout

 

Are you having multiple gmail accounts? As far as browsers concerned , we can log-in with only one gmail account. Here i am going to introduce a new Mozilla add on. This add on will allow you to log-in in multiple account without log-out the accounts.





How to do?

Sunday, September 4, 2011

Internet History Urdu 1


Internet History Video 2


Internet History Video 1

Internet History Part 4

1990

Internet History Poster
ARPANET formally shuts down. In twenty years, ‘the net’ has grown from 4 to over 300,000 hosts. Countries connecting in 1990 include Argentina, Austria, Belgium, Brazil, Chile, Greece, India, Ireland, South Korea, Spain, and Switzerland. Several search tools, such as ARCHIE, Gopher, and WAIS start to appear. Institutions like the National Library of Medicine, Dow Jones, and Dialog are now on line.

Internet History Part 3

1980

Internet
Landweber’s proposal has many enthusiastic reviewers. At an NSF-sponsored workshop, the idea is revised in a way that both wins approval and opens up a new epoch for NSF itself. The revised proposal includes many more universities. It proposes a three-tiered structure involving ARPANET, a TELENET-based system, and an e-mail only service called PhoneNet. Gateways connect the tiers into a seamless whole. This brings the cost of a site within the reach of the smallest universities. Moreover,

Internet History Part 2


1970

DEC PDP-10
DEC's PDP-10




DEC PDP-11
DEC's PDP-11

Nodes are added to the ARPANET at the rate of one per month. Programmers Dennis Ritchie and Kenneth Thompson at Bell Labs complete the UNIX operating system on a spare DEC minicomputer. UNIX combines many of the time-sharing and file-management features offered by Multics and wins a wide following, particularly among scientists.
Bob Metcalfe builds a high-speed (100 Kbps) network interface between the MIT IMP and a PDP-6 to the ARPANET. It runs for 13 years without human intervention.

Internet History Part 1

History of the Internet Poster


"In the Beginning, ARPA created the ARPANET. And the ARPANET was without form and void.
And darkness was upon the deep.

An Illustrated History of Computers Part 4

___________________________________

John Kopplin © 2002

The title of forefather of today's all-electronic digital computers is usually awarded to ENIAC, which stood for Electronic Numerical Integrator and Calculator. ENIAC was built at the University of Pennsylvania between 1943 and 1945 by two professors, John Mauchly and the 24 year old J. Presper Eckert, who got funding from the war department after promising they could build a machine that would replace all the "computers", meaning the women who were employed calculating the firing tables for the army's artillery guns. The day that Mauchly and Eckert saw the first small piece of ENIAC work, the persons they ran to bring to their lab to show off their progress were some of these female computers (one of whom remarked, "I was astounded that it took all this equipment to multiply 5 by 1000").
ENIAC filled a 20 by 40 foot room, weighed 30 tons, and used more than 18,000 vacuum tubes. Like the Mark I, ENIAC employed paper card readers obtained from IBM (these were a regular product for IBM, as they were a long established part of business accounting machines, IBM's forte). When operating, the ENIAC was silent but you knew it was on as the 18,000 vacuum tubes each generated waste heat like a light bulb and all this heat (174,000 watts of heat) meant that the computer could only be operated in a specially designed room with its own heavy duty air conditioning system. Only the left half of ENIAC is visible in the first picture, the right half was basically a mirror image of what's visible.

An Illustrated History of Computers Part 3

___________________________________

John Kopplin © 2002

IBM continued to develop mechanical calculators for sale to businesses to help with financial accounting and inventory accounting. One characteristic of both financial accounting and inventory accounting is that although you need to subtract, you don't need negative numbers and you really don't have to multiply since multiplication can be accomplished via repeated addition.
But the U.S. military desired a mechanical calculator more optimized for scientific computation. By World War II the U.S. had battleships that could lob shells weighing as much as a small car over distances up to 25 miles. Physicists could write the equations that described how atmospheric drag, wind, gravity, muzzle velocity, etc. would determine the trajectory of the shell. But solving such equations was extremely laborious. This was the work performed by the human computers. Their results would be published in ballistic "firing tables" published in gunnery manuals. During World War II the U.S. military scoured the country looking for (generally female) math majors to hire for the job of computing these tables. But not enough humans could be found to keep up with the need for new tables. Sometimes artillery pieces had to be delivered to the battlefield without the necessary firing tables and this meant they were close to useless because they couldn't be aimed properly. Faced with this situation, the U.S. military was willing to invest in even hair-brained schemes to automate this type of computation.
One early success was the Harvard Mark I computer which was built as a partnership between Harvard and IBM in 1944. This was the first programmable digital computer made in the U.S. But it was not a purely electronic computer. Instead the Mark I was constructed out of switches, relays, rotating shafts, and clutches. The machine weighed 5 tons, incorporated 500 miles of wire, was 8 feet tall and 51 feet long, and had a 50 ft rotating shaft running its length, turned by a 5 horsepower electric motor. The Mark I ran non-stop for 15 years, sounding like a roomful of ladies knitting. To appreciate the scale of this machine note the four typewriters in the foreground of the following photo.

