Wednesday 28 December 2016

Using a USB Pen Drive as RAM in Windows

Increase Ram Using ReadyBoost In Windows 7, 8, 10

  • Firstly insert your “Pen Drive” >> Now right click on your pendrive.
  • Open “Properties” >> Then “ReadyBoost” tab.
PenDrive Properties
  •  Then switch to “Use this device” and reduce your current memory space. If your current device place is 3700MB then reduce it with approx 200-300MB.
Pendrive Readyboost
  • Then click on Apply button and all Done.
  • In case if you want to change back your pendrive to normal. Then switch it back Don’t use device in Readyboost tab.

Important Recommendations:-

  • Always safely eject your Pendrive. Direct removal may leads to device damage.
  • In Virtual Memory method, If you want to convert back your Pendrive into Normal. Then again open Virtual Settings and remove custom memory value and choose Default settings by checking “Automatically Manage Paging Size”.
  • If you use ReadyBoost method, don’t forget to revert back to normal or otherwise open your pendrive and delete Readyboost file from your pendrive.
In conclusion, these best possible ways to use pendrive as ram in windows and we hope you find them helpful and knowledgeable. In case we missed anything please let us know in comments below.
https://www.safetricks.com/how-to-use-pendrive-as-ram-windows/ http://www.wikihow.com/Use-Pen-Drive-As-RAM


 

 

Introduction to RSS

Introduction
You may have noticed when browsing Bleeping Computer that there are these little orange RSS buttons all over the place that look like . You may haved wondered what these were and, being an adventurous sort, you click on them and your screen becomes filled with strange codes that make no sense to you. I know you are confused, but there really is a good reason for these buttons. These buttons are called RSS feeds and they can make your life much easier. Don't believe me? Then continue reading to learn what RSS is and how it can help you.
RSS
A common practice among blogs and news sites is to syndicate their content. Web syndication is when content from a web site is made available for other sites or remote applications to use. The most common method for web syndication is to use a protocol called Really Simple Syndication or more commonly known as RSS. RSS is a protocol that allows web sites to make their content, or portions of their content, available to other other sites or applications.
When a web site syndicates content using RSS they create RSS feeds or channels. The channels are usually created in such a way that they cover a particular subject. For example, each of the forums in the Bleeping Computer forums section has its own individual RSS feed or channel as shown at our RSS Page. Each forum is a separate channel as they all have a different subject matter. That is not to say that a web site could not create a RSS feed that covered many subjects, because they could, but it would not be the most efficient way of creating their feeds. This is because people who use RSS use it to find specific subject matter that they want to learn or read about. If a web site publishes an RSS feed that covers many subjects, that person may not use that feed because they would have to search through all the information in the feed to find what they want.

Why would I want to use RSS?
Now that you understand what RSS is, you are probably wondering why you would to use it. The answer is simple! To save you time and effort in finding the information and news that is specifically relevant to your interests. RSS allows you to subscribe to feeds that pertain to subjects that interest you. You can then have all these feeds aggregated into one location, such as a web site or software application, where you can view it quickly and in an organized manner.
A common use of RSS feeds is to import data from another web site into your own. For example, lets say that you want to add news items to your site, but do not have the resources to gather or create this news. By using RSS you can instead add news to your site by importing it from another site that has syndicated their content using RSS. This saves you time and energy because you do not have to create the content yourself, but can use someone elses. Note that if you do add someone's syndicated content to your site, it goes without saying that you should give credit back to the originating site.
For personal use, you can use something called a feed aggregator. These are pieces of software that allow you to subscribe to various feeds you find throughout the Internet and aggregate them into one location, namely the software that you are using. Then when you start the software, and have it check for new updates, your software will connect to all these feeds and download any new information and display it to you. This allows you to have all the news or resources that interests you from your favorites web sites organized into one location where you can easily see if there is new content to be read. A good example is if you frequent 10 different message boards and they have RSS feeds for the forums on them, you can add their RSS feeds to your aggregator and see any new topics that are posted without having to visit each of these sites!! Then when reading a particular entry, if you actually want to go to the site, you can click on the link that will be shown with the news item


FIREWALL

A firewall is a hardware device or software application that sits between your computer and the Internet and blocks all Internet traffic from reaching your computer that you have not specifically requested. What this means is that if you browse to a web site, the firewall will allow the traffic from that web site to reach your computer and therefore yourself. On the other hand, if you did not request information from that web site, and the web site sent traffic to you, it would be denied from reaching your computer because you did not specifically ask for it.


Firewalls for the home user can either be a piece of hardware or a piece of software. The differences will be discussed below.
A Hardware Firewall is a device that sits between your Internet connection and the rest of the computers plugged into it. These firewalls usually come with a built in hub that allows you to connect multiple computers to it in order for them all to be able to share one Internet connection. These firewalls provide protection to all the computers connected to it using a technology called Network Address Translation, or NAT. This protection is performed by all the protected machines using private IP addresses, such as 192.168.1.X, that can not be reached via the Internet. The firewall then convert these internal IP addresses to the single public IP address that is assigned to the firewall. This makes it so that your hardware firewall accepts all incoming requests you asked for and then forwards them on to the requesting internal computer. Using this method, outside machines are never able to connect directly to your computers.
A Personal Firewall is a piece of software installed on each computer that needs to be protected. This software then filters all incoming, and sometimes outgoing traffic, and only allows only data that has been requested or explicitly allowed to pass through. Personal firewalls tend to be more feature rich than hardware versions, but they do not have the ability to allow you to share your Internet connection with multiple computers on the network.

