Kernal : The Heart of OS



             The KERNAL was initially written for the Commodore PET by John Feagans, who introduced the idea of separating the BASIC routines from the operating system. It was further developed by several people, notably Robert Russell added many of the features for the VIC-20 and the C64.
             In computing Kernal is the main component of most operating system. The kernal also known as the heart of an OS.It is working as a bridge between the application and the actual data processing done at the hardware level.
            As a collection of programs written in 'C language'  that directly interact with hardware and most of manages the task like memory management , task scheduling, process management, Device management and file management, etc ....but the kernal is a program that constitutes the central core of the computer OS.It has complete control over everything that occurs in the system.
           When the system starts, the kernal is being first loaded into the memory during the boot time and it should be remains their for the entire duration of the computer session, because the services of the kernal requires continuously. The kernal is the part of OS which is responsible for all other operations.
           Unix kernal is directly above the hardware kernal manages all hardware  devices and controls programs run on the computer it is loaded into the memory when system is booted.

How Kernal works?


          When a computer boots up, it goes through some initialization functions (Like Memory checking). Then it loads the kernal and switch the control to it. Then the kernal starts up  all the required processes needed to communicate with the user and the rest of the environment (e.g. LAN).
          The kernal itself does not interact  directly with the user but rather interacts with the shell and other programs as well as with the hardware device on the system including the CPU, Memory and Disk drive.
A kernal can be contrasted with a, which is the program that interacts with user commands.
       

Way to keep secure E-mail


E-mail is the most widely used forms of communication today. E-Mail is a method of exchanging the digital information from one end to another end. We know that E-Mails are very popular in our daily routine. In the past, when we don’t have an Internet, What we do for the communication? Yeah, Off Course letters being sent from one place to another place or one person to another person, but the letters aren’t secure, but how?

Suppose someone sent you a letter which contains your confidential information and there may be a chance that it may be lost or theft by someone. So these aren’t secure way to transfer the confidential information. Later when we enter into the world of internet then E-Mails are used to exchange messages but with the advancement of internet there is a risk of theft your E-Mail or Hack your E-Mail.

So, To Prevent from E-mail Hijacking we must keep our E-Mails Safe. In this article we are going to read How can we keep our E-Mail Safe ?

There are total 5 ways from which you can keep your E-Mails Safe and minimizing the mishappening with your mail list. 

Go Off Records

If you really want to keep your E-Mails secret then just activate the Go Off Record button from your G-Mail chat box. If you are using Gmail then you can also activate this feature from the GTalk or other IM Chat Messenger. After activating this features whatever you typed-in from the keyboard will not save in your E-Mail Account.

Stop using Draft

If you are using the draft service to save your message or private information so you should stop it from now. Because it can be read by anyone, but how? Let’s discuss with an example

Suppose you have an urgent piece of work on the internet and your internet is not working, what will you do? Off course you have to go to the cyber cafe, and in the cafe you open your E-Mail account and by mistake you didn’t log-out your E-Mail account, now anyone who sits on your seat can open your E-Mail account, check your draft folder and theft your confidential information.

Use 2-Step Verification

This is the best way to keep your E-Mail Safe. If you are using G-Mail then there is a best option for you to activate 2-step Verification in your G-Mail account. After activating this option no one can log-in into your G-Mail account even though he/she knows your password.

Use password protected zip files

If you are sending some private or confidential information to anyone then always use password protected zip files. This will keep your E-Mail message safe. By chance if anyone theft your file which is password protected then he/she cannot open that file. So this is how, you can safe your E-Mails safe.

Hide your files in image

There is an another cool way to keep your E-mail safe i.e. hide your files with images then send it to the recipient. But how is this possible? Yeah, it is possible let’s see,

To hide files in image you have to go through some steps so get ready-

Gather all files (which you want to hide) in a specific folder I recommend C:\private

Then compress all files to .rar extension and named it like hello.rar and this hello.rar should also be in the same directory i.e. private.

Now pick any .jpeg file (for ex- abc.jpeg) from your computer and put that image file into that directory.

Open command prompt (click on start-> Run-> cmd) and go to the present working directory that is C:\private

Then type a simple command

copy /b abc.jpeg + hello.rar output.jpeg

now your hello.rar folder is hidden in the output.jpeg and if you click on the output.jpeg file then an image will be open. This is the best way to keep your E-Mail safe, if your E-Mail is hijacked even then no one can theft your confidential information.

Watch YouTube videos on slow connection.


Friends when I was  bought a slow internet connection for the first time. I was new to the internet and when i used to watch videos on YouTube, I used to get irritated as it took more time to buffer than the actual time period of video.

I think this is the most common problem that every slow internet users all are facing. Am I right?

That is why I want to make this problem’s solution public, so that other people can also get benefited from it.


So here we go, just follow the procedure to watch the YouTube videos on a  slow Internet connection..

YouTube is a video-sharing website with millions of videos available on its servers. 

Registered and unregistered users can watch videos on YouTube and most of its videos were uploaded by individuals like us.

Even i love watching videos on YouTube but the greatest challenge I used to face is slow buffering and this usually happens because internet was slow, but just a few days ago I found out a solution to watch YouTube videos with my slow internet connection.

YouTube videos buffering can be speed up using “YouTube feather beta”. This helps to load YouTube video faster in a slow internet connection because it removes the entire information panel.  