An Illustrated History of Computers Part 2

___________________________________

John Kopplin © 2002

Just a few years after Pascal, the German Gottfried Wilhelm Leibniz (co-inventor with Newton of calculus) managed to build a four-function (addition, subtraction, multiplication, and division) calculator that he called the stepped reckoner because, instead of gears, it employed fluted drums having ten flutes arranged around their circumference in a stair-step fashion. Although the stepped reckoner employed the decimal number system (each drum had 10 flutes), Leibniz was the first to advocate use of the binary number system which is fundamental to the operation of modern computers. Leibniz is considered one of the greatest of the philosophers but he died poor and alone.



Leibniz's Stepped Reckoner (have you ever heard "calculating" referred to as "reckoning"?)
In 1801 the Frenchman Joseph Marie Jacquard invented a power loom that could base its weave (and hence the design on the fabric) upon a pattern automatically read from punched wooden cards, held together in a long row by rope. Descendents of these punched cards have been in use ever since (remember the "hanging chad" from the Florida presidential ballots of the year 2000?).



Jacquard's Loom showing the threads and the punched cards

An Illustrated History of Computers Part 1

___________________________________

John Kopplin © 2002

The first computers were people! That is, electronic computers (and the earlier mechanical computers) were given this name because they performed the work that had previously been assigned to people. "Computer" was originally a job title: it was used to describe those human beings (predominantly women) whose job it was to perform the repetitive calculations required to compute such things as navigational tables, tide charts, and planetary positions for astronomical almanacs. Imagine you had a job where hour after hour, day after day, you were to do nothing but compute multiplications. Boredom would quickly set in, leading to carelessness, leading to mistakes. And even on your best days you wouldn't be producing answers very fast. Therefore, inventors have been searching for hundreds of years for a way to mechanize (that is, find a mechanism that can perform) this task.




This picture shows what were known as "counting tables" [photo courtesy IBM]

Saturday, September 3, 2011

Speccy Latest

System Information

Speccy PreviewSpeccySpeccy is an advanced System Information tool for your PC. Need to find out what's inside your computer? No problem! Speccy will give you all the information you need.


Overview

What's in your computer? If you're like most of us, you can probably name the processor (Intel or AMD, Celeron or Pentium), maybe how much RAM it has, and maybe how big the hard drive is.
When you go to a computer store and see all the bright shiny PCs laid out next to each other, most will have tags or stickers indicating the:

Recuva Latest

File Recovery

Recuva PreviewRecuvaAccidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!






Defraggler Latest

Disk Defragmentation

Defraggler PreviewDefragglerUse Defraggler to defrag your entire hard drive, or individual files - unique in the industry. This compact and portable Windows application supports NTFS and FAT32 file systems.





CCleaner Latest

 

CCleaner PreviewOptimization and Cleaning

CCleanerCCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.

Cleans all areas of your Computer

Internet Explorer Internet Explorer
Temporary files, history, cookies, Autocomplete form history, index.dat.
Firefox Firefox
Temporary files, history, cookies, download history, form history.
Google Chrome Google Chrome
Temporary files, history, cookies, download history, form history.
Opera Opera

Thursday, September 1, 2011

ESET Smart Security with User & Pass Finder


The long-time development experience of our experts is demonstrated by the entirely new architecture of the ESET Smart Security program, which guarantees maximum detection with minimum system requirements. The complex security solution contains modules with several advanced options. The following list offers you a brief overview of these modules.

Antivirus & Antispyware

This module is built upon the ThreatSense® scanning core, which was used for the first time in the award-winning NOD 32 Antivirus system. The ThreatSense® core is optimized and improved with the new ESET Smart Security architecture.
Feature Description
Improved cleaning The antivirus system now intelligently cleans and deletes most of the detected infiltrations without requiring user intervention.

LinkWithin

Related Posts Plugin for WordPress, Blogger...