Wednesday 27 February 2013

Routing protocols - Enhanced Interior Gateway Routing Protocol (EIGRP)

EIGRP is another distance vector protocol that is the classless implementation of the Cisco proprietary IGRP protocol. It is a complex protocol that uses different features to provide up-to-date routing information. Some of  EIGRPs features are: the DUAL (Diffusing Update Algorithm) algorithm used to update devices routing information, Reliable Transport Protocol (RTP) for packet delivery and bounded updates. This protocol uses special neighbor and topology tables for storing network information. EIGRP uses the 01-00-5E-00-00-0A MAC address, the 224.0.0.10 multicast IP address and the 88 application port number for data transmission. The Administrative Distance of EIGRP is 90for Internal EIGRP, 170 for External EIGRP and 5 for EIGRP summary route. A router can run multiple EIGRP instances at the same time, to differentiate them the Autonomous System (AS) ID is used. EIGRP can also route multiple protocols like IP, AppleTalk and IPX at the same time. For each of these protocols it uses different neighbor, topology and routing tables.
   RTP (Reliable Transport Protocol) is used by EIGRP for sending and receiving data. RTP can offer both reliable and unreliable delivery of packets. When the reliable method is used, acknowledgements messages are exchanged between devices. There are different types of routing messages exchanged, as follows: 
Hello messages - these type of messages are used by routers to establish connections between them. Before any routing process can happen, routers must discover their neighbors by exchanging these hello messages. By default these messages are exchanged  once every 5 seconds. If a router has not received a hello message from one of it's neighbors in a specified interval , the path is marked as invalid and the DUAL algorithm must find an alternative path. This parameter is also known as the hold time and by default is 15 seconds (three times the duration of hello messages).
Query and Reply messages - used by DUAL algorithm to determine alternative paths, topology changes, etc. Query messages are used to request data and reply messages are used to respond to queries.
Update messages - these messages are sent when there is a change in the network topology. Unlike RIP, EIGRP sends updates only when the routing information has changed (bounded updates). Remember that RIP sends it's entire routing information when messages are exchanged between network devices. Unlike RIP, EIGRP sends only the newest routing information (this is why you will probably hear that EIGRP updates are partial). 
Acknowledgement (ACK) messages - are used to confirm when data has been received.
   EIGRP uses the DUAL algorithm to determine the best routes between devices. Whenever there is a change in the topology, devices update their routing information with the newest data. The DUAL algorithm uses alternative paths in case of route failure and it's doing this by comparing route metrics. Using these techniques EIGRP can create a loop-free network, this is why you should always use the EIGRP dynamic routing protocol when Cisco devices are used. EIGRP protocol uses a composite metric of multiple elements: Bandwidth, Delay, Load and Reliability. These elements are referred to as K values (K1 to K5). By default only bandwidth and delay are used to calculate metric, the default value is 1 0 1 0 0:
1 - bandwidth K1
0 - load K2
1 - delay K3
0 - reliability K4
0 - reliability K5
The delay of a network specifies how long it takes for a bit of data to travel across the network from one node or endpoint to another from Wikipedia: http://en.wikipedia.org/wiki/Network_delay
Reliability - measures the probability that a link will fail, it is a value from 0 to 255 with the desired value of 255 (0 = the least reliable link; 255 = fully reliable link). Reliability is calculated as a fraction of 255. (reliability = 255/255 = maximum value).
Load - measures the amount of traffic on a certain route. It is a value from 0 to 255, the lower the value the more desirable the link is. Load is expressed as a fraction of 255 (load = 1/255 = low load percentage - the desired value).
The default formula metric looks like this : metric = K1*bandwidth + K3*delay
The complete metric formula looks like this : metric = [K*bandwidth + (K2*bandwidth)/(256-load) + K3*delay] * [K5/(reliability+K4)]
DUAL algorithm uses some elements when calculating best routes that packets must travel from one point to another:
- Feasible Distance (FD) - is the best path that a packet must travel to reach it's destination.
- Feasible Succesor (FS) - this is the backup route that packets will use if the primary path fails.
- The succesor is the next router through which packets will be forwarded to.
- There can be multiple paths to a destination point. Routers exchange messages that contain the so called reported distance (RD), this element is actually the FD of a neighboring router. When a route has been chosen we say that the feasibility condition (FC) has been met.
The main element of the DUAL algorithm is the technology used to calculate routes. This mechanism is called a Finite State Machine (FSM). This is actually a logical scheme that is used by the DUAL algorithm to test and choose routes.
   To configure EIGRP you must first obtain an autonomous system ID. This 16/32 bit number is assigned by the Internet Assigned Numbers Authority (IANA) and is usually used by Internet Service Providers to differentiate EIGRP instances. To enable EIGRP on a Cisco device, type router eigrp [AS number] from the global configuration command. All devices that belong to a network must run the same EIGRP instance (all devices must use the same process ID). After configuring the EIGRP instance, type ? to see all the available commands:
We must now configure all neighboring networks using the same command as with the RIP protocol: 
When configuring adjacent networks, you can also include the wildcard-mask to specify only the desired subnets:
To verify your EIGRP configuration use the show ip protocols command:
   By the way, you can issue any privilege mode command from the global configuration command by using the do statement (example: Router(config)#do show ip protocols). Another way to verify EIGRP configuration is to use the show ip eigrp neighbors command:
The show eigrp topology command is used to visualize the primary and backup routes that the DUAL algorithm has calculated.
   I've told you earlier that the EIGRP metric is composed of several elements and by default only bandwidth and delay are used. To view the configured metric elements, type show ip protocols and look in the upper side of the window:
The metric parameters can be changed by using the metric wights tos [vlaues] command from the EIGRP configuration mode:
Type interface [interface number] to view all the elements included in the EIGRP metric calculation:
We can also change the bandwidth of certain links by issuing bandwidth [number of kilobits] from the interface configuration mode:
   You can configure the percent of the available bandwidth of a link that EIGRP will use. By default EIGRP will utilize maxim 50% of the link's bandwidth. To configure the percent of the bandwidth utilization type the following command from the interface configuration mode: ip bandwidth-percent eigrp [percent], as an example: ip bandwidth-percent eigrp 50.
We can even configure the hello and hold-down time intervals with the ip hello-interval eigrp [AS] [hello time] and ip hold-time eigrp [AS] [hold-time] from the interface configuration mode. Example ip hello-interval eigrp 1 80ip hold-time eigrp 1 240.
Just like the RIP protocol, EIGRP summarizes routes by default. To disable automatic-summarization use the no auto-summary command:
   Another command that you are familiarised with from RIP is the redistribute static command. Remember that this command is used to send all static configured routes to all devices in the network. You can configure a static route then distribute it to all routers in the network. Another way to distribute static route is by using the command ip default-network [network ip] from the global configuration mode:
I will post a video tutorial on how to configure EIGRP, check it out if you are interested. I've covered all the main components of the Enhanced Interior Gateway Routing Protocol, I hope you will find this article interesting, leave a comment if you have any questions or something to add. Have a wonderful day.
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/ 
 

