15 November 2012

Computer guide


Click Here! Get a computer solution here.

4 November 2012

XBOX MUSIC ON WINDOWS 8

ANSWER:-

Xbox Music on Windows 8 (Credit: Screenshot by Ed Rhee)
Xbox Music
Xbox Music was initially announced in June of this year and released to Xbox 360 users first. When Windows 8 reached general availability on October 26, Xbox Music became available to all Windows 8 users as well. Like Spotify, Microsoft's new music service can stream full songs on demand, as well as play taste-based radio like Pandora. Here's what you need to know to get started with Xbox Music on Windows 8:
To begin using Xbox Music, click on the orange Music tile on your Windows 8 Start screen and sign in with a Microsoft account.
Streaming songs on demand
To start listening to music right away, click on "Play an artist" and enter the name of an artist you want to listen to. A random selection of songs by that artist will begin playing immediately.
To play specific songs or albums, you can browse music from the All Music and Top Music sections. You can also use the Win+Q shortcut to perform a quick search.
Xbox Music search in Windows 8
Click to enlarge.
(Credit: Screenshot by Ed Rhee)
Once you've found music that you like, you can add it to a playlist by right-clicking on the track/album details. The control bar will appear at the bottom of the screen with the option to add the song or album to a playlist. In addition to playlists, you can also add songs or albums to My Music. When looking at track/album details, you'll see the option to "Add to my music."
Xbox Music control bar
Click to enlarge.
(Credit: Screenshot by Ed Rhee)
Smart DJ
Smart DJ is a taste-based radio feature, similar to Pandora and Spotify Radio. Just click on "New Smart DJ" and enter an artist. It will begin playing music right away and add the new Smart DJ station to My Music. Unfortunately, Smart DJ doesn't have a rating system, so you can't customize the station as you go along.
Adding your own music
To add your own music to My Music, open Windows Explorer (Win+E) and copy your music files to the My Music library. When you go back into Xbox Music, you'll see your music in the My Music section.
Windows 8 My Music library (Credit: Screenshot by Ed Rhee)
Managing My Music
You can manage the music in My Music by clicking on the heading. You'll be able edit playlists, delete Smart DJ stations, and remove albums and songs.
Xbox My Music management
Click to enlarge.
(Credit: Screenshot by Ed Rhee)
That's it. Don't forget that you can also look at your account details and set other preferences from within the Xbox Music app by using the Win+I shortcut.

Check the battery condition in OS X

SOLUTION:-
If you have a laptop system, then it helps to ensure the battery is working properly, since as with any system, over time and use the battery will begin to lose its charging capabilities and give you less and less running time. To compensate for the gradual loss in charging capability, it may help to regularly calibrate your battery to ensure its charge is accurately reported to the system, but this will not give you any indication of the battery's overall health.
To check the condition of your battery, first go to the Energy Saver system preferences and check the option to show the battery status in the menu bar (this should be enabled by default on most laptop systems). In the battery menu that appears you will be able to see the power source and estimated charge time remaining in addition to links for opening the system preferences; however, if you hold the Option key when opening this menu, then you will see a Condition option appear that will tell you the health status of your battery.
Battery menu in OS X
The battery menu can show you the condition status of your battery.
The available health conditions are the following:
  • Normal -- the battery is working as expected
  • Replace Soon -- the battery should hold ample charge to allow you to work, even though it holds less than its original capacity
  • Replace Now -- the battery will not hold enough charge to give you ample work time
  • Service Battery -- the battery is experiencing an error (regardless of how new it may be) that could result in an unstable capacity. While it should continue to function, it is recommended you have it serviced.
With these options available, if your battery is only giving you a few hours of running time or is not charging fully even after calibrating, then be sure to check its health using these options to see if the system is detecting a problem with the battery. If not, then you might need to look into what programs and services are running that could be draining the battery, but if the system does report poor battery health then you should have the battery replaced.
System Information report in OS X
The System Information report will also contain the battery health status (click for larger view).
This information about the battery can also be found in the System Information utility (available by generating a full-system report in the About this Mac dialog box in the Apple menu). By selecting the Power section in the generated report, you will see charge and health information about your battery, including the number of complete charge cycles it has been through and the estimated condition determined from these charge cycles (the same that is reported in the battery menu).
A charge cycle is a full discharge and recharge of your battery, and the system determines the number of these by summing up every partial use and recharge of your battery. For instance, if you fully calibrate your battery and discharge it followed by a recharge, then that counts as one charge cycle. If you use half of your battery one day and charge it, then a quarter of it the next day, followed by a quarter the final day, and then charge it back up, you have in these uses put another charge cycle on the battery.
The number of charge cycles your battery is capable of will vary between 300 and 1,000 depending on the system you own, which under most circumstances should give you at least several years of battery life, but this will vary for each system and how it is used. You can look up the estimated maximum charge cycle count for your system in this Apple Knowledgebase document.

