Sandeep Kumar

A blog By Sandeep kumar

Posts Tagged ‘Computer’

Films By Programmers

Posted by Sandeep Kumar on October 20, 2010

Socho ki agar…..ab computer technology se
related filme banne lage
toh unka title kya hoga……….
some are:–

1.Hang to hona hi tha
2.Hamara disc aapke paas hai
3.Programmer no.1
4.Mujhse chat karoge
5.Hum aapke memory mein rehte hain
6.Java waale job le jayenge
7.Do proccesor barah terminal
8.Tera code chal gaya
9.Har din jo mail karega
10.Network ke uss paar
11.Mera naam developer
12.Debugging koi khel nahin
13.Jis computer mein virus rehta hai
14.Humko orkuting se pyar hai
15.Client ek numbari programmer dus numbari
16.Login karo saajna
17.Naukar PC ka
18.1942-A bug story
19.Kaho na virus hai
20.Crash se crash tak
21.Haan maine bhi debug kiya hai
22.Password de ke dekho
23.Terminal apna login parayi
24.Mr.Network lal
25.Ek computer ek programmer
26.Scrap kiya to darna kya!

Posted in Funny Sms | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

How To Get Rid Of Cookies?

Posted by Sandeep Kumar on September 20, 2010

When you visit some website then information about you and the pages you have visited gets stored in HTTP cookies or simply cookies.

What Are Web Cookies?

Cookies The information sent by a website or web server about you to your browser is stored in cookies. Whole of data is stored in your hard disk.

Authenticating sessions, tracking sessions with websites that need log-ins and maintaining preferences like page layout, page size and other features are stored in cookies but the main purpose of cookies is to differentiate users from each other and remembering them. For accessing website’s services, cookies also remember the information like usernames and passwords. Cookies are not executable codes but text files only. Cookies are NOT:

• Spyware or virus

• Only used for advertising purposes

• Causing abusive online ads or pop ups

• Causing spam

As cookies contain important information so these are prone to Cross-site scripting or exploits like XSS and hijacking of cookies through packet sniffing is also possible.

Other use of cookies

All the preferences from choosing language to number of search results per page are stored in cookies. Also information about previously visited websites is also stored in cookies. Due to increase in malicious software and spyware, privacy of cookies has become a concern.

Security and privacy concerns

The web server sends cookies back and forth when you browse any website using cookies. As these cookies contain sensitive information like passwords and usernames which can be intercepted easily and data can be used for illegal means also. Although in modern browsers you can actually accept or reject cookies. Also you may set your browser to automatically reject cookies if you are much concerned about your private data. However some websites may not work properly if you disable cookies all the time. So the best option is to get rid of cookies each time you are done surfing.

Getting rid of cookies

You don’t need to download any kind of software as it is easier to remove cookies. Different browsers and user accounts store cookies differently. So to get rid of cookies you need to open each browser in each account. You can remove cookies if you are using internet explorer by following means:

1. After opening Internet Explorer, go to tools menu and make sure only one instance of the program is running.

2. Click on “Internet Options”.

3. Click “Delete cookies” on general tab.

4. After that click OK.

You can also do this by right clicking Internet Explorer icon and selecting properties and then following step 3 and 4 to delete cookies.
In case of Firefox, you can do following:

1. After opening Firefox click on “Tools” menu.

2. Select “Options”.

3. Click on “Privacy tab” and then click on “Clear Private Data” button.

4. Make sure you select the check box for cookies after a small menu appears. After that click on OK.

To automatically delete cookies and private data, you can press CTRL+SHIFT+DEL in Firefox. This will remove all private data and cookies when you close the browser. By following ways, you can do this:

• Go to tools and then click Options.

• Click on privacy tab and click on the box that shows “Always clear my private data when I close Firefox”.

• Then click on settings and see if check box of cookies is checked.

To access secure connections you may also avoid shared or public computers. If not then clear the cookies after surfing. You may also request the owner to remove cookies if the access is restricted. You need to be careful as hackers can easily steal cookies and use them for illegal purposes.

Posted in Technology | Tagged: , , , , , , , , | Leave a Comment »

What Is HTML?

Posted by Sandeep Kumar on September 18, 2010

Regular user of the Internet will see the letters HTML occasionally but most of them have no idea what the letters stand for. This doesn’t present a problem because most end-users of the Internet and computers don’t really need to know what HTML is.

