Saturday, April 27, 2024
10:27 PM (GMT +5)

Go Back   CSS Forums > Off Topic Section > General Knowledge, Quizzes, IQ Tests

General Knowledge, Quizzes, IQ Tests A zone where General Knowledge related to this exam can be shared.Surveys and Threads with polls and questions that require answers can be Posted here

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
 
LinkBack Thread Tools Search this Thread
  #11  
Old Monday, November 02, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

how to install Windows7 from USB stick or pen drive.

I think most of the users will know already but as Windows 7 is releasing on 22/10/2009 which is really very near, i think you should know this method. As it can save your time and your blank DVD's also(it's a joke). Because installing from USB is much faster than installing from DVD. I have tried this method myself 5-6 times as i'm using windows 7 from past 6 months. I made this tutorial as easy that even a novice can create one for him. So here we go:





Installing Windows 7 with a USB flash drive - What you need:
The Windows 7 ISO weighs a hefty 2.5GB of disk space, so a flash drive with at least 4GB of space is required. Also, you need the following programs: BootSect, USB_prep8, and PeToUSB. All of which can be downloaded in a handy package that I’ve uploaded here:


Code:
http://hotfile.com/dl/8841981/13fdb9...ake_c.rar.html



When you have everything ready, insert your flash drive, plug in your notebook/laptop/netbook or whatever you call it to AC power and get ready to create a Windows 7 bootable USB flash drive.
Installing Windows 7 with a USB flash drive - Preparation
1. Download the packed RAR file which I gave you the link to earlier and extract its contents to your computer’s Desktop (this makes things easier). This contains the three programs you will need to make a bootable USB flash drive, which are BootSect, USB_prep8, and PeToUSB.
Now that the bootsect and USB_prep8 folders are on your Desktop, do the following.

2. Open the USB_prep8 folder, find USB_prep8.cmd and run it, pressing any key to continue when prompted. This will initiate PeToUSB. PeToUSB will be used to format your flash drive, so it is suggested that you back up any valuable data that you might have on your flash drive before proceeding. Once the backup’s done or you are sure it’s OK for you to format your flash drive, see the PeToUSB options and make sure that “Enable Disk Format”, “Quick Format” and “Enable LBA (FAT16X)” are checked. See photo below.

After you click start and agree to what comes next, your USB flash drive will be formatted, and the next step would be to configure it so that it becomes bootable. Close PeToUSB and the small command prompt window that you opened earlier.
3. Make your USB flash drive bootable using bootsect. Here’s how.
Assuming that the bootsect folder you extracted earlier is already on your desktop, simply do the following. Open a command prompt window by pressing the Windows key + R (or going to Start > Run > typing “cmd” without the quotation marks and hitting Enter).
At the command prompt, type the following word for word:

Code:
1. “cd Desktop”
2. “cd bootsect”
3. “BootSect.exe”
4. “BootSect.exe /nt60 d:” (wherein “d” stands for the designated letter of my USB flash drive; exchange it with yours if it’s different, since it could be e, f, g, etc.)

Here’s a photo of what it should look like:

And if all goes well, you should be able to read the following message: “Bootcode was successfully updated on all volumes”. This means you now have a bootable USB flash drive. Congratulations!

5. Copy the Windows 7 install files to your bootable USB flash drive.
Installing Windows 7 with a USB flash drive - What now?

Now that you have a bootable USB flash drive with the Windows 7 install files inside it, you’ll be able to install Windows 7 on any machine, provided that the hardware supports it. I may have been unsuccessful in installing Windows 7 on my Aspire One, but I did succeed in installing it on my other laptop, which proves that the bootable USB flash drive I made works.
Hopefully, this little thing I’ve done helps someone out there. Maybe someone like me who didn’t have a spare blank DVD on hand when I wanted to install Windows 7 so bad.