ADDING ADMINISTRITIVE TOOLS IN WINDOWS 8

SOLUTION:-

In Windows 7, power users could display administrative tools on the Start menu. Now that Windows 8 has done away with the Start menu, you might be wondering where they went. If you happen to know the name of the tool you want to use, you can just search for it from the Start screen. If, however, you prefer to see them as tiles, here's how to get them onto your Start screen:
1. Hit the Win+I shortcut to bring up the Settings charm, then select Tiles.
2. Move the slider under "Show administrative tools" to the right so that it says "Yes."
Show administrative tools When you go back to the Start screen, you'll see 21 new tiles for administrative tools.
  • Component Services
  • Computer Management
  • Defragment and Optimize Drivers
  • Disk Cleanup
  • Event Viewer
  • iSCSI Initiator
  • Local Security Policy
  • ODBC Data Sources (32-bit)
  • ODBC Data Sources (64-bit)
  • Performance Monitor
  • Print Management
  • Resource Monitor
  • Services
  • System Configuration
  • System Information
  • Task Scheduler
  • Windows Firewall with Advanced Security
  • Windows Memory Diagnostic
  • Windows PowerShell (x86)
  • Windows PowerShell ISE (x86)
  • Windows PowerShell ISE

i5 complete in 400$

Desktops are a dying breed, but they're still useful for people who want maximum horsepower -- especially for graphics -- at a minimum price.
Today only, and while supplies last, Geeks.com has the refurbished Gateway DX4860-UB33P Core i5-2320 desktop PC for $379.99, plus $20 for shipping. Regular price: $599.99.
This is a seriously loaded desktop -- with one exception. It's powered by a 3GHz Intel Core i5-2320 processor, 8GB of DDR3 RAM, and 1TB hard drive. Like USB peripherals? The tower sports a whopping 10 USB ports, two of them USB 3.0. Also included: a DVD burner, a media reader, and 802.11n Wi-Fi -- an unusual but welcome amenity in a desktop.
With specs like that, the Gateway should be able to handle every app you throw at it, from Office to Photoshop to SimCity 5. Well, maybe not every app: the system has only an integrated Intel graphics subsystem (with HDMI, at least), which should be fine for everyday computing, but probably won't handle higher-end graphics stuff.
That's kind of ironic given that people typically buy desktops for exactly that stuff. Still, if you find you need more graphics horsepower, it's a simple matter to drop in a high-end video card. Heck, maybe you've already got one you could pilfer from your existing desktop.
CNET hasn't reviewed the DX4860-UB33P, but it scored at least one Editors' Choice elsewhere, and five Amazon customers rated it 4.8 stars out of 5.
One other thought: the Gateway comes with Windows 7 Home Premium. If you're planning to buy a new PC and don't want Windows 8, now would be an ideal time; it won't be long before the latter is your only option.
Bonus deal: Ever wish you could create your own private cloud server? (Duh: Who hasn't!) Today only, BitsDuJour has BarracudaDrive file-server software (Win/Mac) absolutely free. Similar to Pogoplug's software, but much more powerful, BarracudaDrive turns your home network into online storage you can access from anywhere. It normally costs $29. To get it, click the big green Get It For Free button, then follow the instructions.

Best windows 8 desktop Dell XPS all in One

Dell has informed us that it has increased the price of the $1,999 and $2,499 models of the XPS One 27 by $100. That means the $1,999 model will now cost $2,099, and the $2,499 model will cost $2,599. Our review unit, the now $2,099 model with a $200 Blu-ray drive upgrade, will cost $2,299 when the Blu-ray drive is available in December. The $1,399 and $1,599 units have not received a price increase.
It was only timing that held back the original XPS One 27 from an Editors' Choice Award. I wanted to see if Apple would unveil a new iMac, and also what might emerge from the PC side in the run-up to Windows 8. Apple's plans will be a mystery for another few hours, but after having seen the new slate of big-screen all-in-ones, I can say with confidence that Dell's updated XPS One 27 is the clear winner among the Windows crowd for its high-resolution 2,560x1,440-pixel display and a still-reasonable price tag.
I can see the pricing questions for this review now, so let's get that out of the way. The XPS One 27 starts at $1,399 for the non-touch model. The touch-screen version starts at $1,599. This review unit is based on the $2,099 step-up configuration, but Dell wanted to show off the big display so it included a Blu-ray drive.
The Blu-ray option is not available with the current $2,099 unit, but Dell says it will start offering the upgrade in December for $200. That puts this exact review configuration at $2,299. Other than the Blu-ray drive, it's identical to the $2,099 model that you can purchase today. If you want an XPS One 27 with a Blu-ray drive now, your only option is the highest-end $2,599 version.
At those higher price tiers, the XPS One 27 enters another pricing level relative to competing 27-inch all-in-ones. Vizio's CA27T-A4 starts at $1,219. The Lenovo IdeaCentre A720 starts at $1,470. Even Acer's high-flying Aspire 7600U tops out at $1,899. But none of those systems offers a 2,560x1,440-pixel resolution display, much less with touch input.
Considering that the touch-screen XPS One 27 starts at $1,599, Dell has the best of both worlds with this PC. It offers high-end options for those who want to pay for them, and it also outclasses its competition by offering the same high-resolution screen with its more modestly priced starting models.