11 Reasons why products fail in the market

Not all the product ideas get transformed into actual products.  Only a few pass that stage and get to the market as a Product.  And there are even fewer products that are actually successful.  So what are the reasons why products fail in the market.  In this post I am outlining a few reasons in my practical experience which can lead to the failure of a product.

  • Not having a directed product vision
    • A product needs to have a vision, a roadmap at least at a high level.  Product roadmaps might change depending on the feedback from the customers / prospective customers / market research, but you need to have a product vision as you go along.

  • Not enough investments for the products
    • It is highly important that all the investments need to be made for the product development, testing, marketing, sales and brand promotion.  Without investments, the product will eventually die a slow death.

  • Too late into the market
    • A product needs to be in the market at the right time.  If the product is late into the market, there will be many competitors for the same market, and hence competition will be tough.  It is highly desirable for any product to have that First Mover advantage.

  • Too early in the market
    • In my previous point, I mentioned that a product needs to be in the market at the right time.  Even though being early in the market is a highly desirable option, however being too early in the market when there is no maturity in the market will obviously lower the chance of product success.

  • No real unique features
    • If there are no unique features that your product offers, customers will have no real interest in buying your product.  If you want your product to be highly successful, make it stand out in the market.

  • Lack of focus
    • If there is no focus on the product in terms of its development, marketing, brand building, etc then it is bound to have negative effect on the product's outcome.

  • Management expectations
    • If the management expects too much from the product and starts to create a brand for it, even before its launch or even before its mature, then it is surely going to disappoint the customers.