HTMLBut it may be interesting to many to learn just a little bit more about it. These four letters stand for Hyper Text Markup Language. While this may seem like a confusing name, what HTML actually does is provide the language for Web pages. It’s a system that allows people to give online documents the need structure. Guidelines in HTML determine where and how paragraphs, lists, links etc. are used.

But this system does more. It also allows Web-page creators to put photos and other graphic elements in pages. This is called embedding. The key to success with HTML is the use of tags that are set apart in the code by brackets. Essentially, these are the instructions for what will appear on the finished page.

Wikipedia describes HTML as “the encoding scheme used to create and format a web document.” A man named Tim Berners-Lee is credited with an original idea that led to HTML (1980). A few years later he proposed a system that included the word “hypertext” in its description. He is credited with writing the software program for servers and Web browsers in 1990.

It has been about 18 years since the public was first introduced to HTML and the idea of “tags.” Berners-Lee and his associates presented a basic design for the language that contained fewer than two dozen “elements.” Some of these original pieces are still part of HTML today. The hypertext language is now one of the international standards for Web-based communication.

One of the remarkable things about HTML is that it not only gives experienced Web designers and programmers the tools they need, it also is rather easy for the “layman” to use. It’s not a programming language like Perl, Java or even Basic. At its most basic level, a Web page is made of HTML and images. One of the best descriptions of the language includes the idea that HTML holds all the page elements together, in addition to containing the text for the page.

For example, the HTML guidelines for a Web page would contain with the specific instructions showing up between the angle brackets. The Web browser is instructed to present the text or object in whatever way is described there. Those who are learning to use HTML have access to the “code” behind a page. Yes, you may view the HTML source of the pages you’re looking at!

HTML code can be written with or without one of the “editor” programs available. A simple text editor will work as well. It’s important with either method to use the beginning and ending brackets – and put the tag name, attributes and values between them. One of the best ways to learn how to use HTML is to look at a lot of code and compare the instructions with what you see on the finished page.

Posted in Technology | Tagged: , , , , , , , , , , , , , , , | 1 Comment »

How To Get Rid Of Overheating CPU?

Posted by Sandeep Kumar on September 17, 2010

For smooth running of the computer you should make sure it is working correctly. Although you may have the right software for your PC but another aspect to deal with is Overheating. When the computer is in running state, it generates heat. All the components like hard disk, motherboard, video card and processor generates heat. Heat dissipation increases with increase in hardware.

Cooling systems

cpu overheatingFans and heat sinks are the cooling systems installed by computer manufacturers to reduce heat produced. Over clocked machines or high-end systems may have customized systems that include liquid or gas cooling. Heat is dissipated by drawing it with the help of heat sink. Cool air is passed by the fan attached to heat sink. Fans are of two types: one that blows air out and the other blows in. Fans that blow air inwards are attached to heat sinks and while the fans attached to CPU have two fans. One blows in and other blows out.

Causes of overheating

• Over clocking – To increase the performance and speed over clocking is done. It causes more heat due to modification of the frequency and voltage of the device. The system will overheat if over clocked systems does not have customized or high-performance cooling systems.

• Malfunctioning or blocked fans – Generally fans are attached to components like video cards, processor and CPU case. Even if one or all of them gets malfunctioned or blocked, much heat is produced as insufficient air blows in or out. Halt in working of fans may be caused by dust, dirt or other particles.

• CPU location – A cooling system may become useless if heat is not able to escape. This happens in cases when the computer is located at a congested area as airflow is also restricted.

• Improper airflow – Overheating can also be caused by improper arrangement of cables and other components inside the CPU case.

The dangers of CPU overheating

• Shortens life span of components – Overheating can shorten the life span of components. E.g. overheated video cards have less life as compared to normal ones.

• Consume lot of electricity – Overheated device consumes more electricity due to reduced efficiency.

• Melt your device – Plastic components may get melted due to overheating. E.g. a blocked fan may melt the socket or motherboard.

• Causes fire – Shells and cables may catch fire because of melting caused by overheating.

Common signs of overheating

• Frequent shutdowns

• Noisy fans

• Hot exhaust

• Frequent and sudden restarts

Getting rid of overheating

Increase in consumption of electricity is another drawback of overheating. Tips to prevent overheating:

• Invest in better cooling system – An efficient cooling system should be used in case of high end systems. You can either buy pricey gas or water cooling systems, or buy heavy duty fans.