Dell XPS One 27 Acer Aspire 7600U Apple iMac 27-inch
Price (at time of review) $2,299 $1,899 $1,999
Display size/resolution 27-inch, 2,560x1,440 27-inch, 1,920x1,080 27-inch, 2,560x1,440
CPU 3.1GHz Intel Core i7 3770S 2.5GHz Intel Core i5 3210M 3.1GHz Intel Core i5 2400
Memory 8GB 1,600MHz DDR3 SDRAM 8GB 1,333MHz DDR3 SDRAM 4GB 1,333MHz DDR3 SDRAM
Graphics 2GB Nvidia GeForce GT 640M 768MB Nvidia Geforce GT 640M 1GB AMD Radeon HD 6970M
Hard drives 2TB, 7,200rpm 1TB, 5,400rpm 1TB, 7,200rpm
Optical drive Blu-ray/dual-layer DVD burner Blu-ray/dual-layer DVD burner dual-layer DVD burner
Networking Gigabit Ethernet, 802.11b/g/n wireless Gigabit Ethernet, 802.11b/g/n wireless Gigabit Ethernet, 802.11b/g/n wireless
Operating system Windows 8 Pro (64-bit) Windows 8 (64-bit) Apple OS X Snow Leopard 10.6.7
Among Windows 8 launch PCs, the Acer Aspire 7600U is the only other model to approach the $2,000 price point. Even if you throw out the Dell's higher-resolution screen, the XPS One 27 is still a strong competitor to the Acer system. Dell includes more memory for the GeForce graphics card, and also offers a faster, higher-end Core i7 chip, and twice the hard drive space.
Acer poured a lot of effort into the design of its new all-in-one, and it probably looks a little slicker than the Dell. It also has a unique support foot that makes it easier to adjust the display than the Dell's double-jointed stand support. Where Acer is mostly attempting to make a "lifestyle" appeal for its new all-in-one, Dell sticks to its price-performance roots. The payoff is clear in terms of features and performance, and for any serious PC buyer, the XPS One 27 is the clear choice.
Comparing the XPS One 27 with Apple's high-end iMac is harder, given the potential for a new iMac announcement later today. If you discount operating system preference and compare against the existing iMac, the Dell offers more onboard storage, a touch screen, and the convenience of its HDMI input and output jacks.
The iMac's primary non-software advantage might be its Thunderbolt ports, which open up the door to fast external storage arrays and other peripherals that leverage Thunderbolt's faster data transfer speeds. Professional users in particular might appreciate that option. Otherwise, and again, operating systems aside, the Dell looks like a more fully featured offering than the existing iMac. An update from Apple can always turn this comparison on its head, and I will revisit this review in the event that Apple announces a new iMac.

18 August 2012

RAM DIAGNOSTIC TOOL

Hello everyone.
whatsup!
Is your pc slow down and you tried lots of scan,removing files from your computer but still computer works slow?
Is your computer display is not looking good as it was in past?
So sometimes the problem occurs due to RAM fault also.
So here's a solution to know is your RAM working properly or there is any fault.
Download Memtest86+.
To download click here.

Extract it on any folder and get a CD or USB drive and burn on it.
Insert the CD or USB into your computer and restart it and from BIOS set First boot from CD/DVD rom or USB Drive.
Press F10 and let it load.
After sometime a blue screen appears which indicates that memory diagnostic process is running.
Wait for sometime.
If there is any fault in you RAM or RAM SLOT.
A list appears below in which,if there is RED highlighted details that means your RAM or RAM SLOT is not working properly.

So you need to either show it to your dealer or else try to fix the problem yourself.But be careful,just pull the RAM out and again insert it or try cleaning the RAM SLOT.
If this won't work get it to the dealer.

