Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

.SPEED UP BOOT BY DISABLING UNUSED PORTS

8:52 AM

.SPEED UP BOOT BY DISABLING UNUSED PORTS

Many computers take a lot of time to boot (or start ).This is due to many reasons.

Some slight changes can do wonders for your system:

1. Press start->run then type msconfig and press enter.

Go to the startup tab. Here you will see a list of startup items. These are all the programs that automatically start when you boot your PC. It is these that slow down the boot up process.

                                 So uncheck all the unwanted items like ms-office, messengers other utilities that u may not need at startup). Don't uncheck your antivirus software.


Turn off Computer

8:48 AM

Turn off Computer

Start=>Run

Type Code:        at 11:35 shutdown -s

To cancel or Abort the shutdown:

Type Code:                   shutdown -a

Type  Code:  “shutdown –s –m\\computername –t60”. 

This command will shutdown the computer on network  if you have administrative access.  Here computer name  needs to be replaced by the exact computer name of the computer on the network to work.

Employee Monitoring Software - OsMonitor

12:37 PM

Employee Monitoring Software - OsMonitor

Employee Monitoring Software - OsMonitor

OsMonitor Employee Monitoring Software Records internet & computer activity, monitors and restricts computer usage to increase efficiency and ensure the security. It will help you to find out what employees are doing like visiting some websites, chat with friends, send email and the applications used when they are assumed to work. OsMonitor monitoring software is good at helping you control over your employees during the office hours. Easily track their activity, so they will use network for work only.

With today's businesses constantly attempting to increase employee efficiency, employers are becoming more concerned with improving their employees' hourly productivity and are using the most current technology to achieve these goals Employee Monitoring Software is a common software used by many business companies for the goal to monitor their employees' use or misuse of the Internet during working hours. This allows employers to find out the truth about what their employees are doing during the office hours. Employers often benefit from records in case they discover that company confidential information is being leaked or other inappropriate conduct is occurring on company's computers.


Difference Between x86 and x64

12:32 PM

Difference Between x86 and x64

Difference Between x86 and x64

• Categorized under Technology

Computer technologies are constantly evolving, and if we base our predictions to Moore’s law, it would keep going for decades to come. The fast paced development of computer hardware is largely due to the voracious appetite of the consumers for better and faster components. Whenever developers hit a roadblock that limits the further advancement of the current standard, we see a sudden shift to a new standard. This is what is happening between x86 and x64.


Configuring mksysb image on system backup tapes

12:31 PM

Configuring mksysb image on system backup tapes

Configuring mksysb image on system backup tapes

Use the mksysb command to ensure that the boot image, BOS Installation/Maintenance image, and the table of contents image are created with a tape block_size value of 512.

Bootable mksysb tapes comprise the following images:

·         Boot image

·         BOS Installation/Maintenance image

·         Table of contents image

·         System backup image

The system backup image is the actual backup of the files in the rootvg in all JFS-mounted file systems.

The boot image, BOS Installation/Maintenance image, and the table of contents image must be created with a tape block_size value of 512. The mksysb command ensures that the block size is 512 when these images are created. There are no restrictions on the block size used for the fourth (system backup image) on the tape. The block size of the system, before it was temporarily set to 512, is used for the fourth image on the tape.


Connection of internet through mobile

12:28 PM

Connection of internet through mobile

Connection of internet through mobile

Wireless routers with built-in switches are everywhere. Although there are differences between the routers, they have largely the same features. This guide provides a summary of the common aspects of the routers currently on the market. Reading your router manual is still necessary to know exactly what features your router has and where they are located, but reading this will give you an idea of what to expect before diving into the manual.

What is a router?

A router is any device that acts as a gateway between 2 or more separate networks. In our case, that means that the local network is connected to the Internet, and vice versa. The router ignores traffic local traffic or traffic it is not configured to handle, but when Internet access is attempted from within the local network, it springs into action. With NAT (Network Address Translation), the router shares the Internet connection to all the computers connected to the local network. The router keeps track of the originating local computer and manages the connection with the outside Internet server. If a computer on the Internet attempts a connection with the router or to a local computer past the router, the router denies the connection unless the router was specially configured to allow that connection.


startMiner - free and simple next generation Bitcoin mining software
BitMiner - free and simple next generation Bitcoin mining software