Wednesday 21 December 2016

CMS

Content Managment Website  


Umbraco
Word Press

SSL

After the secure connection is made, the session key is used to encrypt all transmitted data. Browser connects to a web server (website) secured with SSL(https). Browser requests that the server identify itself. Server sends a copy of itsSSL Certificate, including the server's public key

Thursday 29 September 2016

SEO

Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's unpaid results—often referred to as "natural," "organic," or "earned" results.

Wednesday 21 September 2016

LAN

Local Area Network (LAN)

Introduction
LAN (Local Area Network) is a computer network which provides the connectivity between hosts (i.e. computers) located within a limited area, e.g. home, office, school, university campus etc. The LAN can be connected to the WAN (Wide Area Network), which covers a larger geographic area (e.g. a city or a country), via the edge router. The two most common transmission techniques used in the local networks are: Ethernet and WiFi.
The most popular scenario is the home network consisting of several hosts connected to the Internet provider network via the home router with access point functionality. It means, that two transmission methods (Ethernet and WiFi) are used in the same network. Thanks to this approach, all computers can exchange data with each other and have the Internet access through the same link. However, these computers are not reachable from an external network (i.e. the Internet).
Network elements
Each local area network consists of: hosts, switches, a router and optionally a wireless access point. Nowadays, the three last elements are combined in one device called a WiFi router. Of course, we can use several wireless access points as WiFi range extenders in order to provide better coverage and performance. Hosts are computers, network printers, mobile phones, smart TVs, gaming consoles, network storages etc. All communication between two hosts is carried out without a router participation. The router forward all packets from LAN hosts to external networks, e.g. the Internet.
IP address
Each host in the network is identified by its IP address. This is a set of 4 numbers separated by a comma, e.g. 192.168.2.10. However, these numbers have to be from defined range. In case of LAN, private IP addresses from 3 classes are used:
·  class A: 10.0.0.0 – 10.255.255.255 (16 777 216 addresses),
·  class B: 172.16.0 – 172.13.255.255 (1 048 576 addresses),
·  class C: 192.168.0.0 – 192.168.255.255 (65 536 addresses).
However, there is no need to set IP address on each host in the network manually. This is done automatically by DHCP (Dynamic Host Configuration Protocol) feature which is supported by all home routers. When a host connects to the network, then it sends DHCP discovery message at 255.255.255.255 broadcast address. The DHCP server will send to the host:
·  assigned host IP address,
·  gateway (i.e. the router) IP address,
·  subnet mask,
·  DNS (Domain Name Server) addresses.
NAT - Network Address Translation
Private IP addresses used in local area networks are not unique worldwide. It means that the same IP addresses can be used in several local networks. However, in order to provide the communication between the host and the server, the router has to translate the host IP address and used port number to the external router IP address and another port. The router simply modifies Source IP address and Source Port in IP datagram packet header. The server responses to the external router IP address and the router forward these packets to the host. These forwarding process is based on the dynamic translation table.
The communication between two hosts located in different local networks is also possible. However, it requires manual configuration of port forwarding feature on both routers. This can be also be done by UPnP (Universal Plug and Play) protocol which is currently supported by most of peer-to-peer clients and home routers. Thanks to this protocol, the port forwarding tables are generated dynamically and applications use the external IP addresses in order to communicate with hosts from other networks.
Link aggregation
In the past, link aggregation solutions were reserved for corporate networks and business applications. These functionalities were mainly used for servers and inter-routers connections. Nowadays, the most advanced home and small office routers also support link aggregation features. This technology can provide for an example 2 Gbps virtual interface using two normal 1 Gbps Ethernet physical interfaces. This feature is applied for an example in high performance NAS (Network Attached Storage) devices.
The link aggregation feature does not allow to exceed the speed limitation for a single data transmission stream. This functionality is supposed to work with several data transmission sessions at the same time. The LACP (Link Aggregation Control Protocol) autonomously load balances the usage of both links. Therefore, the total throughput exceeds the 1 Gbps limit. In order to take the advantage of this functionality both the router and the device (e.g. NAS) have to support the same link aggregation protocol (e.g. 802.3ad).

Internet Access Technologies

The Internet access can be established using various technologies simply called "last mile". Below are informations about all of them.

Internet access technologies articles

DSL

The DSL (Digital Subscriber Line) technology allowed the fast growth of the Internet and popularisation of on-line services. The classic modem connection (dial-up Internet access) provides the 56 kbps speed.

ADSL

This is the most popular version of the DSL technology used by many providers. It differs from the less common symmetric link (SDSL). The ADSL provides wider bandwidth for the transmission towards customer (i.e. downlink) than in the reverse direction (i.e. uplink).

VDSL

The VDSL is the hybrid technology which combines the fibber and the cooper media. The fibbers are used in the operator network and so-called the last mile (i.e. the connection between the nearest provider’s device and the customer) is covered by the cooper line.

