Wednesday 28 November 2012

What is a File Extension?



What are file extensions
A file extension, or file name extension, is the letters immediately shown after the last period in a file name. For example, the file extension.txt has an extension of .txt. This extension allows the operating system to know what type of file it is and what program to run when you double-click on it. There are no particular rules regarding how an extension should be formatted other than it must begin with a period and have at least one character after it. For the most part, file extensions consist of three characters, which are typically letters or digits, that textually represent the type of file it is. Some examples of file extensions include .txt, .mp3, .jpg, and .gz, which represent text files, mp3 files, jpeg image files, and files compressed with the gzip program. As you can see, the actual extension name gives clues as to the type of file it is.
When trying to determine a file's extension it is important to remember that the extension is simply the last period in a file and the characters that follow it. If there is no period in a file, then it does not have an extension. To make it easier to see what a files extension are, please see the examples in the chart below:
Filename Extension Notes
report_card.txt .txt The extension is the period followed by the remaining characters.
Terminal.app .app The extension is the period followed by the remaining characters.
Postcard.pdf.exe .exe This one is a bit tricky, because there are two periods in this file. The important thing to remember is the extension is the last period and the characters that follow it.
As already said, an operating system knows what programs to use in order to view, print, or edit a particular file by looking at its file extension. It is able to do this because each operating system has in its configuration a default mapping between a particular file extension and a particular program. Using this information, when a user clicks on a file, the operating reads the file extension and then launches the mapped application. Typically, if the extension is unknown to the operating system or no application mapping exists, it will prompt the user to specify the program that it would like to open the file with.
By defaults, Windows and the Mac OS do not show file extensions. To view file extensions you would first need to enable them using the following guides:
It is also possible to change the program that your operating system uses to open a particular extension. This will be described in tutorials that can be found in the Further Reading section below.

How to change the program associated with a file extension
As already mentioned, file extensions are mapped to a particular program so that when you attempt to use the file, the operating system knows which application to launch. There may come a time that you wish to change a default association so that you can use a different program to automatically open the file. For example, when you open a image file on Windows it defaults to using the pre-installed Windows Photo Viewer. In the future if you find a new program that you would like to use instead, you can change the associations for image files so that they instead are opened by the new program.
For more information about how to change the default program a file extension opens with, please select one of the tutorials below based upon your particular operating system:

How malware writers use extensions to trick you into running a virus
A common trick that malware developers will use to trick you into running a computer infection is to send an email attachment that has a file name that contains two periods in it. An example of this type of file name is sales_report.xls.exe. As you can see the file has an .exe extension on it, which means it is an executable. Seeing that a file has this name and is an executable is enough of a hint that you should probably not run the program. On the other hand, what happens if there was a way to make it so that the .exe extension was stripped from the file name so that it appears as sales_reports.xls? That is a much more innocuous looking name, and if you receive this from someone you work with who may be infected, there is a good chance you will think it is legitimate and therefore double-click on it. Once you double-click on it, the file will then execute, because it is actually an executable, and infect your computer.
The malware developers know that this method works because by default Windows does not show you file extensions. Therefore, if you do not have file extensions enabled, windows will just show you everything before the last period in the file name and you may think that it is the full name. Therefore, it is a common tactic for network worms or spammers to send out attachments containing these "double" extensions as they know that Microsoft will strip off the last one and thus making it seem like a safe file.
Due to this, it is important to always show file extensions in Windows so that you cannot mistakenly fall for this trick. For information on how to enable file extensions, please see this tutorial:
How to show File Extensions in Windows

Common File Extensions
Below are a list of common file extensions that you may find on your computer or over the Internet.

Audio Extensions
Extension Description
   
.aif A Audio Interchange File is an audio file format that is most commonly used on Apple Macintosh computer systems.
.m3u M3U files are used to store multimedia play lists.
.mp3 An MP3 file is the most common file format used to store digital audio for use on computers and digital media devices.
.ra Audio files created by RealAudio.
.wav A WAV, or Waveform Audio File Format, is a audio file format used to store audio on PCs.
.wma Windows Media Audio, or WMA, files is a audio file format developed by Microsoft.