  • Not enough R&D investments
    • Many products needs a lot of R&D investments to be done in order to stay ahead of the market needs.  And to anticipate market needs.  But if the investments are not enough, then it is surely going to affect the product's market

  • Lack of adequate technical skills / Product Management skills
    • The product team which is building the product should be competent and highly agile as the Product evolves over time.  If the evolution time is long, then competitors will cash in.

  • Not enough value for money
    • As the great investor of all time Warren Buffet said "Price is what you pay and value is what you get".  So its a relative term.  Your product should be priced right and it should provide enough value for the money.  If the customer starts to feel that the price is higher than the actual value provided, then it will have a negative impact.

  • Buggy Product
    • Nothing can upset a customer than seeing a flawed product that doesn't work as expected.  News spread quickly, bad news spread even more quickly.  This can lead to disaster.
What do you think are the other reasons why products fail?  Please feel free to comment.  Thanks for reading.
 
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/ 
 

How to login into systems without password

How to login into systems without password


Hi friends, many of us have password protection in our computers to secure personal information and details. If you forgot your password, you can login into the system without password or if you want to login to others computers just follow the below tricks. Many of you may know this trick but still for those who are not aware of it can use this trick. This trick will 100% works on XP but I don’t know whether it works out in other operating systems.

Step 1: Start your computer
Step 2: When it asks for password press ctrl+alt+delete keys twice.
Step 3: Now another one window will open and asking for password.
Step 4: In that window, at the place of user name just type administrator and leave the password field blank and press enter.
Step 5: Now you have logged in as a normal user
Limitation:
Now you have full authority and the only problem is that you can't open My Document of the original account. To overcome this limitation, just use any one of the file recovery software and move the files from My Document to any other folder in other drive.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/ 

Tuesday 26 February 2013

Important SEO Tips For Beginners

SEO is  generally related to the process of increasing web presence and traffic from the perspective of search engines. The search engine market shares and therefore their algorithms  modify from year to year. So we always have skepticism, about exactly what has changed in the dynamics of SEO and precisely what picture  exists now. I would like to present starting SEO tips for beginners, which I constantly use in my SEO campaigns successfully. All of them are white – hat (which means safe) and won‘t hurt you in the next Google updates.

1. Brand your domain

Don’t confuse yourself about over stuffing or using many keywords in the domain name. The effectiveness of keyword rich domains is only a myth especially since the last Google updates. In the term brand I mean to think twice from the branding point of view – use your business (website) concept, valuable proposition ,add some freshness and uniqueness and mixture with competitive key phrases. It might sound that ‘’howtostartseoforbegginers .com’’ will rank higher, than ‘’applesandorange.com‘’, if they are in the same niche, but in the last year techniques has changed positively on the side of branded domains.

 2. Title tag should be relevant

Yes, title tags need to contain main keywords, but using all you keywords in the title tag will decrease chances for positioning more profitably. Try to generate relevant, consistent and keyword highlighted title tags, that constitutes your brand.

 3. Keywords don’t need content, content needs keywords

Firstly create content, targeting on the keyword related themes and you will better position keywords. Marketers usually get into disaster, when they start thinking from the keywords viewpoint, overs stuff them in their texts and as a result decrease search engine visibility. Be specific and for a start place some ideas in the content.

 4. Plan your navigation and site maps wisely

It should be easy for search engines to index your website – visible for Google spiders and crawlers. Therefore look closely at the navigation of landing page. Remember that if the site has a good navigation structure, visitors will invest more time in you.

 5. Brand the pages

Let’s imagine sub pages of your website, which has some kind of content and maybe distinct SEO structure. Only keyword relevant content doesn’t win nowadays. Try to contribute some images (with alt tags), maybe info graphics, social media integrations, videos, PDFs or other creative material. Such content (or page) will create the experience and increase your visibility. Also it is clearly understandable, that duplicate content will create losses.

6. Build keyword related relevant Back links

Use forums, social media, article submissions, press releases, video websites to create backlinks to your site. Think about the top quality and time frequency – you will never build all back links in one months or two months, as this is the long – term process.
You will discover various search engine optimization tips on other internet sources and properly make use of them. But theoretically all this SEO tips for beginners are basic and widely used. It will only help you to promote the website.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/ 

Top 10 Free Tools for Web Designers

Web designers are mostly known for their creativeness and odd thinking. Designing job isn't that much easy as you think, it is tough to manage with innovative architecture, good layout structure, visible color designing, etc. Here, I dedicated an article with a list of top 10 free tools for web designers. Some of these tools are available online and some also does at offline too.