WiFi

WiFi is a trademark term for the IEEE 802.11 family standards. The first 802.11 standard was released in 1997 and it was providing up to 2 Mbps wireless link speed. It was slow, but it was the first technology which has allowed to connect several computers in the local area network without cables.

LTE - Long Term Evolution

LTE stands for Long Term Evolution and it is commonly marketed as 4G LTE. This is the standard of mobile wireless communication which provides high transmission speeds, low latency and high network capacity. 

LAN over power line

Nowadays, practically every home and small office local area network use the WiFi as an access technology. Sometimes, also the classical Ethernet cables are used, but their application is uncomfortable and messy.

Digital Video Broadcast (DVB)

The most popular family standard of digital television is the DVB (Digital Video Broadcast). These standards are maintained by the DVB Project and are published by the European Telecommunications Standards Institute (ETSI).

Local Area Network (LAN)

LAN (Local Area Network) is a computer network which provides the connectivity between hosts (i.e. computers) located within a limited area, e.g. home, office, school, university campus etc. The LAN can be connected to the WAN (Wide Area Network), which covers a larger geographic area.

Mobile Communication Systems

The most popular mobile communication system is GSM (Global System for Mobile Communications). This is worldwide used second-generation (2G) cellular system which replaced first-generation (1G) analogue systems (e.g. NMT – Nordic Mobile Telephone).

Friday 20 May 2016

DOOLE Games

http://www.google.com/doodles/30th-anniversary-of-pac-man

https://www.google.com/doodles/soccer-2012

https://www.google.com/doodles/basketball-2012


https://www.google.com/doodles/soccer-2012

https://www.google.com/doodles/slalom-canoe-2012

https://www.google.com/doodles/hurdles-2012

Google IMAGE Search

Go to Google page .. CLick on images .. Drag nd drop the images there

Monday 9 May 2016

Geek Terms

Dynamic IP

A dynamic IP address changes each time you connect to your Internet Service Provider (ISP). This allows ISPs to keep a pool of addresses available to subscribers. If you disconnect from the ISP, your address is returned to the pool, becoming available to the next computer that connects.

DNS

DNS stands for Domain Name Service. DNS servers translate names, such as “yourname.com” into the numeric IP address that the Internet uses to send and receive information. Most ISPs and companies run their own DNS servers, and there are thousands of them on the Internet.

Domain Name

A domain name is a name given to an organization of computers on the Internet. For example, “google.com” and “yahoo.com” are domain names.

Dynamic DNS

A process of performing an RFC 2136 “DNS Update” to add, modify or delete DNS resource records on the fly without reloading the entire DNS zone master file.

Ethernet

Is a protocol that is very commonly used in computer networks.

Fully Qualified Domain Name (FQDN)

A Fully Qualified Domain Name is the combination of a hostname and a domain name, with the hostname being to the left of the domain name. For example: “www.google.com” and “www.yahoo.com” are fully qualified domain names.

File Transfer Protocol (FTP):

An Internet protocol designed for the purpose of a client downloading files from an FTP server. No-IP.com does not provide FTP space but our users are encouraged to run their own FTP server.

Hostname

A Host or Hostname is a textual name given to a computer. A computer can have more than one name. Common hostnames are “www”, “mail” and “ftp”, but you can name a host just about anything.

Hyper Text Transfer Protocol (HTTP)

HTTP is the standard protocol used by web servers to transmit data back and forth to your browser.

Internet Protocol Address (IP)

The Internet Protocol (IP) address is assigned to your computer, providing a numeric address necessary for connecting to the Internet or another IP-based network.

Internet

The Internet is a large collection of computers that are inter-connected and using the TCP/IP protocol to communicate.

Internet Service Provider (ISP)

A company that provides individuals and other companies access to the Internet and other related services such as website building and email services.

Post Office Protocol (POP3)

Is an Internet standard protocol that is used to allow users to download their email to their computer from the mail server.

Port 25

This is the standard port that mail servers listen on. Many ISP’s block inbound and outbound port 25 to stop spammers from abusing their networks. This makes running a mail server on one of these ISP’s networks nearly impposible. See Mail Reflector and Alternate-Port SMTP for No-IP based solutions to get around this problem.

Port 80

This is the standard port that web(http) servers run on. Many ISP’s have blocked port 80 to stop viruses such as Nimda from slowing down their networks and infecting their customers computers. Use No-IP’s port redirect or web redirect host type to get around this issue.

Root Nameserver (Root Server)

A root nameserver is a DNS server that answers requests for the root namespace domain and redirects requests for a particular top-level domain to that TLD’s nameservers.

Registrar

A Registrar is the company or organization that you purchased or registered your domain name through.

Static IP

A static IP address is fixed, much like a telephone number. If your ISP gives you a static address, you will always use the same address. Servers usually have static addresses, so they can always be found at the same location.

Simple Mail Transport Protocol (SMTP)

This is an Internet standard protocol that is used to send outgoing email over the internet to an email (SMTP) server.

Spam

Spam is unsolicited bulk or junk email.

Top Level Domain

The highest level in the Domain Name System hierarchy. The portion of the domain name that comes after the dot “.” (.com, .net, .org, .uk).