Video Extensions
Extension Description
   
.avi A Audio Video Interleave, or AVI, file is a video and audio file created by Microsoft.
.flv Flash video files.
.mov Apple QuickTime movie.
.mp4 A video file.
.mpg A MPEG video file.
wmv A Windows Media Video, or WMV, file is a video file type created by Microsoft.

Image Extensions
Extension Description
   
.bmp A Bitmap, or BMP, file is an image file used to store bitmap digital images. These files are typically found in Windows.
.cur The CUR file format is used to store non-animated cursors in Windows.
.ico The ICO file format is used to store computer icons in Microsoft Windows.
.gif A Graphics Interchange Format, or GIF, is an image file format created by Compuserve. This is a common format to find on a computer and the Internet.
.jpg A JPEG image file is a common file found on computers and the Internet.
.jpeg Another extension that corresponds to a JPEG image file.
.png A Portable Network Graphic, or PNG, is an image file that was created to replace GIF files. This is a common format to find on a computer and the Internet.
.psd A Photoshop Document, or PSD, file is used to store images created by Adobe Photoshop.
.raw The raw image format is commonly used by digital cameras to save a picture in a format that has not currently been processed.
.tif The Tagged Image File Format, or TIF, is an image file that is commonly used by graphic artists and photographers.

Workplace Applications and Text Files Extensions
Extension Description
   
.csv A Comma Separated Value, or CSV, file is a text file that contains lines of data that are separated by commas.
.doc A Word Document, or DOC, file is the extension that Word would save its documents.
.docx Starting in Word 2007, the .docx file format became the standard file that Microsoft Word would save files as.
.log A text file typically containing a textual log of what an application or computer process has done or transmitted.
.pdf A Portable Document Format, or PDF, file is a file format that was created by Adobe Systems. This file format is used to create documents that contain a specific fixed layout regardless of the operating system or application that opens them.
.pps A Microsoft PowerPoint slide show file.
.ppt A PowerPoint Document, or PPT, file is the extension that PowerPoint would save its documents.
.pptx Starting in PowerPoint 2007, the .pptx file format became the standard file that Microsoft PowerPoint would save files as.
.rtf A Rich Text Format, or RTF, file was created by Microsoft to allow the formatting of text, such as bold or underline, in a text document.
.txt A text file is a file that contains textual data without any formatting.
.wpd The standard file format for saving WordPerfect documents.
.wps A Microsoft Works document.
.xlr A Microsoft Works spreadsheet file.
.xls A Excel Document, or XLS, was the standard file format that Microsoft Excel would saved files as. This was changed to .xlsx starting with Excel 2007.
.xlsx Starting in Excel 2007, the .docx file format became the standard file that Microsoft Excel would save files as.

Compressed Files or Archive Extensions
Extension Description
   
.7z An archive format that was originally created by the 7-Zip archiver.
.bz2 A file that was compressed using bzip2. This file format is commonly used on Linux and Unix systems.
.cab A Cabinet, or CAB, file is a compressed archive format used by Microsoft.
.deb A Debian Software Package, or DEB, file is a file used to install applications in Debian.
.gz A file that was compressed using gzip. This file format is commonly used on Linux and Unix systems.
.pkg A Package, or PKG, file is a file used to install applications in Apple OS.
.rar A Roshal Archive, or RAR, file is an archive format used by WinRar.
.rpm A RPM Package Manager, or RPM, is a file that used to install applications in Linux operating systems.
.sit A Stuffit, or SIT, file is a compressed archive that was developed by Stuffit.
.sitx A Stuffit X-compressed, or SITX, file is a compressed archive from Stuffit.
.tar An archive file created by the Tar utility. This type of file format is commonly found on the Linux & Unix operating systems.
.tar.gz A Tar file that was compressed using the Gzip utility.
.zip A ZIP file is a compress archive file. This is the most common and popular compressed archive that you will find on a computer and in the Internet. Windows and Macintosh have built-in support for Zip files.
.Z A file that has been compressed with the Linux or Unix compress command.

Web & Internet Extensions
Extension Description
   
.css A Cascading Style Sheets, or CSS, file contains style sheet language that dictates how the HTML in a HTML file should be displayed.
.htm A Hypertext Markup Language, or HTML, files contain HTML markup language, which is used to display formatted content on web pages.
.html A Hypertext Markup Language, or HTML, files contain HTML markup language, which is used to display formatted content on web pages.
.js A Javascript, or JS, file contains scripts that should be executed by your web browser.
.part When you download a file, the downloaded information will be stored in a part file until it is completed. Once it is completed, the file will then be renamed into the files' actual name.