Picasa
Picasa is a project by Google; it is used as easy and for quick photo sharing online. This application is also available to download to use it offline for the application of image viewer. Picasa photo tool is used as image sharing, image customizing and image viewer as well.
IrfanView
Irfanview is also such a similar application to Picasa, it is a freeware tool to customize images with lots of features. This application is also available for commercial purpose with license.
XN View
XNView is the yet another image tool, used to convert the image formats, enhanced image viewing tool. This application is open source and available at free of cost. This application is also available for all kind of smartphones.
GIMP
GIMP stands for GNU Image Manipulation Tool. It is an open source free software tool for photo retouching, image composition and image authoring. It is also available in various languages and for various operating systems.
Flickr
Flickr is the online photo sharing tool which also lets you to customize the image online and save it remotely. It also can be used remotely to reduce the bandwidth of your site. It is also considered as best photo management tool and sharing application.
Google Sketchup
SketchUp is another project by Google; it is used as 3D Communication software for Design and Engineering Professionals. To say simply, it is a drawing tool used to figure out the layout for web designers and multi-purpose for civil engineers and architects.
Microsoft Paint Tool
Most of all are familiar with this free and fantastic tool. Still I personally prefer and use Microsoft Paint tool to finish up some stuff of paint works on my design rather than doing it with Adobe Photoshop. This tool has an enhanced vision on the latest windows versions such as Windows 7 and Windows 8. This tool is already integrate with your Windows OS and it has basic features for designing works.
Photobucket
Photobucket is a free image hosting and photo sharing tool. It has two types of options to use. One is free service which is limited with some bandwidth and usage allocation but another paid service has unlimited usage.
Paint.net
Paint.Net tool is an application similar to Photoshop which is available at free of cost. It is free photo editing / designing tool for windows platform.
Imageshack
Imageshack is yet another online photo and video hosting tool. It gives extra privilege to their subscribers where does not for guest users.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/ 

Installation Steps magento-1.7.0.2

Installation Steps magento-1.7.0.2

Magento is a feature-rich eCommerce platform built on open-source technology that provides online merchants with unprecedented flexibility and control over the look, content and functionality of their eCommerce store. Magento’s intuitive administration interface features powerful marketing, search engine optimization and catalog-management tools to give merchants the power to create sites that are tailored to their unique business needs. Designed to be completely scalable and backed by Varien’s support network, Magento offers companies the ultimate eCommerce solution.
How to Install Magento 1.7.0.2 on Windows with XAMPP
      • First Download Magento
      • Create New Database magento as seen below
magento
  • After Create database import Sample data as seen below.
magento1
  • After import sample data files you will get Successfully finished all files message as seen below
magento2
  • Then After Copy the magento Source file in xampp/htdocs/magento(you have to change the magento name your convenience)
  • Enter Path URL address Like localhost/magento ,then one window display as seen below
magento3
    • here Click the Check box and click Continue Button display the next window as seen below
magento4
  • Click continue Button next window Display as seen below.Here you have to enter Database Type,Host,Database name,Username and password is not mandatory as seen below
magento5
  • After Entering all information Click Continue button one window display  here you can enter personal information and login information as seen below
magento6
  • Then after display successfully installed window as seen below
magento7
  • Then after click Go To Front End Button Magento Home display as seen below
magento8
  • Click Go To BackEnd button Magento Login Pannel Display as seen below or Type Address bar localhost/magento/index.php/admin
magento9
  • Enter Username and password magento backend display as seen display
magento10
  • Copy the sample data media folder in magento folder
magento11
  • After copyingn folder one messgae display click yes to all button as seen below
magento12
  • The After Refresh Home Page Display all products .

  • Thanks & Regards,

    "Remember Me When You Raise Your Hand For Dua"
    Raheel Ahmed Khan
    System Engineer
    send2raheel@yahoo.com
    send2raheel@engineer.com
    sirraheel@gmail.com
    send2raheel (skype id)

    My Blog Spot
    http://raheel-mydreamz.blogspot.com/ 

    Monday 25 February 2013

    Hackers attack Microsoft computers

    Microsoft has become the latest US technology company to confirm that it has been targeted by computer hackers.
     Microsoft announced that "a small number" of its computers had recently been deliberately infected with malicious software.The firm said it found no evidence that any customer data had been accessed, but an investigation is continuing.On Tuesday Apple said its computers were attacked by the same hackers who targeted Facebook a week earlier.At the time, Facebook said it had traced a cyber attack back to China which had infiltrated employees' laptops.
     Microsoft spokesman Matt Thomlinson said: "This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries."