12 August 2012

11 August 2012

BIT DEFENDER 2013 FREE WITH 1 YEAR SUBSCRIPTION

Hello
Now get Bitdefender award antivirus plus 2-13 free with 1 year subscription.
To download click on the 3 link provided below.
After downloading Open the Bit defender antivirus 2013 part 1 and install it in desire folder.
And protect your computer from virus.
Thank you :)

Bit defender antivirus 2013 for 32-bit:-
Part 1
Part 2
Part 3

Bit defender antivirus 2013 for 64-bit:-
Part 1
Part 2
Part 3

31 July 2012

CRACK PASSWORD PROTECTED FILE OF ANY TYPE

SOLUTION:-
Hey everyone.
Do you know you can crack any file's password of any extension.
How to crack password? Here is a simple solution:-
You need a software called as Passware password kit enterprise.
To download click here.
Click on the about link because it is not free software but if you download the software from link provided above you will get it free as it is cracked.
Install it.
Follow the onscreen instruction.It is very easy to use and fast to retrieve password.
Now Don't need to worry at all if you've downloaded any password protected file mistakenly.

thank you :)

ANOTHER WAY TO EARN MOENY BY UPLOADING FILES FOR INDIA ALSO

SOLUTION:-
Hello everyone.Everyone at certain age worry about money and think how they can make money through internet.
So here are some websites that help you to generate more money:
  • HotFile:-Hotfile pays very low and it is totally pay per performance sort of thing.You will start with copper account in which you will get lowest payments.With increasing downloads they will increase your payment per 1000 download.
Main Features:-

1. As a free uploader you can earn upto $12 per 1000 downloads.
2. Your payment rate is based upon performance.
3. They accept download from following countries:-United States, Canada, Norway, Finland, Sweden, United Kingdom, Germany, Latvia, Estonia, France, Spain, Portugal, Italy, Austria, Switzerland, Hungary, Czech Republic, Netherlands, Belgium, Greece, Denmark, Ireland, Poland, Slovakia, Slovenia, Lithuania, Bulgaria, Romania, Australia, Russia, Liechtenstein, Kuwait, Qatar, United Arab Emirates, Saudi Arabia and Bahrain.
4. Earn 20% of your referral income.
5. Minimum payout $15.
6. Payment via Paypal,webMoney,Epasspote every Monday.
7. Automatic payouts no intervention required.
8. Upload speed average.

  • Depositfiles.com:-This earn from file sharing program pays on the basis of size of downloaded file and the location.They mainly pay for the US and Russian traffic which is a mandatory condition.Although they have mentioned that they also pay for EU traffic but the rate are not clearly understandable by me ,you better check out the rates.
Main Features:-

1. You will be paid for only US,EU and Russian traffic.
2. Payment is truly based on the size of download,more size = more money.
3. Earn 20% of your referrals.
4. Minimum Payout $10 for active users.
5. If you are an Indian then they pay $2 for every 1000 download its good.I only got when I registered into their site.
6. Participate in bonus program and earn bigger amounts.
7. Payment Via Paypal automatically once you reached $10.
8. Upload speed Average.


  • FileFactory.com:-FileFactory is a bit different than Uploading.com and Ziddu.com and for sure not better than both.FileFactory pays on the basis of countries from which download comes.The countries are divided in tiers according to which payment is made.
Main Features:-

1. Earn upto $10 per 1000 US download.This is the standard rate for US download by most of Sites.
2. Free premium membership Rewards.
3. Get 10% of your referrals.
4. Various rewards you can win up to X BOX 360.
5. Toughest condition that downloads smaller than 20 Mb do not qualify for payment.a bit harsh they are.
6. To receive cash you have to be a premium member.
7. Only PayPal payments.
8. View their tier distribution
9. Upload speed not very fast.

  • Uploading.com:-Uploading.com pays serious cash if you have a good quality US,EU and RU traffic.It is operating from few years and they have paid many uploaders.The main features are:-
Main Features:-
1. $10 per 1000 downloads of US and EU countries.
2. $5 per RU downloads.
3. no price for other countries.
4. Earn 10% of your referrals.
5. Daily payment processing.
6. Payment through Paypal,Epese, Epassporte, Wire Transfer,WebMoney
7. Great uploading speed.