Enjoy........... Perhaps the easiest step in all of this minor hackery, is this. Find your Windows 7 beta ISO file, extract its contents using WinRAR, and copy the resulting files (all of them) into your empty and newly configured to boot USB flash drive. Once that’s done, safely remove it, and use it to boot any computer to install Windows 7 on it. It’s that simple.
Attached Thumbnails
IT Training / Learning / Video's-asus_win7_04.jpg  
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following User Says Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Monday, November 09, 2009)
  #12  
Old Sunday, November 15, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Change Your Ip In Less Then 1 Minute

Change Your Ip In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
  #13  
Old Sunday, November 15, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

Basics Of Dual-Core Process Computer


The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too.

The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip).
The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time.

The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned.

By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory.

Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`.

More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines.

Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart.

The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
  #14  
Old Sunday, November 15, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

A Brief Introduction Into TCP/IP


Many people may not know what TCP/IP is nor what its effect is on the Internet. The fact is, without TCP/IP there would be no Internet. And it is because of the American military that the Internet exists.During the days of the cold war, the defense department was interested in developing a means of electronic communication which could survive an attack by being able to re-route itself around any failed section of the network.They began a research project designed to connect many different networks, and many different types of hardware from various vendors. Thus was the birth of the Internet (sorta). In reality, they were forced to connect different types of hardware from various vendors because the different branches of the military used different hardware. Some used IBM, while others used Unisys or DEC.

TCP (Transmission Control Protocol) and IP (Internet Protocol) were the protocols they developed. The first Internet was a success because it delivered a few basic services that everyone needed: file transfer, electronic mail, and remote login to name a few. A user could also use the “internet” across a very large number of client and server systems.
As with other communications protocols, TCP/IP is composed of layers. Each layer has it’s own responsibility:

IP is responsible for moving data from computer to computer. IP forwards each packet based on a four-byte destination address (the IP number). IP uses gateways to help move data from point “a” to point “b”. Early gateways were responsible for finding routes for IP to follow.

TCP is responsible for ensuring correct delivery of data from computer to computer. Because data can be lost in the network, TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.

How TCP/IP works

Computers are first connected to their Local Area Network (LAN). TCP/IP shares the LAN with other systems such as file servers, web servers and so on. The hardware connects via a network connection that has it’s own hard coded unique address – called a MAC (Media Access Control) address. The client is either assigned an address, or requests one from a server. Once the client has an address they can communicate, via IP, to the other clients on the network. As mentioned above, IP is used to send the data, while TCP verifies that it is sent correctly.

When a client wishes to connect to another computer outside the LAN, they generally go through a computer called a Gateway (mentioned above). The gateway’s job is to find and store routes to destinations. It does this through a series of broadcast messages sent to other gateways and servers nearest to it. They in turn could broadcast for a route. This procedure continues until a computer somewhere says “Oh yeah, I know how to get there.” This information is then relayed to the first gateway that now has a route the client can use.

How does the system know the data is correct?

As mentioned above, IP is responsible for getting the data there. TCP then takes over to verify it.

Encoded in the data packets is other data that is used to verify the packet. This data (a checksum, or mathematical representation of the packet) is confirmed by TCP and a confirmation is sent back to the sender.

This process of sending, receiving and acknowledging happens for each individual packet sent over the Internet.

When the data is verified, it is reassembled on the receiving computer. If a package is not verified, the sending computer will re-send it and wait for confirmation. This way both computers – both sending and receiving – know which data is correct and which isn’t.

One nice thing about this protocol is that it doesn’t need to stick to just one route. Generally, when you are sending or receiving data it is taking multiple routes to get to its destination. This ensures data accuracy.

Just the facts:

TCP/IP addresses are based on 4 octets of 8 bits each. Each octet represents a number between 0 and 255. So an IP address looks like: 111.222.333.444.

There are 3 classes of IP addresses:

Ranges starting with “1” and ending with “126” (i.e.. 1.1.1.1 to 126.255.255.254) are Class A

Ranges starting with “128” and ending with 191 (i.e.. 128.1.1.1 to 191.255.255.254) are Class B

Ranges starting with 192 and ending with 254 (i.e.. 192.1.1.1 to 254.255.255.254) are Class C ( You will notice that there are no IP addresses starting with “127”. These are reserved addresses.)