    Thanks & Regards,

    "Remember Me When You Raise Your Hand For Dua"
    Raheel Ahmed Khan
    System Engineer
    send2raheel@yahoo.com
    send2raheel@engineer.com
    sirraheel@gmail.com
    send2raheel (skype id)

    My Blog Spot
    http://raheel-mydreamz.blogspot.com/

    13 Ways to Overcome Interview Nervousness





    Our recruiters will tell you that controlling your nervousness during an interview is one of the most important things that one can to increase your performance.  Though, this is something easier said than done.  To ensure that you are more confident and produce better results, here are 13 ways to overcome nervousness during an interview:

    1. Controlling Your Actions and Not Worrying About the People Around You – If you’re sitting in a room with other candidates, don’t pay a bit of attention to them. Focus on reading a book on your iPhone, focus on anything else but the other people.

    Sometimes, our recruiters have seen that younger job applicants get very competitive and will try to intimidate you, but rise above it. That’s their issue and they are probably more nervous than you are trying to compensate for their insecurities by attempting to throw you off your game.

    2. Don’t worry about anything else, but the interview. Leave everything that doesn’t have to do with the interview outside of the room and do nothing other than focus 100%.

    3. Instead worrying about not getting the job, be happy thinking about how it will feel once you do get the job offer. Have faith in yourself. Your greatest weakness is lack of self-confidence.

    4. In your head, start reinforcing all the good traits you have. This may take repetition after repetition, but don’t let your mind focus on what you perceive to be shortcomings. Focusing on what you don’t have is highly counterproductive, it wastes energy and, usually your thought process is not based in reality.

    5. Have faith that the interviewer will make an intelligent decision by hiring you. Just because an interviewer rejects you doesn’t mean that he made a smart move. There are plenty of unintelligent people out there and you just have to have faith that this person is going to make the right decision.

    6. Focus on your chief aim in life. If we focus on outside goals rather than internal shortcomings we are going to be more energized and engaged in the interview. Our headhunters suggest that you ask yourself as to what is your goal? Is it to get a PR job at a major firm? Focus on that.

    7. Don’t base your self-worth on whether you get this job. Your value as a person and your job are entirely mutually exclusive and if you spend your life letting money and your job title dictate your happiness and confidence, you’re going to be perpetually unhappy.

    8. Take a deep breath and relax your muscles. You’re not going into a life and death situation. Do your best to relax. Take a few minutes to clear your mind while waiting.

    9. Be 100% focused on what the interviewer has to say. When we are 100% engaged in a conversation, psychologically we can’t be nervous. So, if you find yourself getting nervous just focus more.

    10. Realize that your competition is not as strong as you fear and they are just as scared of you as you are of them.

    11. Don’t phrase your answers based on what you think the interviewer wants to hear. Mind-reading is often misleading and people who do it come across as not authentic. Tell the truth. When you speak from a place of honesty, you are taking the right chance and, thus should not be nervous by telling it the way it is.

    12. Don’t worry if other applicants have a better education than you. Thomas Edison had only 3 months of schooling in his entire life, Henry Ford had less than a 6th grade education.

    13. Don’t think about the times you didn’t get a job offer. Those times have absolutely nothing to do with this interview. You’ll get it right, eventually. Thomas Edison “failed” ten thousand times before he perfected the incandescent light bulb.

    Thanks & Regards,

    "Remember Me When You Raise Your Hand For Dua"
    Raheel Ahmed Khan
    System Engineer
    send2raheel@yahoo.com
    send2raheel@engineer.com
    sirraheel@gmail.com
    send2raheel (skype id)

    My Blog Spot
    http://raheel-mydreamz.blogspot.com/

    How to Transfer your Data From Blackberry 7 to Blackberry 10 Device

    blackberry 10 OS is said to be the most advanced operating system by blackberry. Blackberry Z10 got a lot  of Positive reviews and is working well for blackberry. If you are a blackberry user you would love to upgrade to latest 10 OS, if you are thinking to migrate your self from blackberry 7 to blackberry 10 and want to keep your all phone data with you then you can use  blackberry Link. This will let you transfer all your data from blackberry 7 device to blackberry 10 device. So here are the steps that you can follow to transfer you data.