Disk Image Extensions
Extension Description
   
.dmg An Apple Disk Image, or DMG, file is a file that contains a archive of a hard disk or CD/DVD.
.iso An ISO image is an archive of an optical drive, such as a CD or DVD drive.

E-Mail Extensions
Extension Description
   
.eml Some applications like Microsoft Outlook Express, Windows Mail, and Mozilla Thunderbird save your e-mail as individual eml files on your hard drive. If you double-click them, your mail client will open the individual email that it represents.
.emlx Similar as the .eml files, but are for Apple Mail messages.
.mbx A MBX file that represents a particular folder in your mail client. The name of the file will typically be named after the actual folder it represents.
.pst A Microsoft Outlook data file that contains all of your contacts, e-mail, mailboxes, and calendar.
.vcf A vCard, or VCF, is a file that acts as an electronic business card. When you receive these via email, you can open them and have the details of the contact imported into your Mail Client.

Executable Extensions
Extension Description
   
.app An Application, or APP, is a Mac OS application. These applications are actually folders with the extension of .App.
.bat A batch file is a text file containing a series of commands that will be executed when the batch file is launched.
.cgi A Common Gateway Interface, or CGI, file is an executable file that is allowed to run on a web server.
.com This is an executable file for Dos & Windows operating systems.
.exe This is an executable file for Dos & Windows operating systems.
.pif A Program Information File, or PIF, file is used to launch a DOS program in a Windows multi-tasking environment using certain settings.
.vbs A file containing visual basic script that can be executed by double-clicking on it.

Windows Extensions
Extension Description
   
.cpl A Windows Control Panel file. Double-clicking this will launch the associated control panel.
.dll A Dynamic Link Library, or DLL, is a shared library in Windows. Executables will use these DLL files in order to properly run.
.dmp A memory dump file that was generated by Windows when a program crashed. These memory dump files can be used to determine why a particular program crashed.
.lnk These types of files are links or shortcuts to an executable located elsewhere on the Windows operating system. These .lnk files are just a pointer to the executable and can be deleted without affecting the executable itself.
.msi A Windows installer file that can be used to install an application on your computer.
.reg A Windows Registry file that can be used to make modifications to the Windows Registry. You should never double-click on these unless you know what they are going to do.
.sys A Windows driver files that allows Windows to communicate with the hardware installed on your computer.
.tmp A temp file created by a program. These temp files should be deleted automatically when a program is closed. They are safe to remove.

Settings Extensions
Extension Description
   
.cfg A config file that contains configuration information on how a piece of software should operate.
.conf A config file that contains configuration information on how a piece of software should operate.
.ini An initialization file that contains settings a program will configure itself with when it starts.

Font Extensions
Extension Description
   
.fnt A Windows font file. If you double-click this type of file you will be able to see the particular font in numerous sizes.
.fon A Windows font file. If you double-click this type of file you will be able to see the particular font in numerous sizes.
.ttf A TrueType font file. If you double-click this type of file you will be able to see the particular font in numerous sizes.
 
Programming & Source File Extensions
Extension Description
   
.asp An Active Server Pages, or ASP, source file that contains source code for Microsoft's ASP server-side scripting language.
.c A C file contains source code for the C programming language.
.cpp A CPP file contains source for the C++ programming language.
.h A header file for the C/C++ programming language.
.java A Java file contains the source code file for the JAVA programming language.
.php A PHP file contains the source code file for the PHP programming language.
.pl A PL file contains the source code file for the PERL programming language.
.py A PY file contains the source code file for the Python programming language.
.xml An Extensible Markup Language file. These types of files offer a way to textual data in a manner that it can be used by any program that supports the XML language.
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

How to install Software Updates on your Mac


Introduction
In order to keep your Mac secure and operating efficiently it is important that you always install software updates as they become available. These updates not only fix problems with applications and the operating system, but also fix security vulnerabilities that can be used by computer viruses to infect your computer. Unfortunately, many people feel that because they are using a Mac they are much more secure and thus may not be as diligent in updating their software as they would on a Windows machine where viruses are much more common. The reality, though, is that any operating system, regardless of who makes it, constantly introduces security vulnerabilities that need to be fixed. Therefore, it is important to remember that though you may be using a Mac, even they are vulnerable to computer infections as shown by the recent Backdoor.Flashback Trojan.
With that said, updating your operating system and its installed applications so that they are using the latest versions and patches is imperative to having a healthy and usable computer. This tutorial will walk you through updating your Mac computer as well as configuring it to automatically alert you when new updates are available.