Terms of Service (TOS)

No-IP’s terms of service agreement can be viewed here.

Universal Resource Locator (URL)

A URL is a way to specify the location of somthing found on the Internet. A URL typically points to a website and appears as a link on web pages.

Web Redirect

Also known as HTTP Redirect or URL Redirect. Replace a long url with an easy to remeber shorter one using a web redirect. http://www.somefreeisp.com/community/pages/members/some_page.html becomes http://mypage.no-ip.com/

Saturday 9 April 2016

Internet Protocol (IPv6) Overview

The Internet operates by transmitting data in small independent packets across networks based on an international communications protocol called the Internet Protocol.  IPv6 is the latest version of the Internet Protocol.

Details

What was used before IPv6?

The first widely used and standardized Internet Protocol was IPv4 (Internet Protocol version 4) and it defined how the Internet and its connected devices operated and communicated with one another. When IPv4 became the Internet standard, the 4.2 billion possible IP addresses were never intended to house a global commercial Internet.  In fact, in 1981, there were only a limited number of computers that needed to connect to the Internet (mostly American government and research entities).  The  pool of IP addresses has been in use for the entire history of the commercial Internet, but recent technological developments have driven the available IP address pool close to depletion.  Just imagine that when the Internet was created, web-capable phones were far from being invented.
These days, in addition to every computer, nearly every cellular telephone and gaming console is connected to the Internet and this is without mention of the infrastructure hardware that required to make these devices work. As a result of this rapid growth the Number Resource Organization states that less than ten percent of them remained in the Internet Assigned Numbers Authority (IANA) free pool as of the beginning of 2010. Through the use of tools like Network Address Translation (NAT), users have extended the life of IPv4, because NAT allows multiple devices to speak to the Internet through a single IP address, while the router in that particular household or business keeps track of which device(s) are receiving and sending information.

What is an IP Address?

As you can assume, IP stands for Internet Protocol and this is the methodology for communication between devices on the Internet.  The IP Address is a number that uniquely identifies a device on a computer network and every device that is connected to the Internet must have a unique address for transport protocols to move information around the Internet. The fact that the same 4.2 billion IP addresses originally devised are almost deplete indicates the need for more.

Why use IPv6?

The solution to IP address depletion is simple and that is to develop a more robust numbering system that will allow for far more IP addresses.
IPv6 (the newer Internet Protocol) holds 340,282,366,920,938,463,463,374,607,431,768,211,456 IP addresses. This exponentially larger pool of IP addresses is the key to the future growth of the Internet, and companies that use and distribute IP addresses will need to adapt their networks and systems to use IPv6. Without IPv6, the Internet's expansion and innovation could be limited, and the underlying infrastructure will become increasingly complex to manage. The additional costs from delaying deployment will make life harder for Internet operators, application developers, and end users everywhere.
Here is an example of an IPv6 address: 3ffe:1900:4545:3:200:f8ff:fe21:67cf
Eventually, all IPv4 addresses will be phased out. This is not anticipated to happen for a long time, not before the middle of 2012.

How do I know if my ISP supports IPv6?

IPv6-test.com is a free service that checks your IPv6 and IPv4 connectivity and speed, diagnoses connection problems, and discovers which address(es) you are currently using to browse the Internet.  It additionally shows your browser's protocol of choice when both v6 and v4 are available.
The other test sites include:
http://netalyzr.icsi.berkeley.edu/
http://s.a.ak6i.net/a1/results/demo.html

Adware / Spyware

What is Spyware/Adware?


Adware and Spyware programs can adversely impact your computer performance. The information below provides tips and suggestions on how to remove malicious programs and protect your computer system.

According to the "Center for Democracy and Technology", there are at least three general categories of applications sometimes described as Spyware.

Spyware Categories Keystroke loggers and screen capture utilities, which are installed by a third party to monitor work habits, observe online behavior, or capture passwords and other information. "Adware" and similar applications that install themselves surreptitiously through "drive-by downloads" or by piggybacking on other applications and track user's behaviors take advantage of their internet connection. Legitimate applications that have faulty or weak user-privacy protections.


Spyware Categories


  • Keystroke loggers and screen capture utilities, which are installed by a third party to monitor work habits, observe online behavior, or capture passwords and other information.
  • "Adware" and similar applications that install themselves surreptitiously through "drive-by downloads" or by piggybacking on other applications and track user's behaviors and take advantage of their internet connection.
  • Legitimate applications that have faulty or weak user-privacy protections

There are many reasons why someone would install Adware / Spyware on your PC. The most notable include:

Advertising of products: Companies will pay developers of Adware to devise ways of showing their products to you. Some may be as simple as a pop-up ad that you see when you go to a particular website. More ingenious methods will install a small software program on your PC that can be continuously updated by these developers when new products are available.

Track your web-surfing habits for Marketing of new products: Developers will create small programs that "track" your web-surfing habits, which are then categorized for companies to create "targeted" marketing campaigns.
 