Not only that, but also the sidebar related videos list, share button, comment, like and dislike button etc. From all YouTube video pages once it is activated.

To activate YouTube feather beta go to this link www.youtube.com/feather_beta and then click “Join Feather Beta” link to enable YouTube Feather beta on your account.

Yes this is it. You can now happily watch videos without having to wait.

Cloud Computing


                 What is Cloud computing?

Cloud computing is the use of computing resources like hardware and software which are available on the remote location and accessible over a network.
In cloud computing, the word cloud is used for "the internet" and computing  means " a type of internet-based computing".
Here  in cloud computing there is no any local servers or hardware to handle the application.
         


It should be runs through Interface software.All heavy lifting done by the web based services and the third party services holds all information like :
                             - Software       - Saved data       - Security                                                                              
                                                                       The cloud computing is used in online email services, storing online data.Cloud computing networks are large groups of servers and cloud service providers that usually take advantage of low-cost computing technology, with specialized connections to spread data-processing chores across them.  Virtualization techniques are often used to maximize the power of cloud computing.


Their are different types of cloud are their as below....


1) Public Cloud   : A public cloud can be accessed by any subscriber with an internet connection and access to the cloud space.

2) Private Cloud : A private cloud is established for a specific group or organization and limits access to just that group.

3)Community Cloud : A community cloud is stored among two or more organizations that have similar cloud requirements.

4) Hybrid Cloud : It is essentially a combination of at least two clouds, where the cloud included are mixture of public , private and community.


Some of the advantages of the cloud computing

- Unlimited, everywhere access
- Reduction in hardware and software cost.
- No physical space in office or home.
- Increase the computing process.
- Automatic redundancy.

Some of the disadvantages of the cloud computing

-  Change is hard.
-  Security & privacy
     -- User don't physically have data.
     -- Storage cloud be hacked.
-  Services Live and Die by their security reputation.
- Significally harder to infiltrate these system.


Protect USB Drive with password without 3rd Party Tool


 Today I'm gonna talk about USB Drives.
I'll show you a simple trick to lock your USB drive without using any 3rd party software.
Most of the people doesn't like other people checking their personal files and folder on USB, including me. This insecure situation creates a huge space to theft our personal data by someone. If you use password protection to your USB, you can reduce the data theft.

Lots of USB password protect software available in present market, but you want to pay money to use it for lifetime. If you're using Windows you don't need any software.



So let's see how to set a password protect on your USB without using any software I am showing this tutorial with window 7....
Insert your USB drive to computerOpen My Computer..... Then left click on USB drive.






Now click on Turn on BitLocker...
It opens one window, in that it asks for that password... 
Enter the strong password






        Now, after entering the password click on next button

Now Store your recovery key to somewhere on your harddrive
or take printout of the key



After storing the key click on the next....

It's open another window.... Now click on
Start Encryption



When you click on Start Encryption

It starts Encrypting your Drive.



That's all !!! :)
From right now if someone tries to access your USB, Windows will ask him/her to enter the current password.




Note : If you not find the option then jst follow bellow steps

Goto > Start menu 

In search just type BitLocker....

Then click Turn On BitLocker  for USb Drive.. Then follow above steps.





Best Smiley Collection for Facebook Chat







  Now a days, we should chat on Facebook lots,
 If we think chat without smiles than how boring 
so here i have some basic and some extra smiles 
to make your chat interesting... so for what are you waiting 
just open your chat box any try it.......i know you like it 



Classical Smiles




classical Facebook emoticons

New chat smiles.... 


Just copy past and see the migic....   ;)

[[f9.laugh]]
[[f9.sad]]

[[f9.angry]]

[[f9.sleepy]]

[[f9.shock]]

[[f9.kiss]]

[[f9.inlove]]

[[f9.pizza]]

[[f9.coffee]]

[[f9.rain]]

[[f9.bomb]]

[[f9.sun]]

[[f9.heart]]

[[f9.heartbreak]]

[[f9.doctor]]

[[f9.ghost]]

[[f9.brb]]

[[f9.wine]]

[[f9.gift]]

[[f9.adore]]

[[f9.angel]]

[[f9.baloons]]

[[f9.bowl]]

[[f9.cake]]

[[f9.callme]]

[[f9.clap]]

[[f9.confused]]

[[f9.curllip]]

[[f9.devilface]]

[[f9.lying]]

[[f9.rofl]]

[[f9.billiard]]

[[f9.cakepiece]]

[[f9.rosedown]]

[[f9.shutmouth]]

[[f9.shy]]

[[f9.silly]]

[[f9.tongue1]]

[[f9.fastfood]]

[[f9.ring]]


                          

Please post your comments .....
And help us to improving our blog.

RUN - COMMANDS



Hey friends here I have something for you .......
As I have shared  previously COMMAND-LINE prompt on desktop.
Today, I am going to share some basic RUN commands to use in that command line prompt.
By using this run commands you can interact with most applications easily .




 1. Accessibility Controls - access.cpl
 2. Accessibility Wizard - accwiz
 3. Add Hardware Wizard - hdwwiz.cpl
 4. Add/Remove Programs - appwiz.cpl
 5. Administrative Tools - control admintools
 6. Automatic Updates - wuaucpl.cpl
 7. Bluetooth Transfer Wizard - fsquirt
 8. Calculator - calc
 9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver
116. Wordpad - write


Please share it with your friends & also leave your comments Or Suggestions.......  :)