Software & Website Development Group

Saturday, 20 December 2014

Use of Google Drive

For Online Storage of your data

Simply use Google account with drive

you can store up to 15 Gb data and can get access from anywhere in the world

Its a very good cloud based drive.

Your Important Data you can store there.

You can use this in your cell phone also.

Saturday, 11 October 2014

Lock Your Computer on Mouse Click

Lock Your Computer on Mouse Click 

(Just Press Windows +L)


Just Follow the simple step >>

1. Right click

an empty spot on the desktop, point to New and click Shortcut.

2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box:

rundll32 user32.dll,LockWorkStation

3. Click Next

4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish

5. This will Create a shortcut in your Desktop.

6.Now each time when you want to lock the computer , Just click on this shortcut.

Sunday, 14 September 2014

Increase speed of system startup

Increase System Startup Speed and system speed.

    - Press Ctrl+R
    - write msconfig in run (Press Ctrl+R)
    - then you will see system configuration Pop-up

Increase System Startup

    - Open system startup menu.
    - you will see system start-up Items there.
    - Now Uncheck which is not required.
    - Then Click on Apply and Ok.
    - Then restart PC.

Increase System Speed 

  - Open Services .
    - you will see All services like Microsoft services and system start-up Items there.
    - Here don't  have to Uncheck Microsoft Services.
    - So.Hide all Microsoft Services then you will see other services.
    - UncheThen Which services are not required.
    - Then Click on Apply and Ok
    - Then restart PC.

You will feel good working system.

Thursday, 4 September 2014

How to protect your PC's from hackers

How to protect your PC's from hackers 

In today's era , where digital security is a puppet in the hands of hackers, protecting data has become a major cause of concern for IT specialists. It is, therefore, instinctive on their part to figure out how to protect private and confidential information in their systems, without burdening with antivirus software and firewalls.  Here are a few of these ways:

 Windows Updates: Even the best offerings from computer giants have not been able to completely fight off the attempts of rouge developers to break in. In this situation, it has become almost a necessity for users to update their Windows-based system, on a regular basis. An update daily, weekly or even monthly is going to speed up the system and help it counter attacks on its security thereby decreasing the probability of  it, being infected by worms and viruses. Desktop monitoring by hackers is indeed a grand problem.

Software updates: Like the Windows, applications also have to be updated with the latest version. You need to check regularly for wear and tear in the software that your system runs. Web browsers and web-based programs have to be upgraded constantly so hackers do not get their hands on the private and confidential data, stored in your system.

 Antivirus Software: If your system is being connected to the internet regularly and you run without antivirus software on it, it is almost impossible for hackers not to get attracted to it. In case you do not have antivirus software, get your hands on one as soon as possible. If you already have one, upgrade it to its latest version and check if the settings are properly defined.

 Data Backup: Create a backup for all the important data that you have on your system. Apart from hackers and system crashers, other mishaps may spell out death for your hard drives. A tech storm can easily sweep away every bit of data in your system. It’s always better to be safe from unwanted features.

 Hacker-Controlled websites: Usually sites that offer free downloads, porn, online games etc. are operated by hackers. It is almost given that you avoid dangerous places especially if you have valuables on your PC. The same goes for the mechanical world. Steer clear of sites that look suspicious or require you to download something which is not needed.

Tuesday, 26 August 2014

4 Reasons To Stop Saving Files On Your Desktop

09:37 Posted by Anthesis No comments

 Reasons to stop saving files on your desktop

-  desktop's file will be saved in a c drive.
- c drive always contain operating system.
- there may be system failure then you may loss your files or data available on desktop
- Desktop's file will be easily available to everyone so  you can not say that your files or data are secure
- If you have more files on desktop then that will be in the same drive where operating system exists .
So there may reduce the speed of machine. bcoz of background process.

Do not keep files on desktop, if not required.

Sunday, 24 August 2014

use of "Ping" command

08:33 Posted by Anthesis No comments

Use of "Ping" command

To get IP address of any website, you can access directly by using ip address also

- open command Prompt 
   (To open command prompt press Ctrl+R then type cmd)
write ping   then press enter
you will get an IP address of that website

you will also able to know that are you getting any response from that particular website or not.

Wednesday, 13 August 2014

Use of Function keys

22:25 Posted by Anthesis No comments
Function keys..
1. F1 key:
F1 key is used when you need any help related any function. For example if you are browsing internet and need any help related browser or connection you can use F1 key to get help. If you want to try it than press F1 now and see.
F1 key sometime can be used to enter in BIOS  (press F1 when your computer is about to boot).
Combination of Win + F1 keys will open the “Help and Support» Microsoft Windows.
 F2 key:
If you want to change folder name easily just press F2 key.
·         Alt + Ctrl + F2 – Opens the Document as a Microsoft Word.
·         Ctrl + F2 – Opens the Preview window in Microsoft Word.
·         It is also sometime used to enter BIOS.

F3 key:
·         In the MS-DOS charge line or in Windows, press F3 to rehash the last summon.
·         Win + F3 – Advanced Search window opens in Microsoft Outlook.
·         Shift + F3 – Changes the content in Microsoft Word, from upper to lower case or capital letters at the start of each one expression.
·         In the event that I am not mixed up it is the F3 key which will cause the Application«Control» computers Apple, running Mac OS X.