How to install operating system updates for Mac computer
To install the latest software updates on your Mac computer please follow these steps.
Click on the Apple (Apple Menu) menu in the upper left hand corner and then select the Software Update menu option. Your Mac will now check for any new software updates as shown by the image below:

Checking for new software updates

After checking for new updates, if there are no updates available it will display a messages stating that Your Software is up to date. If you see this message, you can click on the Quit button to exit the software update procedure. On the other hand, if updates are available you will be shown a dialog box, similar to the one below, asking what you would like to do.

Available Updates screen

You should now click on the Show Details button to see what updates are going to be installed on your computer. This will display a screen, as shown below, that displays all the updates that will be installed.

Available Updates Details Screen

You can scroll through the list of updates and uncheck those that you do not wish to install. It is suggested, though, that you do not uncheck any of the updates and allow them all to be installed. Once you have reviewed the available updates, click on the Install button to start the update process.
The operating system will now install all of the updates that were listed in the screen above. While the updates are being installed you will see a status screen similar to the one below.

Download Updates

When the updates are finished installing, your Mac will prompt you to reboot your computer. Please allow the computer to reboot and the updates will now have been successfully installed.

How to configure Software Update on your Mac
Software Update can be configured so that updates are automatically downloaded on a regular basis. This section will provide information on the best way to configure Software Update for your Mac.
Click on the Apple (Apple Menu) menu in the upper left hand corner and then select the System Preferences menu option. The System Preferences window should now open as shown in the image below.

System Preferences

In this window, click on the Software Update icon as shown by the blue arrow above. This will open the Software Update configuration screen as seen below.

Software Update Scheduled Check screen

In this screen you can configure some basic options as to how Software Update will work on your computer. The Check Now button will allow you to instantly perform a search for new updates. The Check for updates checkbox allows you to specify if you want to check for updates automatically and how frequently you wish to do so. The Download updates automatically button specifies if you would like software updates to be automatically downloaded to your Mac so that they are ready to be installed.
It is suggested that you keep both Check for updates and Download updates automatically checked and to perform these checks daily. This makes sure you are notified of new updates as they occur in the event that there is a critical one that needs to be installed for the safety of your Mac.

How to see what updates have been installed on your Mac
In the event that you need to see what updates have been previously installed on your computer, you can go into the Software Updates preferences screen to see them. To do this, click on the Apple (Apple Menu) menu in the upper left hand corner and then select the System Preferences menu option. When the System Preferences window opens, double-click on the Software Update icon. Once you are in the Software Update preferences screen, click on the Installed Software option and you will be shown a screen similar to the one below.

Installed Software

The Installed Software screen will show the name of all the applications, and their updates, and when they been installed on your Mac. When scrolling through the list of software, you may notice that the same software may be listed twice. This is because they are different updates to the same application, which is indicated by the different version numbers.
With this information you can now determine if you are using the latest version of an installed software.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

How to force quit a program on a Mac

When using an application on a Mac it may become unresponsive and become frozen. When an application is in this state you are normally not able to interact with the program or close it normally via the Quit menu option. When this occurs the only way to close the program is to use Force Quit, which will forcefully close the programs. This tutorial will walk you through terminating an unresponsive program on your Mac.
WARNING: When you forcefully close a program as shown in the steps below, any unsaved data will be lost. You should only close programs this way if the application is hung and you cannot quit it normally.
To forcefully quit a program, please click on the Apple icon (Apple Menu icon) in the top left corner of your MacOS desktop and select Force Quit Finder as shown below.
 
Apple Menu
 
This will bring up the Force Quit Applications menu that displays a list of all the running applications that you can close.
 
Force Quit Applications Menu
 
Left click on the application you would like to close so that it is selected and then click on the Force Quit button. You will now be shown a prompt confirming whether or not you want to continue terminating the program.
 