• Clean the CPU regularly – Fans and openings are blocked by dust and dirt. So you should clean your PC with brush or a portable vacuum cleaner.

• Let the CPU breathe – The CPU must not be placed inside a closed cabinet or under a tight desk. It should be placed in an area where cool air can get inside and hot air can blow out.

• Rearrange the cables –Cables should be arranged in such a way that they do not restrict air from cooling system. Hard drives should be placed apart in the case. Use round type cables instead of flat IDE cables.

A temporary fix

You can open the case for some time if you do not have enough cash to buy cooling system. When the system is running you should place the electric fan in front of it to cool the system down. Remember to replace the case after you turn off the computer so that dirt particles cannot enter inside.

Posted in Technology | Tagged: , , , , , , , , , , , , | Leave a Comment »

What Is PHP?

Posted by Sandeep Kumar on September 16, 2010

PHP is the shortened form referring to a hypertext preprocessor, a computer scripting language used for development of Web pages. The primary focus of PHP is giving Web pages a more “dynamic” look and feel. Developers have successfully used PHP with hypertext markup language (HTML), embedding PHP into HTML.

Most of the functions of this preprocessor language work on a server that is specifically set up to use the code. When properly used, PHP creates usable content for Web pages. According to Wikipedia, PHP is installed on over 20 million websites and 1 million Web servers.

PHPDavid Sklar and Adam Trachtenberg define PHP as a “server-side scripting language.” According to this duo, Web pages are created with PHP and HTML. A crucial comparison is made by Sklar and Trachtenberg as well. “When a visitor opens the page, the server processes the PHP commands and then sends the results to the visitor’s browser, just as with ASP or ColdFusion.”

A man named Rasmus Lerdorf is credited with creating the first version of PHP, though the scripting language has been improved and developed in the years since the mid-1990s. PHP is considered “free” software though there is a PHP license. Wikipedia also states that “PHP has evolved to include a command-line interface capability and can also be used in standalone graphical applications.”

The letters “PHP” actually indicated “personal home page” before the work of Lerdorf a couple of years later brought it to more notice. Lerdorf wrote the code using the programming language “C.” The language helped the programmer display information in a more appealing manner. It also did something even more important. Lerdorf was able to track how many people were viewing the page. This was one of the earlier uses of Internet traffic measurements.

One development led to extended use as a way to find “bugs” in code and improve the quality of code. Two programmer/developer experts from Israel made major changes and improvements in PHP in the year or two following Lerdorf’s work. First referred to PHP3, the developments led to an entirely new technology company by 1999.
The most current version of this scripting language is PHP6, after developers moved through PHP 4 and PHP5. The Zend Engine that came from the work of the Israeli developers is the power for the continuing changes and improvement.

Much of the latest work with PHP quality involves addressing security issues and some of the items that were unpredictable at best. More information about these crucial changes can be found by researching “magic quotes” and “safe mode.”

Academic literature and encyclopedia entries show that high-profile, open-source projects “ceased to support PHP4 in new code” after February 2008. (Wikipedia) This provided incentive to move to PHP5. Developers have created Unicode to allow users to employ their computers in any language, a problem for PHP until PHP6. Programmers have also worked with issues in 32-bit and 64-bit environments.

Posted in Technology | Tagged: , , , , , , , , , , , , , , | Leave a Comment »

How To Speed Up A Computer?

Posted by Sandeep Kumar on August 21, 2010

A computer is a machine which can be programmed. It receives input, stores data and processes it to give us an output in a useful format. Although, mechanical computers have existed for a long time – abacus and slide rule are good examples of this – electronic computers are a fairly recent phenomenon. This recent phenomenon has become so much an important part of our lives that nothing feels more annoying when computers don’t work or work at a snail’s pace! If your computer is also working slower, then here are a couple of tips you can try:

Booting:
If there are a lot of programs installed on your computer then it would take longer to boot up. It is certainly not advisable to delete some of them, because you may need them, but there is a little thing that we can do. We can identify programs that are least used and then, can load them only when a need arises.

(1) When your computer starts, all the programs that are installed on it are loaded and it takes longer than it would have if only those programs which are used most were to load during booting. So the first step is to click on the Start Menu, go to Run Type (Microsoft configurations). There among other options you will be presented with there two options: Normal Start Up and Selective Start Up. Just click on Selective Start Up tab and select the programs you use most of the time and unmark those, which are not-so-used.