Calculating an IP address

One of the things that always confused me was how to convert IP address to their Binary form. It is quite simple really. IP addresses use the Binary numbers (“1”s and “0”s) and are read from right to left.

Each position in the binary address corresponds to a number, from 1 to 128 and look like this:

128 64 32 16 8 4 2 1

To calculate an address, simply add the numbers where a “1” appears.

For example, the following:

00001010 works out to 10. Like this:

0 0 0 0 1 0 1 0
128 64 32 16 8 4 2 1

You can see that the “1”s line up with the 2 and 8 – when you add 2 plus 8 the answer is 10.

Since an IP address contains 4 of these octets, it can be displayed in binary like:

00001010.00001010.00001010.00001010

Therefore, IP Address 10.129.254.1 would be converted to:

00001010.10000001.11111110.00000001
(8+2) . (128+1) .(128+64+32+8+4+2).(1)

While it’s not important for the average person to know how to figure this stuff out, it is important for someone setting up a small network. That is because TCP/IP also uses what are called subnet masks to determine which addresses are valid.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
  #15  
Old Sunday, November 15, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

Resetting/Hacking Windows XP Admin Password

1.Download the iso file below:



3.Boot your computer from the burned iso.

4.Follow the given instructions and reset your password.



http://www.easy-share.com/1903104307/WindowsKey.iso
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
  #16  
Old Sunday, November 15, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

How Long Has Your System Been Running?

Hhere's how you verify system uptime:

Click Start | Run and type cmd to open a command prompt.
At the prompt, type systeminfo

Scroll down the list of information to the line that says System Up Time.

This will tell you in days, hours, minutes and seconds how long the system has been up.

Note:

That this command only works in XP Pro, not in XP Home. You can, however, type net statistics workstation at the prompt in Home. The first line will tell you the day and time that the system came online.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
  #17  
Old Sunday, November 15, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

Delete autorun.inf virus without any software

GOTO ==RUN==CMD===CD\

AND TYPE

DEL AUTORUN.INF /P/F/S/Q/A *

DON'T FORGET AAD /P/F/S/Q/A

KUN AGAR AAP { /P/F/S/Q/A} YEAH NEHI LEKHO GAY TU

AAP KI AUR PROGRAMS KI AUTORUN.INF B DELETE HO SAKTI HAIN

THEN DELETE BY PRESSING {Y}

DEL [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names
ERASE [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names

names Specifies a list of one or more files or directories.
Wildcards may be used to delete multiple files. If a
directory is specified, all files within the directory
will be deleted.

/P Prompts for confirmation before deleting each file.
/F Force deleting of read-only files.
/S Delete specified files from all subdirectories.
/Q Quiet mode, do not ask if ok to delete on global wildcard
/A Selects files to delete based on attributes
attributes R Read-only files S System files
H Hidden files A Files ready for archiving
- Prefix meaning not

If Command Extensions are enabled DEL and ERASE change as follows:

The display semantics of the /S switch are reversed in that it shows
you only the files that are deleted, not the ones it could not find.b
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
CSS Tips by Amubarak amubarak Tips and Experience Sharing 103 Monday, December 28, 2020 03:31 PM
CSS - Training Programmes and Examinations Omer CSS Competitive Examination 1 Sunday, June 12, 2016 12:12 AM
The Pakistan Press Foundation Muhammad Akmal Journalism & Mass Communication 2 Saturday, December 19, 2009 12:00 AM
77 Ways to Learn Faster, Deeper, and Better Saqib Riaz General Knowledge, Quizzes, IQ Tests 10 Friday, August 28, 2009 11:30 AM
improve ur english learning skills amy English (Precis & Composition) 1 Friday, February 16, 2007 09:39 PM


CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of CSSForum.com.pk (unless CSSForum.com.pk is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.