  • Ziddu.com:- Very nice because no size and country limitation.Since most traffic is India this is best for Indians .Suggested to all those who have traffic but not of US and UK.Main features of Ziddu.com earning programme are listed below:-
Main Features:-
1. Its free to join,anybody can join Ziddu.com.
2. For each Unique Download You will get .001$.It is much more if your main traffic is outside US.
3.You will get $0.10 Referral Bonus, when someone joins with Ziddu through your referral link.
4. Payment Via Paypal or MoneyBookers on net 40 basis.
5. Very fast uploading speed.
6. Upto 10 files can be uploaded at once.

Thank you :)

29 July 2012

GET QUICK HEAL TOTAL SECURITY FREE

SOLUTION:-
First download the quick heal total security.to download click here.
Next download quick heal crack by clicking here.

  • After download completes.Run the quick heal setup and let the program download the file and install it.
  • After that restart you computer in safe mood by pressing F8 rapidly.
  • Copy all files included in crack folder and past it in quick heal directory.When ask to replace file,say yes and let it replace the files.
  • Open the quick heal total security and go to File and folder section.
  • Select exclude files and folder.
  • Click on Add button.
  • Next add the quick heal folder and subfolder to the exclusion list.
  • Click on save button and restart your computer in normal mood.
That's it.all done.
Enjoy the total security for 1 years.

thank you :)

27 July 2012

KNOW YOUR FRIEND"S PASSWORD

SOLUTION:-
Now anyone can see password if it is hidden by Asterisk ****

To do so follow the instruction below.
  • 1) Open the Login Page of any website.
  • 2) Type your 'Username' and 'Password'.
  • 3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.
javascript: alert(document.getElementById('Passwd').value);
  • As soon as you press 'Enter', A window pops up showing Password type.
NOTE:- this trick may not work with firefox.

thank you :)

KICK SOMEONE FROM WIRELESS NETWORK

SOLUTION:-
  • Open cmd.
  • Write shutdown -i.
  • Choose a Victim from the list.
  • Choose to shutdown their computer.
  • Make the warning pop up 1 sec before shutting down.
  • Click Ok.
All done.
thank you :)

KICK EVERYONE FROM COUNTER STRIKE SERVER

SOLUTION:-
To all counter strike fans here's a short solution to kick everyone out of counter strike server.
  • Place Buffer1.cfg and Buffer2.cfg in your cfg folder. If it doesn't exist, make it
Commonly C:\User\program files\steam\steamapps\Account name\counter-strike
source\cstrike\cfg)
  • Go in game, open the developer's console, and type in the following you may change
bind key:
Bind M "wait;exec Buffer1;exec Buffer2"
  • If developer's console doesn't open, go to options, keyboard, advanced, enable developer's console.
  • Go in game and rapidly hit the M key to crash the server. Depending on how fast you hit it, it should take anywhere from 15-30 seconds to crash.
  • Don't stop hitting the key until you get a message:"Client # has overflowed reliable channel."
Thats it.enjoy.
thank you :)

22 July 2012

COMPUTER PARTS AND WORKING

ANSWER:-

What are computer parts?
Here's the answer.
Computer content of many parts.That is input and output parts.
The input parts are Keyboard,mouse,scanner,DVD writter.
The output parts are Monitor,speaker,printer etc.

But there are some parts that work both as input as well as output source that is Hard drive,flash drive,DVDs/CDs.

Hard drive can take Data (input) so as to store and also it provides data (output)so as to proceed.
Pen-drive does the same work as hard drive do it provides data (output) to the computer to proceed and also stores the data (input).

There is also processing units known as Computer CPU.
The CPU works in two ways,it take the input sent by the input device and gives the output to the output device.
In between CPU,Output device,and input device there is and temporary media known as RAM which stands for or is a short form of Random access memory.
It stores data temporarily.
The motherboard is the part which Connects All part to make a computer run.on motherboard there are CPU,hard drive,RAM,DVD writer,PSU or SMPS,Graphic card,Tv tunner card,Audio card,also Keyboard,mouse,speaker,Headphones are attached to it.

The computer parts are:- 
Keyboard,mouse,Hard drive,optical drive known as DVDs/CDs,flash drive,Cabinet in which all parts are assembled,CPU also called as brain of computer,printer,scanner,DVD writer,RAM (Random access memory),Also a modem or router,TV tunner card,Graphic card,Audio card,PSU or SMPS(It is a power supply unit),Motherboard.

Also there are Software uses for some special task.
So the question is how this works?
So here's another answer.