F4 key:
·         This opens the location bar, in the event that you press F4 in Windows Explorer and Internet Explorer.
·         Rehash the last activity (MS Word )
·         Ctrl + F4 – Closes the window open in the present window, for example, a tab in the program
·         Alt + F4 – Closes the system window in Windows.
F5 Key:
·         Refreshes the present page (works in all advanced programs), and additionally redesign the desktop or open organizers in Windows.
·         Running a slide demonstrate in Powerpoint.

F6 key:
·         Move the cursor in the location bar (additionally works in numerous advanced programs).
·         Ctrl + Shift + F6 – opens Document in Microsoft Word

F7 key:
Mostly used for spelling and grammar in a document programs Microsoft (Word, Outlook, etc.) 
F8 key:
Pressing F8 key while your PC is about to boot will result into booting your PC in Safe mode. 
F9 key:
The F9 key does not have any functionality in Windows. It may, however be used in some individual programs. To find out if it is available in the program you are using, bring up the program’s help screen and type in the words function key. 
F10 key:
·         Activates “Menu” in the open organizer window.
·         Shift + F10 – works same as the right mouse click.
·         Pressing F10 while your system is booting will show you BIOS Information.
·         F10 is used to enter the hidden recovery partition on computers Sony.        

F11 key:
F11 Key will take you to Full screen mode and it can be used and work in any Browser. 
F12 key:
·         Opens the “Save As” in Microsoft Word.
·         Shift + F12 – Saves a document in Microsoft Word.
·         Ctrl + Shift + F12 – Prints a document in Microsoft Word.
·         F12 key will open up Inspect element box in any Browser.
·         Fn + F1 or F2 or …. F12 keys will normally do the task that is Printed on the respective keys, This is basically for Laptop Users.

Wednesday, 6 August 2014

Strong password

 passwords are difficult to compromise.

Even if your password is long and complex (e.g. a combination of uppercase and lowercase letters, numbers and other non-alphanumeric characters), if it is stored or sent in plaintext, you’re toast if the hackers get hold of it.
Plaintext means it can be viewed exactly the way it has been entered, using easily accessible tools. For example, if your password is Super$ecretp@Ss, a free downloadable tool like Ettercap enables your password to be viewed exactly in that form: Super$ecretp@Ss.

If, however, your password is encrypted, it means that it has been scrambled; it cannot be viewed using the same tool (Ettercap). It might be displayed something like this: xt%y&1sm^*gt;>2.

Unfortunately, many software applications still store and send passwords in plaintext. That is why hackers still find the first three items in the next section so effective.

Make sure that your password is not guessable by hackers.
There are many ways to create a strong password.

Tuesday, 5 August 2014

Full form of terms. .

21:01 Posted by Anthesis No comments

Full form of computer terms:
* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile Telecommunication System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic InterchangeableFormat
* JPEG = Joint Photographic ExpertGroup
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePower Supply.
* HSDPA - High Speed Downlink Packet Access.
* EDGE - Enhanced Data Rate for GSM [Global System for Mobile Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research Project Agency Network.
* IBM - International Business Management.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network.

Monday, 28 July 2014

Remove unwanted malware

Remove unwanted malware like: recycler

1. Click on "Start" -->Run --> type cmd and click on OK.
2. Here I assume your External hard drive as G:
3. Enter this command.
4. attrib -h -r -s /s /d g:\*.*
5. You can copy the above command --> Right-click in the Command Prompt and
paste it.
Note : Replace the letter g with your External hard drive letter.
Now check for your files in External Drive.
delete that unwanted files then scan it with your antivirus.and your all malwares will get be deleted.

Wednesday, 23 July 2014

Importance of Backup.

02:45 Posted by Anthesis No comments

Importance of Backup.

Back is too much important now a day in any Information Electronic Devices.
like Computer, Laptop, Mobile, Tablet, and other related...

Because of any certain reason your data may be loss like because of virus or because of failure of devices ,
or any other..reason.

In Most of the devices there is a facility of Backups are available you can create a backup and get restored.

There are many recovery tools are available to recover our lost data.

In internet mail account and any other social account also there is a facility of backup so that u can be secure with your data.

Even in Microsoft operation system also they do provide a facility to create a backup of our data

we can create a bunch of data like .rar file.

we have a google drive facility to store our data on the internet and we can get it whenever and wherever we want to access it.

Wednesday, 9 July 2014

Recover Deleted data

00:22 Posted by Anthesis No comments

Recover deleted files

By Mistake did you Delete your files from your Pen Drive !
Don’t Get Tensed !
To Recover Ur Data Follow these steps…
First open notepad.
Now copy below code paste it in notepad
attrib -r -s -h /D /S
del *.scr
del *.lnk
del *.zAJ
Now save the notepad file in your Pen Drive with name as’recover.bat’file…
Now double click it.
Your deleted data will be recovered instantly.

Monday, 7 July 2014

Hide drives in windows....