Identity theft: This form is, by far, the most malicious use of Spyware. Developers will create programs to capture personal information such as bank accounts, credit cards, and so on. Many of today's most popular Spyware applications promise the ability to execute via "remote installation". Remote installation is the ability to install a Spyware program on a computer.

ymptoms of Adware / Spyware


The best method for identifying Spyware on a computer is with the use of software designed to identify and remove it. Since most Spyware applications communicate with other computers and are programs themselves, they use system resources which include memory, CPU cycles and an Internet connection. Therefore, the following are some symptoms you might notice:

Slow Computer ­- Although there are many reasons why your computer may run slow, if you use your computer daily then you are familiar with how it behaves. Older computers and some applications can cause a computer to run slow; however, if suddenly it begins to run much slower, this could be a indication of Adware / Spyware./


Unknown E-mail Activity ­- If you start noticing email sent without your knowledge or you start receiving a large number of undelivered emails you did not send, then you may have been infected. There are some types of programs that can send out spam from your computer using your address book or simply return the email addresses in your address book to a spammer to be used for unsolicited email.

Odd Computer Behavior -­ You may notice hard drive activity when you are not using the computer, an unknown icon in your Windows system tray appears, settings modified, CD drives opening and shutting, or programs mysteriously opening and closing. These could be a sign of a Spyware program running on your PC.


Adware / Spyware

 
What is Spyware/Adware?

Adware and Spyware programs can adversely impact your computer performance. The information below provides tips and suggestions on how to remove malicious programs and protect your computer system.

According to the "Center for Democracy and Technology", there are at least three general categories of applications sometimes described as Spyware.

Spyware Categories Keystroke loggers and screen capture utilities, which are installed by a third party to monitor work habits, observe online behavior, or capture passwords and other information. "Adware" and similar applications that install themselves surreptitiously through "drive-by downloads" or by piggybacking on other applications and track user's behaviors take advantage of their internet connection. Legitimate applications that have faulty or weak user-privacy protections.


Quick Select



Spyware Categories

  • Keystroke loggers and screen capture utilities, which are installed by a third party to monitor work habits, observe online behavior, or capture passwords and other information.
  • "Adware" and similar applications that install themselves surreptitiously through "drive-by downloads" or by piggybacking on other applications and track user's behaviors and take advantage of their internet connection.
  • Legitimate applications that have faulty or weak user-privacy protections

There are many reasons why someone would install Adware / Spyware on your PC. The most notable include:

Advertising of products: Companies will pay developers of Adware to devise ways of showing their products to you. Some may be as simple as a pop-up ad that you see when you go to a particular website. More ingenious methods will install a small software program on your PC that can be continuously updated by these developers when new products are available.

Track your web-surfing habits for Marketing of new products: Developers will create small programs that "track" your web-surfing habits, which are then categorized for companies to create "targeted" marketing campaigns.
 
Identity theft: This form is, by far, the most malicious use of Spyware. Developers will create programs to capture personal information such as bank accounts, credit cards, and so on. Many of today's most popular Spyware applications promise the ability to execute via "remote installation". Remote installation is the ability to install a Spyware program on a computer.
Symptoms of Adware / Spyware

The best method for identifying Spyware on a computer is with the use of software designed to identify and remove it. Since most Spyware applications communicate with other computers and are programs themselves, they use system resources which include memory, CPU cycles and an Internet connection. Therefore, the following are some symptoms you might notice:

Slow Computer ­- Although there are many reasons why your computer may run slow, if you use your computer daily then you are familiar with how it behaves. Older computers and some applications can cause a computer to run slow; however, if suddenly it begins to run much slower, this could be a indication of Adware / Spyware./


Unknown E-mail Activity ­- If you start noticing email sent without your knowledge or you start receiving a large number of undelivered emails you did not send, then you may have been infected. There are some types of programs that can send out spam from your computer using your address book or simply return the email addresses in your address book to a spammer to be used for unsolicited email.

Odd Computer Behavior -­ You may notice hard drive activity when you are not using the computer, an unknown icon in your Windows system tray appears, settings modified, CD drives opening and shutting, or programs mysteriously opening and closing. These could be a sign of a Spyware program running on your PC.
Detecting Adware / Spyware

There are several steps you can take to detecting Adware / Spyware on your computer. The simplest method to determine if Spyware or Adware has been installed is to check your Windows Programs list or the Windows Start-Up folder. To check the Windows Programs list:

  • Click on Start
  • Select Control Panel
  • Double click Add/Remove Programs
  • Review the list of programs installed on your computer. If you identify a suspicious program research the applications on the internet to confirm it is Spyware and then remove it.

Another method of identifying Spyware is to check your Windows Start-Up folder:

  • Double click MY COMPUTER icon
  • Double click on the C:\ drive
  • Double click Documents and Settings folder
  • Double click All Users folder
  • Double click Start Menu folder
  • Double click Programs folder
  • Check for any unknown programs

If you are uncertain if a program is considered Adware / Spyware, we suggest researching the program against Spyware databases which can be found by searching the Internet.

Removing Adware / Spyware


If you believe you are infected with Adware / Spyware, the easiest way to detect and remove it is by the use of anti-spyware software or scanning software. Anti-spyware software is a different tool from anti-virus software but operates in much the same way, by scanning the hard drive looking for files associated with known Adware / Spyware programs. The software then returns any found programs and allows the user to determine what course of action to take.