Force Quit Confirmation
 
Click on the Force Quit button again and the program will be forcefully closed on your Mac.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Monday 26 November 2012

Free Workshop





Cyber Design Professional Training Institute Arrange a Free Workshop for Students and IT Professionals awareness programme for upcoming IT technology.We are Offers Professional Training Program for new comers in IT Industry. Cyber Design Professional Training Institute is authorized training center of Skill Development Council.


·     Digital marketing / SEO 
 Day : Saturday , Date : 1/12/2012 , Time : 3 to 5

·  Auto CAD Revit
Day : Saturday , Date : 1/12/2012 , Time : 3 to 5

Registration now limited seats are available.
Contact:
Phone No.021-36342207

Cell No.0346-8582220

E-mail:info@cdpti.com
http://www.cdpti.com
http://www.facebook.com/CDPTI

Plot no. C-31 Mezzanine floor F.B.area blocks 10 Aisha Manzil above Dubai Islamic Bank, Karachi.

Friday 23 November 2012

Windows Live Messenger is Going to Retire Soon



The windows live messenger which you are using to chat with your friends and family will be retired in a few months. Microsoft is saying “Good Bye” to its 12 years old child “Live Messenger”. China will be the only country where messenger will be available. The currently known Windows Live messenger was introduced in 1999 as a MSN Messenger which was commonly used for texting.  In the year 2010, more than 300 million users used to use Windows live messenger for instant messaging. Due to the competition among Google talk, Facebook Messenger and other various available applications the users of Messenger was decreasing day by day. To maintain the Microsoft’s fame Microsoft buys Skype in $8.5 billion. The backend of Windows Live Messenger has been integrated into Skype so that you can use your MSN’s account to sign in to Skype.


Microsoft is encouraging its MSN users to switch in to Skype. Microsoft account can be used to sign in to Skype, but you must have the Skype version 6.0 or higher. Mac version and Windows version of Skype 6.0 has already been released. Because the backend of Windows Live Messenger has been integrated into Skype, you can use Messenger account to sign in to Skype. Just by signing in to Skype with Microsoft account all of your Messenger contacts will be transported to Skype automatically.
If you are living in China then you are not able to sign in to Skype with your Messenger’s information because Windows Live Messenger will be available in China due to the internal problem of Microsoft. The joint venture of Microsoft and Sanghai Alliance Investment formed MSN Network Communications Technology Company (MSN China) which provides Windows live Messenger to Chinese. And Skype is provided by Microsoft and TOM online. Microsoft will get lots of trouble from Chinese Government if it wants to merge Skype and Messenger. Until this date Microsoft has said nothing about when it will merge Skype and Messenger in China.
Users will get the following benefits after switching to Skype.
  • Available for all platforms with broader device support.
  • You can share a screen.
  • You can have video call on mobiles or with your Facebook friends.
  • You can have group video call.
In the official blog of Windows Brian Hall mention that along with the strong network and integration with Windows Live Messenger, Skype will provide a better experience.  Skype can be used to log in to Facebook, Windows live and Hotmail and is already available in windows 8 as a native application. Microsoft is planning to introduce some “special offers” for those who make a move from Messenger to Skype.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Peeping into the all New Acer C7 Chromebook

The core idea of the Acer Company behind designing and developing the new C7 chrome book is creating a simple and better computer and make it available for everyone. The new C7 chrome book has turned out to be a perfect computer for home. Chrome books, in case one has not been briefed and told about, are devices that are like laptop and runs on the browser based Chrome OS operating system, which is available on the chrome web store. These devices are capable of working in offline mode, but they are not really that versatile in the offline mode. The most attractive benefits are its strength and versatility in web browsing and instant access design.

Notable Features of Acer Chromebook C7:

The new Acer c7 chromebook runs with the Google Chrome operating system which superbly integrates with all major Google applications. One can also enjoy amazing and attractive cloud based computing experience. The new Acer C7 also has the features of quick updating and easy sharing.
The new Acer device is supported by the web centric operation. Due to this web centric operation, the Acer PC C7 Chromebook boots up in just 18 seconds. It will take only 18 seconds of the user to access the desktop. This nimble device resumes instantly and boots in 18 seconds.
This new device by Acer “C7 Chromebook” gives an extremely clear and hassle free experience along with built in security, speed and the simplicity and flexibility of automatic update. It also has a full size keyboard and a track pad which is fully clickable. It has an extra bright display of 11.6 inches. Its battery life is over 3.5 hours. This C7 Chromebook is powered by Intel Core Processor. This device is also capable of playing high definition videos very smoothly. It has a 320 GB hard drive and a free storage of 100 GB on Google Drive.