    You need to download a appropriate version of software (PC or MAC)

    Install the software and connect your blackberry 7 device with it, this will show a warning after connecting but just ignore that and continue your work







    Then click on TRANSFER DEVICE DATA and then click on Next , 










    Your data transfer process will be started  and all you data will be saved to your PC till further instructions.






    After the transfer is finished it will ask you to connect your new blackberry 10 device and then you can disconnect and again connect your new device.




    When you will connect your device it will show you some instruction message, you can click on Next to continue.






    You data transfer will be started from your system to blackberry device.
    It will transfer your data to your blackberry device and after finishing it will show a successful screen  and you are done now you have moved all your data from your old blackberry 7 device to your new blackberry 10 device.

    Thanks & Regards,

    "Remember Me When You Raise Your Hand For Dua"
    Raheel Ahmed Khan
    System Engineer
    send2raheel@yahoo.com
    send2raheel@engineer.com
    sirraheel@gmail.com
    send2raheel (skype id)

    My Blog Spot
    http://raheel-mydreamz.blogspot.com/

    How to change the driver letter of a computer

    How to change the driver letter of a computer

    Many of us don’t know about the possibility to change the driver letter or path of our computer. This will cause some problems to your programs, but you can change the settings at any time you want. You may think what the purpose of doing this and risking the files of your computer. You can amuse your friends by this tricks which many of them don’t know.

    How to change the driver letter of a computer
    Suppose you are working on a video editing project and for some reason you need to shift your work to another computer. You were working on the previous computer with 'G' drive and it is not available in the new one. Then what will you do? Definitely you won't love to do everything from the scratch. In this situation you can change the drive letter of the new computer to 'G' and copy the raw files to it and continue the work as usual.

    You can’t change the name of the drive by right clicking. You won't find the rename option. Here I am going to explain how you can change the letter or path your drive. Just follow the below steps.

    Right click on My Computerà Select ‘Manage’. New window will open. In that window browse 'Disk Management' option.
    Right click on the drive which you want to change the drive letter. Click 'Change Drive Letter and Paths' option
    Click on 'change' and then select one of the drive letters available in the combo box and click on OK.

    Now check your 'My Computer' and it is changed with the new path. If you want to change it back to the previous one just follow the steps once again and select the desired drive letter.

    Limitation:
    When changing the drive letter it causes some problems in some programs associated with the drive. For example, if you are working on a video editing project and all your raw video files are stored in a drive say 'E' and if you change it's letter to something else the project file may find it impossible to read the file. So, be careful while doing this.

    Thanks & Regards,

    "Remember Me When You Raise Your Hand For Dua"
    Raheel Ahmed Khan
    System Engineer
    send2raheel@yahoo.com
    send2raheel@engineer.com
    sirraheel@gmail.com
    send2raheel (skype id)

    My Blog Spot
    http://raheel-mydreamz.blogspot.com/

    Saturday 23 February 2013

    SEO & Web Design – They Go Hand-in-Hand

    The online experts don’t differentiate between SEO and web design much, as they consider them to be highly interlinked. Contrary to what the majority of people believe, SEO and web design are not two separate processes. Specifically, developers create a site and then SEOs optimize it with the help of link-building and content-writing. 

    Good web design and an effective SEO strategy are tied together and cannot exist without each other. No matter how effective your SEO strategy is, it is more likely to fail if it’s not backed by good web design. We need to understand that the net users today have become more demanding and they don’t like to index pages on your site to find something. They prefer convenience and thus a user-friendly and attractive web design will surely impress the visitor and force them to visit your site again and again. Among the most important SEO aspects that one should consider while designing the website is how easily the search engine crawler will navigate through the web pages. You can easily determine this by running a check on how many web pages of your site are indexed by the search engine when people visit your site. A quick way through which you can do this is by entering “site:” followed by the URL of your website in Google. This will show all the web pages that Google has indexed from your website. However, you might see the results fluctuating widely, something even by thousands of pages. You can also use Google Analytics to get more accuracy.

    Even blogging engines like Wordpress have developed tools to beautify blogs and design them well; this is why you will see some of the best WP plugins online. The SEO buzz that is floating around due to high potential and usability of these tools has prompted web masters to devise even more effective strategies. In crux, you must know how many web pages you want to be indexed from your site. The number that you obtain from text will not match this exactly, but if it differs widely then you might have a problem. This clearly suggest that the search engines are struggling to navigate your website for reasons that can range from poor navigation of the site to presence of dead links, etc. Thus, the use of Google Analytics is preferred, as it will help you to pinpoint your problems and allow you to fix them. 

