How to deal laptop heating up | A laptop is an extensive investment that requires a great care from your side so that it keeps on running for years. Many laptops (almost 90%) face the problem of overheating. This overheating can cause the laptop to show abnormal behavior thereby causing the internal machinery to fail. Today we will be discussing the techniques and methods that are available today so that your laptop runs smoothly for many years to come. Compressed Air While working with laptop in dusty condition then there are chances that the dust gets deposited on the circulating and coolingRead More →

Prevent cyber attacks | Many people say you should never have a song play automatically when someone hits your website?. but don’t be alarmed, I have decided to alert because I want to show how easy it is to have your browser hijacked. I find that most people do not take me seriously when I explain to them how easy it is to have your device compromised. When you go to a page that automatically plays Flash video or audio, you are in danger of being hacked. You really should protect yourself against this. Just because you only go toRead More →

port number table TCP – IP Ports list | These are numbers used by certain protocols of application layer. Each common protocols are allocated a unique ports . IANA is responsible for assignment of port numbers. Custom ports are also allocated to vendors by the regulatory authorities. Here are the list of important TCP -IP ports commonly used HTTP ———- 80 FTP ———— 20,21   TelNet ———- 23   SMTP ———- 25   DNS ———– 53   TFTP ———– 69   SNMP ———- 161   RIP ————- 520   IMAP 4——— 143   IMAP 3 ——— 220   RPC ———— 135   LDAP ———- 389   Net Stat ——– 15   WINS ———- 42   BootP ———- 67   DHCP ———- 68   POP2 ———- 109   POP3 ———- 110   Net BIOSRead More →

How does firewall protects a network?  A firewall is a piece of software or hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. If you are a home user or small-business user, using a firewall is the most effective and important first step you can take to help protect your computer. Different Types of Firewalls Different firewalls use different techniques. Most firewalls use two or more of the following techniques: Packet Filters: A packet filter looks at each packet that enters or leaves the network and accepts or rejects the packetRead More →

At daily basis a large number of the common internet users get hacked and become a victim of the cyber frauds. They become victim of such attacks because of the fact that they even don’t know about the word “Security”. There systems are majorly not up to date in order to meet the recommended requirements for security. As a result due to many weaknesses present in there system these are easily exploitable without any warning. I am publishing this article to help you let you know that how can you make your self more and more secure. It would notRead More →

Raid Storage Explained |  Basic idea of RAID was to combine multiple small, inexpensive disk drives into an array of disk drives which yields performance exceeding that of a Single Large Expensive Drive (SLED). Additionally, this array of drives appears to the computer as a single logical storage unit or drive. This has significance in data security as well as data storage among disks. RAID stands for Redundant Array of Independent Disks and it basically involves combining two or more drives together to improve the performance and the fault tolerance. Combining two or more drives together also offers improved reliability and largerRead More →

An IP address is the numeric label or sequence of numbers that is assigned to a computer or device used on the Internet or a LAN . It is a means of identification and determining the user’s address online. When an IP address is blocked, network connections to or from that address are not permitted. An IP address can only be blocked through a firewall that is installed on the computer. Windows users have two options for blocking an IP address Through the built-in windows firewall . How to Block an IP Address Using the Windows Firewall Step 1 – SelectRead More →

An Ethernet crossover cable can be used to directly connect two network devices through Ethernet. These can either be single computers or they can be networks. Ethernet crossover cables are commonly used for temporarily networking two devices in the absence of a network router switch, or hub. The principle is the same, but the connection speeds and methods are different. The crossover cable’s function is to send and receive data. Ethernet crossover cables enable complex data transfers between computers, routers, and networks. Unlike standard ethernet, the internal wiring of Ethernet crossover cables reverses the incoming and outgoing signals. The reversed wiresRead More →

Firewall protection works by blocking certain types of traffic between a source and a destination.All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port is a random port and the destination port is a well-known port number. For example, the destination port for HTTP is 80 and the destination port forDNS is 53. If the protocol is ICMP, there is also an ICMP message type. The most common ICMP message types are Echo Request andRead More →

Open a Command Prompt window and leave it open.Close all open programs.Click Start, Run and enter TASKMGR.EXEGo to the Processes tab and End Process on Explorer.exe.Leave Task Manager open.Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.At the command prompt type DEL <filename> where <filename> is the file you wish to delete.Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.Close Task Manager. Or you can try thisOpen Notepad.exe Click File>Save As..> locate the folder where ur undeletable file is ChooseRead More →