The device also has 3 USB 2.0 ports, an Ethernet port, HDMI and also a VGA port. It also has a SD card slot which offers a very good and effective set of basic connectivity. The device doesn’t seem to have a Bluetooth, and also there is no wireless 3G. It only has an 802.11b/g/n Wi-Fi and also a 1.3 megapixel Webcam.

Availability and price:
After only a day after its release, the Acer C7 Chromebook will be available in all the leading stores. It will also be available on BestBuy.com and Google Play. It will also be available in the Best Buy stores across the country for those users who want to buy it from the mortar and brick showrooms. The price of this new device is $199. In the U.K. it will be available on Amazon UK, PC World, Google Play and Currys. Soon the device will be available in more countries.
Although this new device C& Chromebook by Acer has a huge fall down as its battery life is only 3.5 hours, it has many other new and attractive features. The company welcomes the device and hopes that it will make a good and useful computer for the family.

 Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth


Microsoft Surface RT Receives Updates

Microsoft has begun issuing updates on its relatively new Surface RT device on the company’s first major update after the launch of Windows RT and Windows 8 on the 26th of October 2012. The Windows 8 maker has made use of the opportunity to offer system firmware updates to its new Surface and now it seems to have improvised on performance to a decent extent.

The Performance Enhancement
On an average, applications were found to be opening two seconds faster than the previous firmware. The faster application launch times were observed in third party applications too. There were noticeable improvements as gadget geeks managed to compare two Surface models, one installed with the Windows RT updates and the other untouched one.
However, the new updates could not show much improvement on the audio stuttering issue. There were seven major updates made in all, as Microsoft managed to fix a couple of security faults with the older version of Windows RT.

Other performance enhancement observations  
It is also reported that on the very same day, Microsoft has also released patches of updates for Windows 8. This could also have a major role to play in the improvised performance of the updated Surface.
Many users have claimed that the new and updated Surface is smoother to work with when compared to the old one. Lots of blog posts and reports also dwell on improving speeds when applications are being launched.

The changes observed after the new update include faster performance, quick change of phase between the sleep mode and active mode, increased battery life. There was yet another issue that the old machine had and now it is not to be seen in the updated one. Applications on the Windows Store would not be installed completely (in the older device).
Microsoft’s Surface tablet functions on Windows 8 designed for the ARM processor. This is the first time a mainstream Windows operating system is in line with the likes of the Android operating system and the iOS. Hence, the initial hiccups are expected to be solved in the updated version of the Surface tablet. There isn’t too much information or reviews on the updated Surface except an improved battery performance.

Improved battery life
It is also reported that the updated Surface has improvised its battery life but how much difference it makes, is not known. On the initial reviews of the Microsoft Surface, we observed that the battery life was not up to the mark. Microsoft may have corrected that by minimizing the time taken to launch apps.

Are the minimal updates going to improve the fortunes of the Surface?
Well, it’s a known fact that the tablet world is flourishing, thanks to Android and Apple devices. For companies like Microsoft, to make a mark in the tablet arena, it has to produce something out of the box and that would be the only way it could compete with the giants. The recent updates with the Surface seem to be too minimal as there were several issues with the old tablet.
Is Microsoft targeting budget customers who cannot afford the iPad? If not, it’s got to really pull up its socks and improvise on the user friendliness of Surface RT.

 Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth


Free Workshop


Cyber Design Professional Training Institute Arrange a Free Workshop for Students and IT Professionals awareness programme for upcoming IT technology.We are Offers Professional Training Program for new comers in IT Industry.
Cyber Design Professional Training Institute is authorized training center of Skill Development Council.



1)Revit

Day : Saturday , Date : 1/12/2012 , Time : 3 to 5

2)Digital Marketing

Day : Saturday , Date : 1/12/2012 , Time : 3 to 5

Registration now limited seats are available.