First the User uses input device to give command to the computer.
The word from the keyboard is first get stored into the RAM, then it proceed to the CPU were this temporary data from RAM gets stored in Cached memory, then this data from cache goes to CPU where the CPU categorizes the type of data. The CPU works in 2 ways that is ALU which is a shot form of Arithmetic logic unit.
The arithmetic is used for mathematical problems, numbers.
And the logic unit is used for language, grammatical, letters, etc purpose
After the CPU categorizes this input, the CPU solves/understand  the problem and give back to RAM from there the processed data get into output device.
The CPU or computer does not understands the simple languages like alphabets or like numbers, the computer first use to convert it into binary coding that contains only 1 or 0 as a processing codes.
If user wants to take his/her data on a DVD/CD disk then he needs to use a DVD writer. Which write on a CD/DVD using leaser.
Although it is not simple to study about computer as there are infinite problems occurring day by day but its better to understand the basics.
Please remember to protect your computer from viruses.

thank you :)

SHORT REVIEW ABPUT SONY BRAVIA KDL46HX850

ANSWER:-

Highlights:-
The clearest video quality.
Slim design, stunning picture.
Beyond cable entertainment
3D ready with best video quality.
Can be used as monitor for pc.
Better gaming experience.
Tough, beautiful look.

My experience:-
I'm using this Product from last year. as I’m professional gamer, this product provides me better, best gaming experience without any problem.
Looks too slim, beautiful, powerful, high definition sound, high video quality, can be hanged on wall to watch calmly.
Entering the world of Sony bravia LED Screen, fully H1080p LED internet TV. The slim glass let you enjoy an durable, lightweight TV give the best experience in the world of television. With better brightness, contrast.
works best when surf internet, good for children’s. sleep mood enabled to save power. lesser power consumption of about 119 watts. Bigger screen to watch television like watching in movie theater. Diagonal dimension is about 117 CMs. with HDMI. weight 44.8lbs,height 27.4 inches, depth 10.6 inches, width 42.4 inches. Dell part is included in this LED TV for better performance. resolution is about 1920*1080 fully HD.

The Bravia KDL46HX850 comes with additional features like Clock, autopower off,3.2 compensation. Picture frame mode, photo MAP, startup Sony logo displayed, wi-fi enabled, 4x high speed 3D panel.etc.
With 2 USB ports.
supported picture- JPG
supported audio formats- MP3,WMA,LPCM
supported video formats- MPEG-1,MPEG-2,MPEG-4,WMV,AVCHD,TS,PS.
Comes with One year warranty.

thank you :)

SHORT INTRODUCTION ABOUT DotNetNuke

ANSWER:-
Introduction:-


DotNetNuke is an open web CPM (content management system).
It is based on and work using Microsoft .NET framework principal. It give shares of both community edition that is MIT license and CP (commercial proprietary) license .
The DotNetNuke CPM (content management system)it allow the management of website without specific  technical language. And extensible through large numbers of 3rd party applications to provide functionality.
The it is an open source project and this open source of DotNetNuke is known as community edition and also available for free download.
The DotNetNuke consist of two commercial editions of programs, this two programs increases the functionality of DotNetNuke.

Working or Architecture of DotNetNuke:-
The DotNetNuke has three tier architecture. Which includes core framework. This core framework provides extensible module structure. The DotNetNuke can be increases or extended using third party module which result in increase in functionality.
To change the visual of any site it can be change using skins.
The DotNetNuke provide great functionality like security, content management etc. core DotNetNuke also includes primary modules. All this modules, program provides great functionality for intranet, e-commerce system, and website or web application. Volunteer team community is responsible for maintaining the DotNetNuke.

Skin architecture of DotNetNuke:-
Skin provides separation between content and design, and enable the web designer to make/develop skin without any problem. It kept the skinning engine, which is stored using argument to assemble main pages or master page, also a web maker or a web programmer need to access the Microsoft visual studio.
Master pages are nothing but a simple text file, this can be made by any text editor. Skins include some HTML file and placeholders. Like pictures, skins can be developed, upload, and installed through administration page. The skin also need to content ASP.NET,if ASP.NET is not included, then the DotNetNuke will build one for it.

Thank you :)

