Tuesday, 30 September 2014

Asslam o Alikum Friends

I hope all of You will be fine.Friends you are well know that there are many data recovery software to recover data from drives or memory cards.Some bad people are using this trick to black male the Girls and also to boys.These recovery software were made for us but we are using it wrong way.Today I am sharing a software with its help You will be able to completely eras your data.Then it will be permanently deleted.
Enjoy it.Remember me in your prayers

 Click Here to Download

Friday, 26 September 2014

Click on this & speed up your pc

Speed Up your PC
Asslam o Alikum 
                                           Friends ab idm se jan  chorain aur you tube aur Facebook  ke videos directly YTD se download karain very simple.
Just video ka URL copy karain aur YTD main khud se ye PASTE ho jay ga aur pher ap apni video download kar sakty hain easliy.
YTD download karny ka link ye ha http://www.mediafire.com/download/7vvlmw7t767tfcv/SetupYTD.exe

Tuesday, 23 September 2014




           Social Media Privacy
Social media is a competitive market. In the rush to add new features to current offerings, user privacy sometimes gets left on the back burner. Apps and plug-ins that utilize GPS location and single access sign-on present unique security concerns for users. Most social media features now require users to grant access to their personal information, including publicly shared pictures and status updates, before they can use the service. Users innocently share this data so that they can register for marketing incentives like coupons on raffle drawings.
The icing on the cake is that companies are largely left to their own devices when it comes to developing and instituting security policies. There is no universal security legislation, and companies are free to change their policies as they see fit. Facebook, for example, has changed their security policy and privacy settings numerous times in recent years, leaving some users feeling confused and unprotected.
But how much do users actually value their privacy? This report from NBC News shows data that suggests social media users value their privacy less than those who avoid social media networks. A poll conducted by The Ponemon Institute shows that feelings on privacy have become polarized. Thirty-six percent of participants said they felt privacy was less important than it was five years ago; the exact same percentage said they felt it was more important. Interestingly, the two groups agreed that they have less control over their information than they did five years ago.

    


Workplace Monitoring 
              Privacy can be an issue in the workplace, as well. As technology advances, employers are able to easily and inexpensively install and operate surveillance—from security cameras and motion detectors to software that tracks employee internet usage. Companies have several motivators for using these tools. Monitoring employees allows businesses to keep tabs on the dissemination of potentially confidential information, track productivity and even prevent lawsuits by watching for harassing behavior.

              Many questions arise from these practices. How much privacy, if any, are employees entitled to when using company equipment?
            Is it acceptable to conduct personal business at work? Do employers have a right to penalize employees for conduct and information relayed through social media while off the clock?
           As the law begins to catch up with the digital age, some of these questions will find concrete answers. For now, information technology personnel are the watchdogs and the gatekeepers.


Mobile Security
           Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre-emptively banned at a diner in Seattle due to the security implications of an unobtrusive mobile device capable of discreetly recording audio, video and still footage in public and private places. However, most security threats from mobile devices result from the manner in which the consumer uses the technology:

  • Consumers who elect to set PINs and passwords for their mobile devices often choose easily deciphered codes, such as 1234 or 0000. 
  • Users may unknowingly download malware disguised as a useful application.
  • Out-of-date operating systems may pose threats. OS manufacturers periodically release security patches and fixes, but it is up to the consumer to update their devices. Older devices may not support new updates to the OS.
  • Out-of-date software presents similar security risks. Attackers can exploit vulnerabilities in outdated software.
  • Wireless transmissions are not always encrypted, making information sent via mobile devices easier to intercept.
With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT specialists to help users avoid security and privacy mishaps—especially when those devices are used for company purposes.
                                  

Bring-Your-Own-Device Support
    In a BYOD program, employees use their own personal mobile devices to conduct business within the company. Allowing employees to use their own devices takes control away from the company. Corporate data stored on personal employee devices is at risk due to malware and information leaks, most notably resulting from the loss or theft of a device.
    A study conducted by research firm Gartner suggests that IT should obtain an employee’s consent to remotely wipe their device in the event of a security breach when the employee enrolls in the BYOD program. Gartner also recommends whitelisting and blacklisting certain applications and software.
             


                                      Cloud Strategy
Too often in IT, a wait-and-see approach is taken. Changes in workflow and project management arise from immediate need, and then IT swoops in to make sense of it all. Experts in the industry argue that this model is ill-advised for instituting a cloud strategy. Implementation needs to come from the top-down. This coming year will make or break the cloud enterprise, and the best method is to develop and implement a cogent plan. That plan may include hybrid models, since trust in cloud computing isn’t where it needs to be just yet. As the technology matures, more users will be comfortable getting on board.
Businesses will face a challenge in recruiting and retaining trained cloud engineers and support professionals. According to Forbes, a certification in cloud computing could mean a 30 to 50 percent pay increase. An online information technology degree can get you on the path to fulfilling this need. Visit King University Online to learn more about degree options that can put you on the fast track to an exciting career in IT.


    





Sunday, 21 September 2014

                                 
Today I am showing you different shortcuts of keyboard....

