Monday, 18 March 2013

TeamViewer - How to remotely operate a computer or what is teamViewer and how it works

Lots of computer software and hardware companies using team viewer to assist  there clients to get rid of problems. Team viewer is a software through which you can remotely operate a computer system by sitting anywhere else on other computer system.You can use team viewer to remotely access your friend's computer system.Is it secure..?? yes it is.. because no one can access your pc till (S)he has your id and password. and password changes everytime you open team viewer.





What is team viewer:- 
It is a Remote desktop utility. by using it u can remotely access any computer by sitting on your computer system.both parties connect to a server which sets up a session between both.



How team viewer works:-
One person opens up teamviewer and calls person B.  
Person A gives the ID and password to person B.  
Person B puts this information in teamviewer and hits connect.
now person B can access person A computer.


 Requirements to use team viewer:-
 First of all install team viewer (click here to download team viewer
Both parties must have team viewer



Directions to use team viewer :-
Open team viewer
Inform second party to open it too.
Ask them there team viewer id and password (password changes every time you open team viewer) if you want to acces there system or give them your password and id to allow them to access your computer system.
type in there id and password. if you want to access there computer system.
Click on " Connect To Partner "
now you are all set to access second party computer system.



Monday, 11 March 2013

Check if Pen Drive or Memory Card is Original or Fake

I found this tool interesting as I became the victim of this scam pen drives, so normally you can see people selling you these pen drives stating the size like 32Gb, 64Gb, 128Gb and many said like its capacity is 500Gb well I said ok technology is modernizing and maybe we can get that amount of space in really a small sized pen drive, but the complication's starts when they the price is just Rs. 300 Indian currency, so I was confused but I bought it and when I came home I plugged it in I started copying stuff first of all it did not write content more then 1Gb and secondly after one day it became useless.

Well this little tool can workout really good for you in analyzing your pen drive or memory card and giving you exact results if its space is fake or not. So now check below steps to see how this tool really works.


  • Download h2testw.zip file.
  • Now extract the downloaded tool and you will get the .exe file.




  • Now double click on it and start this tool.
  • So now just choose the English from top and then click on Select Target, now choose your Pen Drive or Memory Card (make sure its formatted before using this tool.
  • Now just click on Write + Verify and then wait for it to complete the whole process, it will take some time according to your drive's size.
  • Now after its complete it will show you message like complete without any errors, if you find no errors then your drive is good.

  • But if you find errors then your drive is fake or has some problems.
That's it now you can easily check any drive, so this tool will surely help you and your friends.....


Friday, 8 March 2013

Windows 7 Commands Every Administrator Should Know

C troubleshooting is becoming less common in larger organizations, but consultants and techs in smaller shops still have to get their hands dirty identifying and fixing desktop problems. Oftentimes, troubleshooting Windows 7 means delving into the command line. Here are 10 fundamental Windows 7 commands you might find helpful.


1: System File Checker

Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:

sfc /scannow

2: File Signature Verification

One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:

sigverif

3: Driverquery

Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:

driverquery

If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:

driverquery -v

driverquery -si

4: Nslookup

The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.

To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:

nslookup dc1.contoso.com

5: Ping

Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:

ping 192.168.1.1

Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.

6: Pathping

Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.

Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:

pathping 192.168.1.1

7: Ipconfig

The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:

ipconfig /all

Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:

ipconfig /release

ipconfig /renew

Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:

ipconfig /flushdns

8: Repair-bde

If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:

repair-bde -rk | rp 

You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:

repair-bde c: d: -rk e:\recovery.bek

repair-bde c: d: -rp 111111-111111-111111-111111-111111-111111

9: Tasklist

The tasklist command is designed to provide information about the tasks that are running on a Windows 7 system. At its most basic, you can enter the following command:

tasklist

The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:

tasklist -m

tasklist -svc

10: Taskkill

The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:

taskkill -pid 4104

taskkill -im iexplore.exe

:) :) 

Nitro PDF Pro + crack

Nitro Pro  lets you quickly and easily create professional-quality PDF documents from any format or content type: paper scans, spreadsheets, presentations, reports, and more.


Features :

Combine Files to PDF

Convert a collection of different types of files and then combine them into a searchable, easy-to-share PDF file.
Convert PDF to 
Microsoft Word, while retaining graphics, text formatting, paragraphs, columns, tables, headers and footers, and more.
Detect and extract tables from PDF files and convert into fully formatted Microsoft Excel spreadsheets, with options to specify single- or multi-sheet output.
Convert PDF documents to image formats - like TIFF - for compliance and archival purposes.