15 July 2012

HACK USING IP ADDRESS

SOLUTION:-
Introduction:-
1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document
will teach you some simple things about NETBIOS, what it does, how to use it, how to
hack with it, and some other simple DOS commands that will be useful to you in the
future.
1. Hardware and Firmware:-
  • The BIOS:-
The BIOS, short for Basic Input/Output Services, is the control program of the PC.
It is responsible for starting up your computer, transferring control of the system to
your operating system, and for handling other low-level functions, such as disk access.
NOTE that the BIOS is not a software program, insofar as it is not purged from
memory when you turn off the computer. It's
firmware, which is basically software on a chip.
A convenient little feature that most BIOS manufacturers include is a startup
password. This prevents access to the system until you enter the correct password.
If you can get access to the system after the password has been entered, then there
are numerous software-based BIOS password extractors available from your local
H/P/A/V site.
  • NETBIOS/NBTSTAT:-
NETBIOS, also known as NBTSTAT is a program run on the Windows system and is
used for identifying a remote network or computer for file sharing enabled. We can
expoit systems using this method. It may be old but on home pc's sometimes it still
works great. You can use it on your friend at home or something. I don't care what
you do, but remember, that you are reading this document because you want to learn.
So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there
are two ways, but one's faster.
Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT
Method 2:Start>Run>Type Command>Type NBTSTAT
(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)
Ok! Now since you're in the DOS command under NBTSTAT, you're probably
wondering what all that crap is that's on your screen. These are the commands you
may use.
Your screen should look like the following:
NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer
NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts
Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
interval Redisplays selected statistics, pausing interval seconds between each display.
Press Ctrl+C to stop redisplaying
statistics.
C:\WINDOWS\DESKTOP>
The only two commands that are going to be used and here they are:
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
  • Host Names:- 
Now, the -a means that you will type in the HOST NAME of the person's computer
that you are trying to access. Just in case you don't have any idea what a Host Name
looks like here's an example.
123-fgh-ppp.internet.com
there are many variations of these adresses. For each different address you see
there is a new ISP assigned to that computer. look at the difference.
abc-123.internet.com
ghj-789.newnet.com
these are differnet host names as you can see, and, by identifying the last couple
words you will be able to tell that these are two computers on two different ISPs.
Now, here are two host names on the same ISP but a different located server.
123-fgh-ppp.internet.com
567-cde-ppp.internet.com
  • IP Addresses:-
You can resolce these host names if you want to the IP address (Internet Protocol)
IP addresses range in different numbers. An IP looks like this:
201.123.101.123
Most times you can tell if a computer is running on a cable connection because of the
IP address's numbers. On faster connections, usually the first two numbers are low.
here's a cable connection IP.
24.18.18.10
on dialup connections IP's are higher, like this:
208.148.255.255
notice the 208 is higher than the 24 which is the cable connection.
REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS.
Some companies make IP addresses like this to fool the hacker into believing it's a
dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This
gives you an idea on IP addresses which you will be using on the nbtstat command.
  • Getting The IP Through DC (Direct Connection):-
You're going to need to find his IP or host name. Either will work. If you are
on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname
without parenthesis. you will either get a host name or an IP. copy it down. If you do
not get it or you are not using mIRC then you must direct connect to their computer
or you may use a sniffer to figure out his IP or host name. It's actually better to do
it without the sniffer because most sniffers do not work now-a-days. So you want to
establish a direct connection to their computer. OK, what is a direct connection?
When you are:
Sending a file to their computer you are directly connected.
AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.
ICQ when sending a file or a chat request acception allows a direct connection.
Any time you are sending a file. You are directly connected. (Assuming you know the
user is not using a proxy server.)
Voice Chatting on Yahoo establishes a direct connection.
If you have none of these programs, either i suggest you get one, get a sniffer, or
read this next statement.
If you have any way of sending thema link to your site that enables site traffic
statistics, and you can log in, send a link to your site, then check the stats and get
the IP of the last visitor. It's a simple and easy method i use. It even fool some
smarter hackers, because it catches them off guard. Anyway, once you are directly
connected use either of the two methods i showed you earlier and get into DOS. Type
NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It
will show you all computers connected to yours. (This is also helpful if you think you
are being hacked by a trojan horse and is on a port that you know such as Sub Seven:
27374.)
Your screen should look like this showing the connections to your computer:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
The first line indicated the Protocol (language) that is being used by the two
computers.
TCP (Transfer Control Protocol) is being used in this and is most widely used.
Local address shows your IP address, or the IP address of the system you on.
Foreign address shows the address of the computer connected to yours.
State tells you what kind of connection is being made ESTABLISHED - means it will
stay connected to you as long as you are on the program or as long as the computer is
allowing or is needing the other computers connection to it. CLOSE_WAIT means the
connection closes at times and waits until it is needed or you resume connection to be
made again. One that isn't on the list is TIME_WAIT which means it is timed. Most
Ads that run on AOL are using TIME_WAIT states.