 CTRL+C (Copy) 
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)

CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)

F2 key (Rename the selected item)

CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)

CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)

CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)

CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)

F3 key (Search for a file or a folder)

ALT+ENTER (View the properties for the selected item)

ALT+F4 (Close the active item, or quit the active program)

ALT+ENTER (Display the properties of the selected object)

ALT+SPACEBAR (Open the shortcut menu for the active window)

CTRL+F4 (Close the active document in programs that enable you to
 have multiple documents open simultaneously)

ALT+TAB (Switch between the open items)

ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)

F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)

ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)

F10 key (Activate the menu bar in the active program)

RIGHT ARROW (Open the next menu to the right, or open a submenu)

LEFT ARROW (Open the next menu to the left, or close a submenu)

F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)

ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)

CTRL+SHIFT+TAB (Move backward through the tabs)

TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)


ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)

Arrow keys (Select a button if the active option is a group of option buttons)

F1 key (Display Help)

F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

m*cro$oft Natural Keyboard Shortcuts

Windows Logo (Display or hide the Start menu)

Windows Logo+BREAK (Display the System Properties dialog box)

Windows Logo+D (Display the desktop)

Windows Logo+M (Minimize all of the windows)

Windows Logo+SHIFT+M (Restore the minimized windows)


Windows Logo+E (Open My Computer)

Windows Logo+F (Search for a file or a folder)

CTRL+Windows Logo+F (Search for computers)

Windows Logo+F1 (Display Windows Help)

Windows Logo+ L (Lock the keyboard)

Windows Logo+R (Open the Run dialog box)

Windows Logo+U (Open Utility Manager)

Accessibility Keyboard Shortcuts

Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)

Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)

Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)

NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)

NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)

RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)

DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)

CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)


m*cro$oft Management Console (MMC) Main Window Keyboard Shortcuts

CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)


SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)


F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation

CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)

ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
m*cro$oft Internet Explorer Navigation

CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)

CTRL+O (Open the Open dialog box, the same as CTRL+L)

CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)

CTRL+W (Close the current window)
                                     

                                          Friends

 today i will show that how can you make   Make free calls from PC to Mobil.It was never easy to make a free international call like this before.

You can now make free calls from your PC to any mobile in the world.All you need is a Yahoo messenger,a mic and a decent internet connection.I’m now using this free call method for over a month now and the great thing is that, this trick can be used to make unlimited call to mobiles all over the world and not limited to United states.
It even works to make free local mobile calls in India and Pakistan.

So how do we make a call from PC to mobile phone for free.


Install Yahoo messenger,in case you don’t have it (go for the latest one which have voice support) 


Sign into your yahoo messenger.
Configure your microphone and headset(don’t use speakers as it cause disturbances).


Inside your Yahoo messenger dial 18003733411 and press enter.


An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service.

Just hear the services options until they say the last one as “Free Call”.When you hear this,don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.

After this voice message is detected by their system ,they will run a short advertisement of their sponsor and make sure you don’t press any number at this time.


WAIT UNTIL YOU HEAR THIS MESSAGE “Please dial the phone number country code first,don’t forget to dial 92 for Pakistan”


After you hear this message ,immediately dial the destination number of your choice along with the country code.(eg for north america it’s 1 and for india it’s 91)


Your call will get connected and you can talk for 7 minutes continuous for free.When it gets disconnected, repeat the same procedure again.You can make multiple and unlimited calls with this service. 


It was never easy to make a free international call like this before.

So what’s the catch?

FREE411 service toll-free number is based in USA.This company gets paid for the advertisements from sponsors.


Are there any limits on the number of call which we can make?


No.There is no limit on the number of free calls which can be made through this system.
So enjoy this trick to make free international and local calls and make sure you don’t abuse the system.

                                  

 Friends
 today I will show you that how can you change your IP adress.There are very simple steps to change your Ip adress.

Step 1:
             Click on "Start" in the bottom left hand corner of screen

Step 2:
          Click on "Run"

Step 3:
Type in "command" and hit ok
          You should now be at an MSDOS prompt screen.

Step 4:
           Type "ipconfig /release" just like that, and hit "enter"

Step 5:
          Type "exit" and leave the prompt

Step 6:
           Right-click on "Network Places" or "My Network Places" on your desktop.

Step 7:
         Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

Step 8:
          Right click on "Local Area Connection" and click "properties"

Step 9:
           Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab

Step 10:
            Click on "Use the following IP address" under the "General" tab

Step 11:
             Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
Step 12:
            Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.

Step 13:

            Hit the "Ok" button here
Step 14:
              Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.

Step 15:
            Right-click back on "Local Area Connection" and go to properties again.

Step 16:
            Go back to the "TCP/IP" settings

Step 17:
            This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"

Step 19:

             Hit "Ok" again

Step 20:  
You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

Note:
This only changes your dynamic IP address, not your ISP/IP address.

Haye friends main ap k leye lai hun all sim method. 
matlab jo sim band ho r agr us ke sim lagao ofer k leye ap ko kia milana parhey ga 

ufone= *5000# ya *234#

jazz= *551# 

warid= free send to 3733 


telenor= dail 222 or *222#
                                                     
                                                          zong=y send to 2244                                                               

IT....
ständs för "ïnförmätïön tëċhnölöġÿ," änd ïs prönöünċëd "ï.t." ït rëfërs tö änÿthïnġ rëlätëd tö ċömpütïnġ tëċhnölöġÿ, süċh äs nëtwörkïnġ, härdwärë, söftwärë, thë ïntërnët, ör thë pëöplë thät wörk wïth thësë tëċhnölöġïës. mänÿ ċömpänïës nöw hävë ït dëpärtmënts för mänäġïnġ thë ċömpütërs, nëtwörks, änd öthër tëċhnïċäl ärëäs öf thëïr büsïnëssës. ït jöbs ïnċlüdë ċömpütër pröġrämmïnġ, nëtwörk ädmïnïsträtïön, ċömpütër ënġïnëërïnġ, wëb dëvëlöpmënt, tëċhnïċäl süppört, änd mänÿ öthër rëlätëd öċċüpätïöns. sïnċë wë lïvë ïn thë "ïnförmätïön äġë," ïnförmätïön tëċhnölöġÿ häs bëċömë ä pärt öf öür ëvërÿdäÿ lïvës. thät mëäns thë tërm "ït," älrëädÿ hïġhlÿ övërüsëd, ïs hërë tö stäÿ.