Saturday, 18 October 2014

Asslam O Alikum Friends:
                                        
          I hope every one will be fine.Today i have a very useful Technique for all of you.It is a common problem that our mostly friends remain worried about there corrupt files of there system.They think only solution for this is to re install window.Don,t worry friends there is also another method to recover your corrupt files without installing new window.
Today I am going to show you that how can you recover your corrupt files from your system.

To use this technique you require two things.

1:
You have to insert your window  in CD room 

2:
You have to go in Start menu then type RUN then type CMD and your command prompt will be opened
In command prompt you have to type "sfc/scannow.

This is a hidden command of window through which system check its files and system will recover its corrupt files automatically.Then  recover files will be open in new prompt and files will be recovered.
I have used this tip in Window xp.

If you like this Technique and have any problem about this tip  please comment and ask for anything.

              Our mostly friends remain worried about viruses of usb/Memory card and they did not know how to remove/delete them.

               Today i will show you that how can you  scan your usb/Memory card without any antivirus.To scan your USB/Memory card follow these steps

Step 1:
                For this you have to run your WINRAR.
                Then select your USB/Memory card.
Step 2:
                Then run it it will show you the effected files
Step 3:
                Delete these files.
Note:
            Some time it will not delete some files which means that virus has start working.
            To remove these files you will require antivirus

 

Monday, 6 October 2014

Today
 I am going to show you that how can you remove  bad sector from your computer by using  sea map.First i want to assure you that  by this method your partition will be lost but your bad sector will be removed from your computer.You can create your partition again by partition software which is available at this blog.There are 3 or 4 methods in sea map to remove bad sector from your computer but we will use the simplest one.First you have to open sea map.I have listen from many people that sea map did not remove bad sector it is because they did not know how to set options.There are following steps to remove bad sector from computer
Step 1:          
First to set option type SD then set drive options will come.then you can set options from 0 or 1 targeted drive.Then type 2 because hard derive is protected then it will ask for yes or no like Y/N.
Step 2: 
         Here you have to choose N so that writing should be possible on hard derive.Then press escape to come at command line.Then press Y at command line to start the formation of derive.
Step 3:   
       Then sea map will start formatting derive and let it finished for an hour.Then it will show you that format is finished.then you can do partition and normal formatting.If you like this post must comment and ask for any problem

Tuesday, 30 September 2014

Asslam o Alikum Friends

I hope all of You will be fine.Friends you are well know that there are many data recovery software to recover data from drives or memory cards.Some bad people are using this trick to black male the Girls and also to boys.These recovery software were made for us but we are using it wrong way.Today I am sharing a software with its help You will be able to completely eras your data.Then it will be permanently deleted.
Enjoy it.Remember me in your prayers

 Click Here to Download

Friday, 26 September 2014

Click on this & speed up your pc

Speed Up your PC
Asslam o Alikum 
                                           Friends ab idm se jan  chorain aur you tube aur Facebook  ke videos directly YTD se download karain very simple.
Just video ka URL copy karain aur YTD main khud se ye PASTE ho jay ga aur pher ap apni video download kar sakty hain easliy.
YTD download karny ka link ye ha http://www.mediafire.com/download/7vvlmw7t767tfcv/SetupYTD.exe

Tuesday, 23 September 2014




           Social Media Privacy
Social media is a competitive market. In the rush to add new features to current offerings, user privacy sometimes gets left on the back burner. Apps and plug-ins that utilize GPS location and single access sign-on present unique security concerns for users. Most social media features now require users to grant access to their personal information, including publicly shared pictures and status updates, before they can use the service. Users innocently share this data so that they can register for marketing incentives like coupons on raffle drawings.
The icing on the cake is that companies are largely left to their own devices when it comes to developing and instituting security policies. There is no universal security legislation, and companies are free to change their policies as they see fit. Facebook, for example, has changed their security policy and privacy settings numerous times in recent years, leaving some users feeling confused and unprotected.
But how much do users actually value their privacy? This report from NBC News shows data that suggests social media users value their privacy less than those who avoid social media networks. A poll conducted by The Ponemon Institute shows that feelings on privacy have become polarized. Thirty-six percent of participants said they felt privacy was less important than it was five years ago; the exact same percentage said they felt it was more important. Interestingly, the two groups agreed that they have less control over their information than they did five years ago.

    


Workplace Monitoring 
              Privacy can be an issue in the workplace, as well. As technology advances, employers are able to easily and inexpensively install and operate surveillance—from security cameras and motion detectors to software that tracks employee internet usage. Companies have several motivators for using these tools. Monitoring employees allows businesses to keep tabs on the dissemination of potentially confidential information, track productivity and even prevent lawsuits by watching for harassing behavior.

              Many questions arise from these practices. How much privacy, if any, are employees entitled to when using company equipment?
            Is it acceptable to conduct personal business at work? Do employers have a right to penalize employees for conduct and information relayed through social media while off the clock?
           As the law begins to catch up with the digital age, some of these questions will find concrete answers. For now, information technology personnel are the watchdogs and the gatekeepers.


Mobile Security
           Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre-emptively banned at a diner in Seattle due to the security implications of an unobtrusive mobile device capable of discreetly recording audio, video and still footage in public and private places. However, most security threats from mobile devices result from the manner in which the consumer uses the technology:

  • Consumers who elect to set PINs and passwords for their mobile devices often choose easily deciphered codes, such as 1234 or 0000. 
  • Users may unknowingly download malware disguised as a useful application.
  • Out-of-date operating systems may pose threats. OS manufacturers periodically release security patches and fixes, but it is up to the consumer to update their devices. Older devices may not support new updates to the OS.
  • Out-of-date software presents similar security risks. Attackers can exploit vulnerabilities in outdated software.
  • Wireless transmissions are not always encrypted, making information sent via mobile devices easier to intercept.
With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT specialists to help users avoid security and privacy mishaps—especially when those devices are used for company purposes.
                                  

Bring-Your-Own-Device Support
    In a BYOD program, employees use their own personal mobile devices to conduct business within the company. Allowing employees to use their own devices takes control away from the company. Corporate data stored on personal employee devices is at risk due to malware and information leaks, most notably resulting from the loss or theft of a device.
    A study conducted by research firm Gartner suggests that IT should obtain an employee’s consent to remotely wipe their device in the event of a security breach when the employee enrolls in the BYOD program. Gartner also recommends whitelisting and blacklisting certain applications and software.
             


                                      Cloud Strategy
Too often in IT, a wait-and-see approach is taken. Changes in workflow and project management arise from immediate need, and then IT swoops in to make sense of it all. Experts in the industry argue that this model is ill-advised for instituting a cloud strategy. Implementation needs to come from the top-down. This coming year will make or break the cloud enterprise, and the best method is to develop and implement a cogent plan. That plan may include hybrid models, since trust in cloud computing isn’t where it needs to be just yet. As the technology matures, more users will be comfortable getting on board.
Businesses will face a challenge in recruiting and retaining trained cloud engineers and support professionals. According to Forbes, a certification in cloud computing could mean a 30 to 50 percent pay increase. An online information technology degree can get you on the path to fulfilling this need. Visit King University Online to learn more about degree options that can put you on the fast track to an exciting career in IT.