09:25 Posted by Anthesis No comments

Hide drives in windows.

Simply Follow the steps:
1.Go to run .
2.Type “diskpart”.
3.Type “list volume”.
4.Now select the volume you want to hide by typing “select volume n”(n is the volume number against the drive you want to hide).
e.g.: select volume 2.
5.Type “remove letter x”(x is the drive name).e.g.: remove letter D.
Done, now check my computer .

If you want to show the drive again then repeat step 1 to 4 then type “assign letter x”.
Note :
**Don’t try with drive C **
** If you have locked something with Folder-lock or other software then after assigning the drive everything will be unlocked ;)**

Saturday, 5 July 2014

Facebook Safty Trick

01:34 Posted by Anthesis No comments

Alert... Trick.


Sometimes we go cyber cafe or any other place.. and open facebook... and we forgot to log out....but dont need to be worry about it,,,there is a option to log out your account from every computer.....follow the steps...

1. log in your account (from anywhere)

2. go to account setting

3. click on account security

4. and see there details...its shows

Last Accessed:


Device Type:

"see the image"

(if only these 3 things are shown there, then u r safe)


if there is an option to "end activity"that means your account is opened somewhere else also...

click "end activity" and u`ll be logged out from other computers..

Saturday, 28 June 2014

Internet Marketing ...

Internet Marketing World

Era has been changed to Internet Era, Everyting is available on internet now, It reduce a lots of times of human. There are many websites are availabe on the internet that can help to increase your marketing.
Like Socicial Networking, Search Engine, other advertising facilities that helps us to enhance our business.
Now a days there is no door to door marketing . there are many things over the internet that can help to develop Business Well. 

Friday, 27 June 2014

While using Internet ...

03:22 Posted by Anthesis No comments

While using internet  ...

.......... ..  There are many unnecessary software will be installed to your Machine,

Please check your Controll-panel howmany programs were installed and which are new one.

Remove unnecessary installed Software.

Sometimes it may install not-required plugins to your browser

That may require more memory, that may be virus affected 

Thursday, 12 June 2014

Alert .. . . .Hacking .....

01:06 Posted by Anthesis No comments

Now a days  , people use phishing method for Hacking

What is Phishing?

: They do provide link,  that link may be their own, and u will see the page same like facebook,  gmail-login Etc..and more also .

You have to check URL.. wheather is it proper. or not. .

Whenever u try to login through that page that userid and password will be send to them ,
This way they can hack your password ..

Please....check URL like for facebook. :
It shouldnot like  , or other . .. 

Wednesday, 4 June 2014

Increase your internet speed

03:49 Posted by Anthesis No comments

Increase internet speed

This is a Simplest Trick Ever.....

to speed up your internet speed.
Windows reserves 20% of your bandwidth for services like updates or spyware checks. If you would like to break this reserve,

Do the following simple steps:

1. Click [Windows] + [R] and type ' gpedit.msc ' in the Run window.

2. Under Computer Configuration expand the Administrative Templates.

3. Go to Network and click the "QoS Packet Scheduler" tab.

4. Double-click on "Limit Reservable Bandwidth" and enable it.

5. Finally change the Bandwidth limit to 0% and click Apply.

6. Reboot your computer and enjoy.

Monday, 2 June 2014

How to Change windows password without knowing the old password

How to Change windows password without knowing the old password

It is possible to change Adminstrator password both in Win XP and Vista without knowing it. If you somehow manage to login as an Administrator then you can change the password without knowing it.

Here’s the Step-By-Step instructions

1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.

2. Select the option ' Manage' .

3. On the left pane expand the “Computer Management (Local) tree (if it is not already expanded)

4. Double click 'Local Users and Groups' option From  'System Tools'  tree.

5. Click the “Users” option.

6. Now you will see the list of users on the right side pane, such as Administrator, Guest etc.

7. Right click the “Administrator” and select the option “Set Password” option.

8. Now you will see a warning message, Click on proceed.

9. Now the system asks you for “New Password” and “Confirm Password” .

10. After entering the password click on “OK”. The password is changed. That’s It!..


How to Check your Anti-virus..?

11:32 Posted by Anthesis No comments

Is Your Anti-Virus Working 

1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad..

2. Rename the file from New Text Document.TXT to

3. Now run the antivirus scan on this file.

If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus

Trick- Delete Non-Removable virus file

Delete NON-deletable virus file

1] Open Notepad.exe
2] Click File>Save As..>
3] locate the folder where ur undeletable
file is
4] Choose ‘All files’ from the file type box
5] click once on the file u wanna delete so
its name appears in the ‘filename’ box
6] put a ” at the start and end of the
(the filename should have the extension of
the undeletable file so it will overwrite it)
7] Cick save,
It should ask u to overwrite the existing
file, choose yes and u can delete it as

Trick - Restrict any website

How to  Restrict any  website:

1.Open Windows Explorer and type in C:/Windows/System32/drivers/etc

2.Double-click on hosts and open the document using Notepad

3.Find this line " localhost" or "::1 localhost." and just below this line Paste "

You can replace for which site you want to Restrict

4. Then save that file  and restart pc