the way you know the person is directly connected to your computer is because of
this:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
Notice the host name is included in the fourth line instead of the IP address on all.
This is almost ALWAYS, the other computer that is connected to you. So here, now,
you have the host name:
abc-123-ppp.webnet.com
If the host name is not listed and the IP is then it NO PROBLEM because either one
works exactly the same. I am using abc-123-ppp.webnet.com host name as an example.
Ok so now you have the IP and/or host name of the remote system you want to
connect to. Time to hack!
Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's
the crap again. Well, now time to try out what you have leanred from this document
by testing it on the IP and/or host name of the remote system. Here's the only thing
you'll need to know.
IMPORTANT, READ NOW!!!
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Remember this?
Time to use it.
-a will be the host name
-A will be the IP
How do i know this?
Read the Statements following the -a -A commands. It tells you there what each
command takes.
So have you found which one you have to use?
GOOD!
Time to start.
  • Using it to your advantage:-
Type this if you have the host name only.
NBTSTAT -a (In here put in hostname without parenthesis)
Type this is you have the IP address only.
NBTSTAT -A (In here put in IP address without parenthesis)
Now, hit enter and wait. Now Either one of two things came up
1. Host not found
2. Something that looks like this:
--------------------------------------------
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
GMVPS01 <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
GMVPS01 <03> UNIQUE Registered
GMVPS01 <20> UNIQUE Registered
WORKGROUP <1E> GROUP Registered
---------------------------------------------
If the computer responded "Host not found" Then either one of two things are the
case:
1. You screwed up the host name.
2. The host is not hackable.
If number one is the case you're in great luck. If two, This system isn't hackable
using the NBTSTAT command. So try another system.
If you got the table as above to come up, look at it carefully as i describe to you each
part and its purpose.
Name - states the share name of that certain part of the computer
<00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on
that share name.
Type - Is self-explanatory. It's either turned on, or activated by you, or always on.
Status - Simply states that the share name is working and is activated.
Look above and look for the following line:
GMVPS01 <20> UNIQUE Registered
See it?
GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that
file sharing is enabled on the share name that is on that line with the hex number. So
that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's
How to do it. (This is the hard part)
  • LMHOST File:-
There is a file in all Windows systems called LMHOST.sam. We need to simply add
the IP into the LMHOST file because LMHOST basically acts as a network,
automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in
LMHOST and hit enter. when it comes up open it using a text program such as
wordpad, but make sure you do not leave the checkmark to "always open files with
this extension" on that. Simply go through the LMHOST file until you see the part:
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:
# #INCLUDE
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans
erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
Read this over and over until you understand the way you want your connection to be
set. Here's an example of how to add an IP the way I would do it:
#PRE #DOM:255.102.255.102 #INCLUDE
Pre will preload the connection as soon as you log on to the net. DOM is the domain or
IP address of the host you are connecting to. INCLUDE will automaticall set you to
that file path. In this case as soon as I log on to the net I will get access to
255.102.255.102 on the C:/ drive. The only problem with this is that by doin the
NETSTAT command while you are connected, and get the IP of your machine. That's
why it only works on simple PC machines. Because people in these days are computer
illiterate and have no idea of what these commands can do. They have no idea what
NETSTAT is, so you can use that to your advantage. Most PC systems are kind of
hard to hack using this method now because they are more secure and can tell when
another system is trying to gain access. Also, besure that you (somehow) know
whether they are running a firewall or not because it will block the connection to
their computer. Most home systems aren't running a firewall, and to make it better,
they don't know how operate the firewall, therefore, leaving the hole in the system.
To help you out some, it would be a great idea to pick up on some programming
languages to show you how the computer reads information and learn some things on
TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out
whether they are running a firewall, simply hop on a Proxy and do a port scan on their
IP. You will notice if they are running a firewall because most ports are closed. Either
way, you still have a better chance of hacking a home system than hacking Microsoft.
  • Gaining Access:-
Once you have added this to you LMHOST file. You are basically done. All you need
to do is go to:
Start
Find
Computer
Once you get there you simply type the IP address or the host name of the system.
When it comes up, simply double click it, and boom! There's a GUI for you so you
don't have to use DOS anymore. You can use DOS to do it, but it's more simple and
fun this way, so that's the only way i put it. When you open the system you can edit,
delete, rename, do anything to any file you wish. I would also delete the command file
in C:/ because they may use it if they think someone is in their computer. Or simply
delete the shortcut to it. Then here's when the programming comes in handy. Instead
of using the NBTSTAT method all the time, you can then program you own trojan on
your OWN port number and upload it to the system. Then you will have easier access
and you will also have a better GUI, with more features. DO NOT allow more than one
connection to the system unless they are on a faster connection. If you are
downloading something from their computer and they don't know it and their
connection is being slow, they may check their NETSTAT to see what is connected,
which will show your IP and make them suspicious. Thats it. All there is to it. Now go
out and scan a network or something and find a computer with port 21 or something
open.


NOTE:- Its not easy to understand it.be careful.

thank you :)