Contact:

Phone No.021-36342207

Cell No.0346-8582220

E-mail:info@cdpti.com
http://www.cdpti.com/
http://www.facebook.com/CDPTI

Plot no. C-31 Mezzanine floor F.B.area blocks 10 Aisha Manzil above Dubai Islamic Bank, Karachi.


What is 3GPP


3GPP (3rd Generation Partnership Project)

More than two decades back, in 1998, all the telecommunication companies decided to establish a mutual management body and named it as 3rd Generation Partnership Project (3GPP). The collaboration was done to take a step in converting all the standards in global telecommunication. This required standard specifications with comprehensive reporting to bring quick improvements in 3G networking. In short all the up gradation, improvements and fixing of networking that was done individually now happen after mutual discussion and experimentation.

Instead of knowing the function of this 3GPP organization it’s better to have a look on its agenda;

=>Radio frequency would have been expanded to provide better service to multiple users. For this GSM is further improved in the form of GPRS in which data in the form of packets is distributed and another try has been made in to EDGE in which data sending rates are increased.

=>In this regard two areas were specially reconsidered in which GSM revolutionized its core networking and to make better the radio frequencies which come under the UTRA zone that covers FDD and TDD.

=>It is also considered that IP based transmission would be achieved to give better service in which multimedia is also included.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

What is I-Mode Technology


    
I-Mode Technology

The most demanded feature of all the communication devices is network accessibility. I-Mode technology has revolutionized the whole world. I-Mode is like the miniature of internet as mobiles are quite smaller. It is specially designed for the mobile to get access to internet through it. Regarding regular websites, which are designed to surf on PC, take longer time to open in Wi-Fi mobiles. This creates problem in mobiles as the application hang on for longer time and make difficult to use ordinary phone while browsing net.


I-Mode is a unique technology introduced by Japan in 1999 by NTT Do Como for the first time as a complete communication port either through phone service, mail or web information. Here I- tells that this portal will help you to access all type of information available on net. Now you do not need to disconnect from internet while receiving or making a phone call. Japanese goes for the internet option incorporated in the mobiles as they cannot bother to ask WAP to provide internet access. They need free hold internet anywhere anytime to not to sacrifice one feature for the sake of other.

I-Mode Technology Features

An I-mode mobile has an appealing feature with the I-button is placed in the top-middle position of keypad. You do not need to connect, one you have activated the I-mode feature it is available to you twenty four hours a week. You are available to your contact from either connection. Also you can take help from this information service. If you want to reserve a plan ticket, you would like to go through the departure time table. This you could do with the help of mobile as the information is available on the sight. You can correspond and get reserved your seat virtually without even visiting the office.

I-Mode Advantages

I-Mode technology gives the ease of internet connectivity without any extra charge. You just need to pay the connection charges and the amount of data download not the time limitation. I-Mode makes you free to remain online without paying extra money as you subscribe for the connection once.

How I-Mode Technology Works

It is very important to understand the I-mode technology. However it is not very complicated to understand and even a piece of cake for the website developers. Website developers are used to design web pages in HTML language to upload it. Now I-mode is a miniaturist form of this internet. It only requires small changes to the same webpage without deleting or removing the data to make it compatible for the mobiles. Some of the additional security frames and bold frames covering the web page are required to remove to make it compatible with the mobile screen resolution. A reliable step taken by the Do Como is that they made venture with the website developers to make some information oriented sites into I-mode form. I-Mode send information in the form of small packets to deliver quality service o their clients. Every component of the internet supplying has been changed into mini shape like you close the whole information in a small packet to make it possible for the large data to move easily.


I-Mode, the same technology previously and currently has been using in the PCs and laptops to access the internet. The difference is as mobile is a smart little gadget to take away with you anywhere so is the urge for internet connectivity called for the miniature form of internet service. All the web pages specially designed with iHTML language to access through mobile. If there are thousands official I web pages there are thousands unofficial web pages also available. You have a variety to go through your choice.   


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Mobile Phone Security


    
Mobile Phone Security

Advancement in technology where make you mobile there rises some serious mobile phone securityissues as well. While you are mobile phone with some positive purpose like on a business trip there might be someone else mobile phone with negative intention to harm you. You don’t know where and how you get loss to your data within your mobile phone, but you can take precautionary measurements to secure your mobile phone important data or personal possessions.


