Monday, 18 March 2013

TeamViewer - How to remotely operate a computer or what is teamViewer and how it works

Lots of computer software and hardware companies using team viewer to assist  there clients to get rid of problems. Team viewer is a software through which you can remotely operate a computer system by sitting anywhere else on other computer system.You can use team viewer to remotely access your friend's computer system.Is it secure..?? yes it is.. because no one can access your pc till (S)he has your id and password. and password changes everytime you open team viewer.





What is team viewer:- 
It is a Remote desktop utility. by using it u can remotely access any computer by sitting on your computer system.both parties connect to a server which sets up a session between both.



How team viewer works:-
One person opens up teamviewer and calls person B.  
Person A gives the ID and password to person B.  
Person B puts this information in teamviewer and hits connect.
now person B can access person A computer.


 Requirements to use team viewer:-
 First of all install team viewer (click here to download team viewer
Both parties must have team viewer



Directions to use team viewer :-
Open team viewer
Inform second party to open it too.
Ask them there team viewer id and password (password changes every time you open team viewer) if you want to acces there system or give them your password and id to allow them to access your computer system.
type in there id and password. if you want to access there computer system.
Click on " Connect To Partner "
now you are all set to access second party computer system.



Monday, 11 March 2013

Check if Pen Drive or Memory Card is Original or Fake

I found this tool interesting as I became the victim of this scam pen drives, so normally you can see people selling you these pen drives stating the size like 32Gb, 64Gb, 128Gb and many said like its capacity is 500Gb well I said ok technology is modernizing and maybe we can get that amount of space in really a small sized pen drive, but the complication's starts when they the price is just Rs. 300 Indian currency, so I was confused but I bought it and when I came home I plugged it in I started copying stuff first of all it did not write content more then 1Gb and secondly after one day it became useless.

Well this little tool can workout really good for you in analyzing your pen drive or memory card and giving you exact results if its space is fake or not. So now check below steps to see how this tool really works.


  • Download h2testw.zip file.
  • Now extract the downloaded tool and you will get the .exe file.




  • Now double click on it and start this tool.
  • So now just choose the English from top and then click on Select Target, now choose your Pen Drive or Memory Card (make sure its formatted before using this tool.
  • Now just click on Write + Verify and then wait for it to complete the whole process, it will take some time according to your drive's size.
  • Now after its complete it will show you message like complete without any errors, if you find no errors then your drive is good.

  • But if you find errors then your drive is fake or has some problems.
That's it now you can easily check any drive, so this tool will surely help you and your friends.....


Friday, 8 March 2013

Windows 7 Commands Every Administrator Should Know

C troubleshooting is becoming less common in larger organizations, but consultants and techs in smaller shops still have to get their hands dirty identifying and fixing desktop problems. Oftentimes, troubleshooting Windows 7 means delving into the command line. Here are 10 fundamental Windows 7 commands you might find helpful.


1: System File Checker

Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:

sfc /scannow

2: File Signature Verification

One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:

sigverif

3: Driverquery

Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:

driverquery

If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:

driverquery -v

driverquery -si

4: Nslookup

The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.

To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:

nslookup dc1.contoso.com

5: Ping

Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:

ping 192.168.1.1

Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.

6: Pathping

Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.

Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:

pathping 192.168.1.1

7: Ipconfig

The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:

ipconfig /all

Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:

ipconfig /release

ipconfig /renew

Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:

ipconfig /flushdns

8: Repair-bde

If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:

repair-bde -rk | rp 

You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:

repair-bde c: d: -rk e:\recovery.bek

repair-bde c: d: -rp 111111-111111-111111-111111-111111-111111

9: Tasklist

The tasklist command is designed to provide information about the tasks that are running on a Windows 7 system. At its most basic, you can enter the following command:

tasklist

The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:

tasklist -m

tasklist -svc

10: Taskkill

The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:

taskkill -pid 4104

taskkill -im iexplore.exe

:) :)