Snapshot + Copy

Use the Snapshot tool to select and copy content from anywhere in a document to your clipboard for reuse in other applications.


Scan to PDF

Scan paper and recognize text all in one task, and batch-convert large collections quickly, direct from auto-feed scanners.
Digital Signatures

Use encrypted digital signatures, fast, with reusable one-click profiles. Easily track all signed versions of the contract from inside one PDF file.

Passwords :

Add simple and secure password protection to documents.

Highlights
  • Create PDFs with a single click from Microsoft® Word, Excel®, and PowerPoint® files.
  • Combine different file formats onto a single PDF, including spreadsheets, images, documents, presentations, etc.
  • Easily edit documents: Add, delete or rearrange pages, modify page elements such as text and images, and much more.
PDF Nitro 


Smiley

USB Safely Remove full version with crack

 USB Safely Remove is a USB device manager. It saves time and extends user abilities on active work with flash-drives, portable drives, card readers and other gadgets.





A handy menu to stop devices

The main disadvantage of using the built-in Windows safe removal tool is that when using several hot-plug devices it is often quite difficult to recognize which device needs to be stopped. Most devices have the same name: "USB mass storage device". In addition, Windows does not let you hide a device you would not want to stop from the menu.


USB Safely Remove saves you from these problems and offers an original and multifunctional stopping menu, which displays actual device names with icons. Using this menu you can find and stop a device in a snap!


Keyboard shortcuts to safe removal

Like to do everything using the keyboard? Now you can stop and view devices with only ONE hotkey! No need to remember keyboard shortcuts for each device. Being in any application, press the key combination (Win+S by default) and you will see the stop menu. Use the Up\Down Arrow keys to select the device you need and either press Enter to stop it or Ctrl B to view the contents of a device disk. Also you can assign a dedicated hotkey to stop a certain device.




Ejecting memory cards rather than the card reader

If you had safely removed a card reader, you would need to physically reconnect it in order to make it work with cards again (or to use "Return device back" feature of the program). In the case of two or more memory cards connected to the card reader at the same time, they all become unavailable in the system after you stop the card reader. USB Safely Remove lets you eject memory cards one-by-one. Moreover, if the memory card was locked by any processes, the program would display these "locking" processes as well as it does on failure to stop a whole device.

Return Device Back!

After you had stopped the device, but still did not unplug it, sometimes it is quite useful to return it back into the system. For example if you remembered that you forgot to write a file to the external drive. In order to do it, you have to physically reconnect the device, however sometimes it's quite inconvenient to do, e.g. if the device is connected to the rear panel of the computer.




Install Notes :
1) download and install it.
2)Copy the content of crack file into C:\Program Files\USBsafelyRemove folder.

Enjoy!!





Tuesday, 5 March 2013

TypingMaster Pro full version



User Friendly and Efficient

TypingMaster Pro's complete typing curriculum leads students step-by-step to fluent error-free typing. After learning the correct technique and using it in real life, students will typically type 3-5 times faster with over 98% accuracy.

It takes only from 6 to 10 hours to learn the basics of touch typing with TypingMaster. After this students can start using their new skill in their everyday life. Shortly their keyboarding will become subconscious and fluent.


Benefits of Typing Master Pro
1.Accelerate your typing speed:With TypingMaster a novice keyboard user can learn to type many times faster. Clumsy typing will no longer interrupt the flow of your thoughts!

2.Get rid of typos :Get rid of those annoying typing errors and increase the quality of your texts.
3.Save valuable work time :Learning to touch type will help save dozens of working hours each year as you type faster and do not need to correct errors constantly.

4.Focus on your text and ideas:With fluent keyboarding skills you can put your brain power into expressing your thoughts instead of finding the right keys.

5.Improve your ergonomics :Natural, efficient finger movements and no need to look at the keyboard results in less stress in fingers, arms and neck.

6.Be confident with computers:Improved typing skills will help take full advantage of your computer as you become more confident with the keyboard.

.

Easy Networking

TypingMaster is fully compatible with all Windows and Novell networks.

Download Typing Master :-

Install Notes:
1. Disable the network connection or Disconnect from your internet connection otherwisethe serial key will not work.
2. Install the program by run  TypingMasterENG.exe
3. Wait till finish the installation process.
4. launch typing master pro and enter the license key.
5. Close the program and go to the program files of Typing Master (e.g. C:/Program Files/TypingMaster)
6. Select the file "tmaster8.net".
7. Right click on the file and choose properties Then apply attribute to read only.
8. Then enable your network connection.
:P:P