When you are away from your home with mobile device like mobile, laptop or iPod you are exposed to the danger. It is your duty to take some precautionary measurements for securing mobile phone data if you are mobile. There are some different aspects you have to consider as to what and how should be secure.

It is your first and foremost duty to think what are the important information and data you don’t want to leak out. This information could be;

    Customer’s contact information.

    Client detail.

    Personal data like personal number, birth date, CNIC No., and home address etc. It is advised that delete personal data while you are mobile or write partial information.

You must be aware of your need as which information you need while you are mobile.
While mobile, taking your all data with you could be harmful as you could lose your mobile phone device. Therefore it is necessary to place important data on a server machine instead of saving the information in laptop or mobile phone. In case of keeping data locally it is necessary to install software for the mobile phone security.


It is better to copy all the important information on CD and write short description about the data and arrange them date wise. This will help you to organize the data and also secure it in case of device failure.
Anti-Virus software or security updates are recommended to upgrade so that it regularly checks the files to avoid the data loss threat to mobile phone.


Hackers are clever enough to hack your passwords and logins information. Your password must be strong enough to be secure in any worst circumstance. For the strong password read the guide for strong passwords. Do not check the password remembrance prompt. Do not write password anywhere to be easily find out by someone. Do not allow cookies to save password on your mobile phone device.

Now-a-days wireless devices have in-built internet connection button. Switch-off this button not to establish connection automatically with an unsecured wireless internet. Do not remain on the sharing property of printer and file.


Always use secure wireless connection for the file and photo sharing and transferring.
While you are on move it is necessary to be very careful about your belonging. In public places you should be extra conscious about your surroundings. Keep an eye over your luggage and do not show off others that you have something precious something important. Do not let others to see your laptop or mobile, they can run away with it.


Do not let the Bluetooth on so that other can transfer important information without your permission. In case you forget to switch off the Bluetooth, you can be easily traced and trapped.


Let suppose you have lost your mobile or laptop. Do you have back up for the important information save in that particular mobile phone or laptop. It is better to secure information somewhere else away from your mobile device so that in case of robbery or loss you should not suffer the loss.


It is true that mobility helps you to be more productive and confident and surely has many advantages there is only need to be more aware to the threats and danger offers by outer environment away from your access.  


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Thursday 22 November 2012

3G Vs 4G

  

Difference between 3G and 4G (3G Vs 4G)

Everyday new development and improvement in mobile technologies is now becoming necessary and fashion as well. People are crazy to have latest mobile with latest technology. 3G has been ruling since previous two decades and now 4G is struggling to either swap or succeed 3G. However it is said that 4G is the modified form of 3G and for courtesy the term 3.5G is applied to it. The difference between 3G and 4G (3G Vs 4G) is quite obvious and anyone who has shifted from 3G to 4G can better tell that 4G is amazingly superior.

The amplest difference between 3G and 4G is the difference of sophistication. Where 3G is loaded with technology caboodle multiple wireless networking supports there 4G comes up with its own network having a clear distinction of accessing internet for 24 Hours.

The essence of 4G technology is its acceleration which differentiates it from 3G. 4G succeeds with the ratio of 2 : 20 :: uplink : downlink. It is 20 times faster than 3G and surely a great attraction for the mobile user to upgrade. 4G is still in its infancy and is need to develop a strong base after getting approval from ITU which is still in process as there are some speculations about the technologies to meet the challenge.


As to improve 3G technology it has come with multiplexing as switching between packet / circuit switching but 4G is accessorized with more sophisticated packet switching technology. Packet switching is a sort of temporary hybrid technology and is sued when there is need. It has more comprehensive and sophisticated nature and adopted from computer technology as it is the core system of processing computer applications. Packet switching has improved the audio visual performance of mobile. Packet switching technology is very dynamic in its performance as it remains passive till there is information to be sent and after receiving the command it prompt the command forward.

The increased Bandwidth makes the mobiles more efficient to send and receive large amount of data in a less time span. The last mile coverage till the loss of signals as it has coverage in many countries is a very useful feature avoids switching from one network to the other not to create propagation delay.


An important distinction of 3G and 4G is the use of wireless service and both have an edge over older technologies. The introduction of LTE and WiMAX has revolutionized the working of internet. It has not only given speed and data transfer capacity but also internet access.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...