Keeping Clean from Adware / Spyware


Be cautious of downloads. The easiest way is to not install them in the first place. Many of these applications are installed via "drive-by downloads", which use misleading tactics to install them. Many times users have no idea they have installed the application. Many developers will design their applications to be difficult to uninstall. If a small portion remains on your PC, it has the ability to rebuild itself, so be careful what you download. Be sure to read any privacy policies offered by the site and only install applications when you are certain what functions they are performing and AFTER you read the End User Licensing Agreement (EULA).

Be suspicious of pop-up ads. Do not download programs via pop-up ads or from unknown sites. Also, be sure to close any window that looks suspicious and always close windows properly by clicking the "X" in the upper right hand corner. Some pop-up ads will contain a close box or "X" within the window that will actually open the ad. To be safe, you can always close the window from your Windows taskbar by right clicking on the window located on your taskbar (generally found at the bottom of your screen) and selecting Close.

Stay updated. Simply keeping up with the latest security patches, fixes, and service packs will help prevent some of the programs from installing on your computer.

Scan regularly. Frequent scans using your anti-spyware tool will also keep you safe.

Where can I find additional information on Adware / Spyware?
Suddenlink does not endorse any particular site, but you can search the Internet for Spyware sites or visit sites like Microsoft or Spyware Guide to learn more about Adware/Spyware and utilities for removing these types of applications.



IP Address

What is an IP address?

An IP address is a unique identifier that is assigned to your modem when it's trying to connect to the internet.  Once connected, the modem is assigned a public IP address.  This IP address was dynamically chosen through Dynamic Host Configuration Protocol (DHCP), meaning that it was assigned to your modem randomly from a large pool of numbers.  IP addresses can also be assigned staticly, meaning that the IP address has been assigned specifically in the network and in your device for you to use so it never changes.

If your device is connected to a router then it will be assigned a private IP address by the router.

An IP address is much like having a street address. In order for someone to send you mail, they need to know your address. It's the same situation with IP addresses. It is needed for other computers and servers to be able to communicate with your computer and vice versa.

What is the difference between a public IP and a private IP?

A public IP is one that is assigned by a network and is able to be seen on the internet. Your IP address is tied to many (if not most) of the things you do on the internet and can be used to identify what general location you are at, as well as the company that is providing the internet service. This is because blocks of IPs are assigned to ISPs (Internet Service Providers) by the governing body called American Registry for Internet Numbers (ARIN). These blocks are then broken up and used for a variety of purposes including one being assigned to your modem so your devices can connect to the internet.

A private IP address is one given to your device when it connects to a private network, such as if your device is connected to your home router. Private IPs are not viewable on the internet in general. It is specific to your network and is managed by the router you are connected to. These generally start with 192.168.0.0 unless they are changed by a network administrator to something else.
What is the difference between dynamic and static IP addresses?

Dynamic IP addresses are ones that are assigned by the network when a device connecting to it requests one. The IP address is pulled from a larger pool of IPs that are set aside for customer connections. The IP address your device is given is assigned for a 24 hour lease. At the end of that lease your device will ask the network for an IP again. It may be given the same IP address again or it may be assigned another. This is why you may not have the same IP address today as you had yesterday or another time.

And all of this happens seamlessly in the background, so your service isn't interrupted.

Static IP addresses are ones that are assigned specifically to you in the system so no one else can use it. When your device tries to connect to the internet, instead of asking for an IP to be assigned to it dynamically, it asks the system to use the specific IP that it is set up with. If that IP address is available, which it should be, the network allows that connection. Static IP addresses are only assigned to Commercial customers and are not allowed on residential accounts.

How can I find my public IP address?

There are multiple ways to find out which public IP address you are using at any given point. But the easiest way is to go to one of the many websites that are set up specifically to show you what your IP is, such as whatismyipaddress.com or ipchicken.com

If you are using the Chrome browser, Firefox browser or an updated version of Internet Explorer, you can also do a Google search for "my ip address" and it will list your public IP address for you at the top of the search results!

Other important IP ranges to know

There are certain IPs and IP ranges that are not for use by most people because they are reserved for specific functions in either the computer or the network. The IP addresses listed below will be seen if your device is connected directly to the modem without a router being used.

  • 255.255.255.255 - This address is reserved for the network to send broadcast messages to all computers on the network.
  • 127.0.0.1 - This IP address is referred to as the "loopback" address. It is your computers way of identifying itself, no matter if it has an assigned IP address or not. It is typically used for troubleshooting and network testing.
  • 169.254.0.1 to 169.254.255.254 - This range is called the Automatic Private IP Addressing (APIPA) range. IPs in this range are assigned automatically when a computer is unsuccessful in getting an address from the DHCP server.

If your device is connected to a router, either wired or wirelessly, there is a different set of IP addresses or ranges that you might see.

  • 10.0.0.0 to 10.255.255.255 - Called a Class A range. This range holds 16,777,216 IP addresses available for use. Most of the time, this range is only used by ISPs and other very large organizations simply because of the sheer size of it.
  • 172.16.0.0 to 172.31.255.255 - Called a Class B range. This range holds 1,048,576 IP addresses available for use. It is typically used by medium sized networks such as a large college campus.
  • 192.168.0.0 to 192.168.255.255 - Called a Class C range. This range holds 65,536 IP addresses available for use. This is the IP range that is most commonly used by routers to assign IPs for an internal or private network. Obviously you will not use them all. But it is one of the smallest ranges.