(2) When you are in Microsoft Configurations(MS configuration) mode, you can look for BOOT.INI tab. Click on it and you will find a new box, which reads Timeout. It’s is normally set at 30 sec. which means a delay of half a minute. Change that to 3 sec., click on the tab OK and reboot your computer. After this, it is possible that your computer gives you a pop up saying you’re in selective boot mode; now just disable the window while saving your changes.

(3) There is a program called HijackThis, which can be downloaded from merijn.org. This program will analyze the processes that are running on your computer and will alert you about the things which are not needed.

How to speed up computer(4) If you can ascertain that Trojans and Ad Ware are not loading when you boot, it would enhance the performance of your computer.

(5)Once or twice a month, clear all your temporary Internet files, vacant your recycle bin and move files, which are not needed to back up drive. Go to My Computer, click on Properties followed by Tools and then select the tab defragment. It would take some time but improve the booting time of your computer.

(6)If you are leaving your computer for not a long time, say only a couple of hours, then instead of shutting down your computer you can leave it in a stand-by mode. A computer on a stand-by mode remembers everything you were doing but this memory is called volatile memory. You can also save everything; this would an insurance against a power cut.

(7)Hibernate mode is a better option than stand-by mode if you are not going to use your computer for a whole day or similarly for long intervals. Hibernation mode saves an image of your computer’s open application and documents on the hard drive. You can put your computer on hibernate mode by going into the computer’s Control Panel. Turn off your computer holding down the shift key and the Hibernate option will appear, just click on it and your computer will go into a snooze.

Posted in Technology | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

How To Get Rid Of Computer Viruses?

Posted by Sandeep Kumar on August 19, 2010

Computer viruses are unwanted computer programs. They keep themselves hidden in your computer and then replicate themselves in their own way and multiply (spread). The Internet connects a lot of computers to each other and sometimes, while sharing data; sending emails etc, along with the files, computer viruses also get transmitted. A virus can do anything to a computer – it can delete files, it can corrupt data and it can also disable your computer’s security systems or can damage it irreversibly.

Viruses are sometime transmitted unknowingly but not always because there are people, who are known as hackers, who design these computer programs to break into others’ computers. Their reason could be any i.e. stealing data, personal animosity etc.

Common Types:

Resident Viruses: They remain hidden in your computer. They are in the RAM memory and control and intercept the operations which are carried out by the system. Their primary use is to capture secret information about the user i.e. passwords, credit card numbers etc.

Direct Action Viruses: They quickly replicate themselves and they are designed to fulfill a certain objective. They normally attach themselves to the files stored in the computer and when that file is made to run they get activated.

Overwrite Viruses: Their objective is straightforward – to destroy whatever information it can put its hands on. It deletes all the information contained in a file and copies itself on the files resulting in the files becoming useless.

Boot Virus: Boot system is that part of a computer which stores basic programs like how to start the computer etc. These viruses are after the boot sector of computers. The best ways to avoid them is to write-protect the floppy discs and never start you computer with an unknown floppy disc in the drive.

Macro Viruses: Programs like Microsoft Word, PowerPoint etc, have the ability to use small programs, known as ‘helper’ programs, to expand their functionality. These ‘helper’ programs are called ‘macros’. They remain stored in the document files of a computer. When that file is run, the virus gets activated.

How to get rid of computer virusesFile Infectors: Viruses falling in this category infect executable files (programs). Most of the viruses found today are of this category. Once the infected program is run, they get activated.

Solutions:
The best defense against any type of infection is a virus scanner that not only detects a threat, but eradicates it as well. Installing anti-virus software is the best solution and some of them are available for free:

Commercial:
There are some companies like McAfee Antivirus, the oldest antivirus development company in the world, which are experienced. And there is another of the Norton Antivirus kind, with really heavy antivirus systems. Other famous names include Quick Heal, ESET etc.

Free:
There are some companies which provide antivirus for free for home use. They include Avast Antivirus and AVG. Both are relatively new companies and provide you with an easy to install protection shield. There are other companies too, which make anti-virus software available for free under certain conditions – Avira AntiVirus Personal, Bit Defender etc.

Posted in Technology | Tagged: , , , , , , , , , , , , , , , , , , | 1 Comment »

 
%d bloggers like this: