Skip to main content


Showing posts from February, 2011

Use Your Pen Drive as Ram

Yes with some modified settings you can use your pen drive as a RAM

1) Connect your pen drive to your PC [pen drive should be at least 1 GB or if you having 4 GB then its better]

2) Allow PC what he is supposed to do,let system to detect pen drive.

3) After your PC finished with its detection work,you have to do some little

4) Right click on the My Computer and select the properties

5) Goto advanced and then performance setting then advanced then

6) Select pen drive and click on custom size " Check the value of space available "

7) Enter the same in the Initial and the Max columns

" You just used the memory of the PenDrive as a Virtual Memory "

8) Now restart your pc and enjoy your fast and super system
Reply With Quote

Apple MacBook Pro

Apple has just introduced Intel’s new SandyBridge series of processors, a FaceTime HD camera and a whole new technology for high-speed transfers called Thunderbolt. The new 13-inch MacBook Pro offers amazing value and performance in a compact design. The highly portable device features Intel Core i5 and Core i7 dual-core processors up to 2.7 GHz and Intel HD Graphics 3000.
The powerful 15-inch and 17-inch MacBook Pro models feature quad-core Core i7 processors up to 2.3 GHz and AMD Radeon HD graphics processors with up to 1GB of video memory for high performance gaming, pro video editing and graphics intensive applications.

The new MacBook Pro is the first computer on the market to include the groundbreaking Thunderbolt I/O technology. Developed by Intel with collaboration from Apple, Thunderbolt enables expandability never before possible on a notebook computer.

Featuring two bi-directional channels with transfer speeds up to 10Gbps each, Thunderbolt delivers PCI Express d…

How to Make Con Name Folder


Create and delete a folder named CON

So as it is known that CON named folder is not possible in windows.

But u can create it Here is the way to do so.
[FONT=arial]you can create it by using command prompt. The command of doing that is as given below :

md \\.\\c:\con

this will create folder named CON in ur C: drive u can create it in any drive by just replacing C with the drive letter in above command. Now u shall find that u are not able to delete that folder even by using command prompt. The DEL command will also not work. But u can delete it by using following command :

rd \\.\\c:\con


कई जगह आपने देखा होगा ये कहते हूवे की आप com1,com2..3 नाम के फोलडर नही बना सक्ते। पर आज मै बना के दीखाता हूं और आपको भी सीखाता हूं।

जरा con नाम का फोलडर बना दे दीखा दो तो मान जाऊंगा की आप उस्ताद हैं।

नही बना सक्ते ना। हा...हा ट्राई करते रहीये पर बन नही पाएगा।
अब मै बताता हूं कैसे उस नाम के फोलडर बन जाऎंगे जीसे आप बनाते बनाते थक जाएंगे।
तो चलीये अब हम Start Menu मे Run पर क्लिक …

Your comp can be hacked using ur electricity power line or even toilet pipe!WTF***??

Till now we have heard that hackers use phishing methods or install
trojans into the victims computer to record keystrokes and steal
account informations. There are numerous programmes and methods advised
to prevent such kind of attacks, most common of them are anti virus
programes and firewalls. Even a laymen person new to the world of
internet knows the do's and dont's to keep himself secure. Thus it is
getting difficult for the hackers to come out with new methods to play
with the privacy of their victims as people are getting more concerned
about their privacy.

Two independent researchers Andrea Barisani(Alias lcars) and Daniele Bianco(Alias danbia) at inverse path

came out with a security loophole in your keyboard, preferably ps/2 and
laptop keyboard, that can enable a hacker to record your keystroke by
just connecting to your power grid, and yes, no anti virus program or
any firewall could detect this kind of sniffing. The fact that the
vulnerability is cau…

If you forgot windows password?

Hi All, Forgetting windows password? This is common problem, here I show u how to reset the default password of Windows Login.
Dowload the image file from below weblink and write the image file to a empty CD.  Restart the computer boot from CD rom >> it will shows the user account.  Select your account and reset the password. It will defaultly reset the password to 12345.

Supports Windows 7/Vista/XP/2000/NT workstation.
Thnx to Read.

How to lock a folder with a password without a software

Let me show you how to lock a folder without a software!

1- make a new folder ( name it as you like )

2- inside this folder make a ( TXT ) file & copy inside it this (the entire thing).

Quote: Quote: cls @ECHO OFF title Folder Private if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST Private goto MDLOCKER :CONFIRM echo Are you sure you want to lock the folder(Y/N) set/p "cho=>" if %cho%==Y goto LOCK if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" echo Folder locked goto End :UNLOCK echo Enter password to unlock folder set/p "pass=>" if NOT %pass%== password here goto FAIL attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" ren "Control Panel.{21EC2020-3AEA-1069-A2DD…

Use a VPN to Increase Small Business Productivity

As workforces get more and more decentralized and telecommuting becomes more widespread, businesses of all sizes have come to depend on virtual private networks, or VPNs. A VPN is a secure, private network that runs on a public network (usually the Internet). VPNs can allow remote workers secure access to your network, just as if they were at their desks in your office. If you or your employees are routinely away from your office and need access to your company's network, a VPN is an inexpensive way to increase productivity — without sacrificing security.
The name "virtual private network" gives you a clue about how VPNs actually work. VPN software programs "carve out" a section of the Web, and allow only authorized users to access it. This virtual network runs on top of an existing network and is private. Hence the name. Users who provide the correct login information are granted access to the VPN gateway at the office. Once they're connected though the gat…

How To Install Windows7 From USB Pen Drive