Selenium Basic Concepts

What is Selenium ?
Selenium is an automation testing tool which will automate your web based applications. Selenium is an open source automation testing tool for web based applications. It is easy to use, strong and is very flexible. It can't use for Desktop based application automation.
You can work on many operating systems using selenium and you can code in any one of the following languages when using selenium.
Languages supported by Selenium
- Java   ---is most famous one
- C#
- Ruby
- Pyton
- PHP
- Pearl
It works on Mozilla, IE 6,7,8, Google Chrome(latest version), Opera 8,9,10, and Safari(latest version).
It also works on multiple operating systems-Windows, Mac, Linux/Unix, and many more operating systems.
It is not compulsory that our application code is in C# then you have to write selenium  code C#. 
It is independent of application to be test.
For example: if I make my website in java then I can write selenium code in PHP as well.
Components of Selenium
Selenium is made up of four components:
- Selenium IDE:  Installs as an addon in Mozilla.Only runs in Mozilla. Its got a strong feature of record and run. You can also extend IDE functionality with the help of user extensions. It supports regular extensions, loops, if statements and many other features. You can also parameterize your test cases using IDE.
For IDE, we dont need to learn any programming language. Only you need to know Javascript if you are using User extensions in IDE.
Drawback of IDE is that it works on only Firefox. sometimes it becomes difficult to use IDE.
Go to website- qtpselenium.com then select 'Selenium Training' and watch module no. 10
- Selenium RC:  This is the older version of selenium. It works on multiple browsers. RC can be implemented in any one of the programming languages mentioned above. RC has some limitations. To overcome those WebDriver came into the market.
- Webdriver:  Webdriver is the new version of selenium. It also works on multiple browsers. Its removed many drawbacks and issues in Selenium RC. It also supports Android and Iphone Testing. Architecture of WebDriver is totally different that the architecture of RC. But both RC and WebDriver require knowledge of one of the supported language.
 
- Grid:  Grid is used to run test cases in parallel on multiple machines and browsers. For example, you have 200 test cases and you want to run your test cases in parallel on four different machines(50 on each) or you want to run test cases in parallel(50 on Mozilla, 50 Safari, 50 on chrome, 50 IE) on single machine, you can do this easily using Grid.
Certain Features which make it a strong tool to use are:
- Open source
- Works on multiple browsers and multiple operating systems as compared to other tools in market.
- You can develop selenium code and make it run in parallel on multiple machines using different browsers.
- Support for Android and Iphone Testing.
- Selenium IDE is a simple tool which comes as an addon in firefox and is easy to use. It has the record and run feature which is very strong.
- You can also extend the functionality/scope of IDE with the help of many plugins available
- You can also create your own Selenium IDE plugins
- Selenium RC is the older version of selenium and is supporting all the languages mentioned above
- Webdriver is the latest version of selenium and is very strong. Its removed lots of drawbacks in RC and introduced many more features in selenium. - Selenium when used with Hudson can be used for Continuous integration.
- Object oriented datadriven or hybrid testing framework can be made very easily.
- You can use open source frameworks such as junit, testng, nunit etc and can write selenium test cases in them

Documentation for Selenium


Selenium video tutorial link-
qtpselenium.com

To read selenium language(Java, perl, etc.) specific link-
seleniumhq.org/docs

What is XML?

XML (eXtensible Markup Language) is a method for defining structure in documents. The philosophy behind XML is that the information (text, images, other parts) of a document can be identified through a set of rules. With these rules, a variety of software applications (like Web browsers) can interpret, display, or process data in documents.


======================================================================
 
The Extensible Markup Language (XML) is a subset of SGML, an enabling technology used in applications such as HTML. Its goal is to enable generic SGML to be served, received, and processed on the Web in the way that is now possible with HTML. XML has been designed for ease of implementation and for interoperability with both SGML and HTML. XML is not a replacement for HTML. XML and HTML were designed with different goals:
  1. XML was designed to describe data and to focus on what data is.
  2. HTML was designed to display data and to focus on how data looks.
 
HTML is about displaying information, while XML is about describing information. XML tags are not predefined. You must "invent" your own tags. The tags used to mark up HTML documents and the structure of HTML documents is predefined. The author of HTML documents can only use tags that are defined in the HTML standard (like <p>, <h1>, etc.). However, XML allows the author to define his own tags and his own document structure. The tags for example <to> and <from> are not defined in any XML standard. These tags are "invented" by the author of the XML document. It is important to understand that XML is not a replacement for HTML. In current and future Web development it is most likely that XML will be used to describe the data, while HTML will be used to format and display the same data. XML is a cross-platform, software and hardware independent tool for transmitting information.

Cascading Style Sheets (CSS)

First introduced in 1996 by the World Wide Web Consortium1, Cascading Style Sheets (CSS) serve an important role for specifying the appearance of HTML pages. Style sheets help you influence the way your HTML pages look in a way that is far more efficient that the HTML element-by-element techniques used in the past. With advances in Web browser technologies, CSS level 22, should be now available to many users, and CSS Level 3 is in development3.

The Purpose of Style Sheets

The overall purpose of style sheets are to help people who write HTML to separate the content of a Web page from specifications of how it looks. Style sheets are used to influence HTML page appearance. For example, HTML writers might want to indent the first line of each paragraph by five spaces. To do this the old way, they would place the (non-breaking space) entity five times at the start of each paragraph. This worked fine for pages generated by HTML editors, or even on a small scale for hand-prepared HTML pages. But what if the Web designer decided that the paragraphs should not have the first line of each paragraph indented? It would be a laborious process to have to go through all the HTML pages to remove the entities.
Rather than specify the appearance of elements in an HTML file, writers need a way to specify the appearance of an entire set of HTML pages all in one place, separate from the HTML content. Style sheets make this possible. You can use style sheets to efficiently create a consistent look and feel for your web and change this look and feel quickly and easily.

How Style Sheets Work

You create a style sheet in a file using a command syntax that describes how HTML elements in your files should be rendered in a Web browser. In your HTML files, you identify this style sheet file. When a user accesses your HTML pages, the Web browser refers to your style sheet file to display your HTML pages.
Using style sheets, you can tell a Web browser how to display HTML elements such as margins, point sizes, text background colors, and many others. For example, you can influence the margin spacing used in every P (paragraph) element in your HTML pages on your Web site. Using variations within style sheets called classes, you can create different styles of an HTML element.
For example, let's say you have a need for cautionary statements in your document. One such paragraph class could be a statement of warning, another paragraph class could be a statement of imminent danger. You would like Web browsers to display these paragraph classes in different ways--the danger in red, bold, and underlined text; the warnings in purple and bold text.
In your style sheet file, call it mystyle.css, you would place these statements to affect the appearance of the P (paragraph) element:
P.danger {
   color: red;
   font-weight: bold; 
   text-decoration: underline;
}

P.warning {
   color: purple;
   font-weight: bold; 
}
In your HTML files, you identify the style sheet you are using (mystyle.css), and then you can then use these classes to label statements. For example, in your HTML file mystyle.html, you could have:
<HTML>
   <HEAD>
           <LINK Rel="stylesheet" Href="mystyle.css" Type="text/css">
   </HEAD>
     <BODY>
   <P class="warning">
         Alien approaching!
   </P>
   <P class="danger">
      Destruction imminent!
   </P>
</BODY>
</HTML>
Your users will need to have more recent versions of the popular Internet Explorer (3.0 or above) or Netscape Navigator (4.0 or above) in order to see the style effects. If your users don't have these style-enabled browsers, they won't see all the effects you create. Therefore, in using style sheets, like many other kinds of new HTML elements that have come before, you will need to be sensitive to users who do not have the most current Web browser software.
With a little common sense and creativity, you you can still meet the needs of users who cannot use the style sheets. In fact, when you use style sheets, you can avoid much of the kind of syntax gymnastics that HTML writers have had to put into their pages to make things "look right." The result is that your HTML pages can be leaner and more easily displayed in all Web browsers. And instead of fiddling with how your Web pages look, you can focus on what your Web pages mean.

====================================================================

CSS
 
CSS stands for Cascading Style Sheets. The styles define how to display HTML elements and are normally stored in Style Sheets (.css). External Style Sheets are stored in CSS files and can save you a lot of work. Multiple style definitions will cascade into one. HTML tags were originally designed to define the content of a document. They were supposed to say "This is a header", "This is a paragraph", "This is a table", by using tags like <h1>, <p>, <table>, and so on. The layout of the document was supposed to be taken care of by the browser, without using any formatting tags. As the two major browsers - Netscape and Internet Explorer - continued to add new HTML tags and attributes (like the <font> tag and the color attribute) to the original HTML specification, it became more and more difficult to create Web sites where the content of HTML documents was clearly separated from the document's presentation layout. To solve this problem, the World Wide Web Consortium (W3C) - the non profit, standard setting consortium, responsible for standardizing HTML created STYLES in addition to HTML 4.0.  All major browsers support Cascading Style Sheets. Styles sheets define how HTML elements are to be displayed, just like the font tag and the color attribute in HTML 3.2. Styles are normally saved in external .css files. External style sheets enable you to change the appearance and layout of all the pages in your Web, just by editing one single CSS document.
CSS is a breakthrough in Web design because it allows developers to control the style and layout of multiple Web pages all at once. As a Web developer you can define a style for each HTML element and apply it to as many Web pages as you want. To make a global change, simply change the style, and all elements in the Web are updated automatically. Style sheets allow style information to be specified in many ways. Styles can be specified inside a single HTML element, inside the <head> element of an HTML page, or in an external CSS file. Even multiple external style sheets can be referenced inside a single HTML document.  What style will be used when there is more than one style specified for an HTML element? Generally speaking we can say that all the styles will "cascade" into a new "virtual" style sheet by the following rules, where number four has the highest priority:
 
  1. Browser default.
  2. External style sheet.
  3. Internal style sheet (inside the <head> tag).
  4. Inline style (inside an HTML element).