    An aspect that the search engine spiders tend to look at when they generate their rankings is how “popular” the website is. Links can be considered as an important benchmark in this regard; however, all links come with various degrees of power and effectiveness. The best links are the ones that come from trusted sources and the quality of the sites that are producing content on a regular basis. Influencing or encouraging links from these sorts of sources is the key for any SEO campaign. A badly designed website is going to put off most of the quality link sources from giving them the crucial recommendation that the search engine spiders are looking for. It is better you encourage people to visit your site and take feedback from them regarding navigation and usability of your website. If you are able to make an eye-catching or easy-to-navigate website, it will surely boost your search engine rankings.

    Again, SEO is a complex process and it’s not as easy as it sounds. You need to have the correct combination of SEO tools in the form of link-building and content-writing. Quality content in any website is a must. If you want more information on web design and SEO, you must read articles from some of the top SEO directories.

    Tips to set password to Microsoft office files


    Tips to set password to Microsoft office files
    It is easy to set password to Microsoft Office files like .doc, .ppt, etc. If you set password for each and every files then it becomes secure and other peoples can’t open it. In this article I have given the tricks on how to set password to Microsoft office files. Just follow the below instructions to keep your files safe.
    Step 1: Open Microsoft office's component such as Word, Powerpoint, Excel etc.
    Step 2: Click the Office button 
    Tips to set password to Microsoft office files
    Step 3: Click on Prepareà click  on  'Encrypt document'
    Tips to set password to Microsoft office files
    Step 4: Then one window will open.Enter the password in window and click Ok.
    Tips to set password to Microsoft office files
    Step 5: Then another window appears asking for password confirmation. Re-enter your password and click OK. Now the Password is set on the file. 
    Step 6: Whenever you open the file it will ask for the password.  
    Tips to set password to Microsoft office files

    Friday 22 February 2013

    The Computer Network Terminology you should be known

    Autonomous Systems (AS)
    A collection of routers under a single administrative authority, using a common Interior Gateway Protocol for routing packets.
    Border Gate Protocol (BGP)
    A protocol that distributes routing information to the routers,  which connect autonomous systems.
    Domain name
    A series of alphanumeric strings separated by periods that is used to name  organizations and computers and addresses on the Internet.
    Domain Name System (DNS)
    A general-purpose distributed, replicated, data query service  chiefly used on Internet for translating hostnames into Internet addresses.
    Firewall
    A router or computer software that prevents unauthorized access to private data (as on a  company's local area network or intranet) by outside computer users (as of the Internet).
    This might help you: How to Use The Most of Your Laptop Battery Using Windows 7

    Hypertext Transfer Protocol (HTTP)
    A protocol used to request and transmit files, especially  webpages and webpage components, over the Internet or other computer network.
    Internet Control Message Protocol (ICMP)
    One of the Internet protocols that allows for the  generation of error messages, test packets, and informational messages related to IP.
    Internet Protocol (IP)
    A connectionless, best-effort packet switching protocol that provides  packet routing, fragmentation and re assembly through the data link layer.
    Internet Service Provider (ISP)
    A company that provides other companies or individuals with  access to, or presence on, the Internet.
    Listening post
    A center for monitoring electronic communications (as of an enemy).
    Plaintext
    The unencrypted form of an encrypted message.
    Private network
    A network composed of point-to-point leased lines between sites.
    Router
    A device that forwards packets between networks based on network layer information and routing tables, which often constructed by routing protocols.
    Routing Information Protocol (RIP)
    A distance vector routing protocol that distributes routing information to the routers within an autonomous system.
     
    Transmission Control Protocol (TCP)
    A protocol for the internet to get data from one network device to another by using a retransmission strategy to insure that data will not be lost in transmission.
    Uniform Resource Locator (URL)
    A way of specifying the location of an object, typically a web page, on the Internet. It has two parts separated by a colon. The part before the first colon specifies the protocol. The part after the colon is the pathname of a file on the server.
    User Datagram Protocol (UDP)
    A connectionless protocol in the transport layer layered on top of IP protocol that provides simple but unreliable datagram services.
    Virtual Private Network (VPN)
    A network composed of several sub private networks connected through a public network (as of the Internet). The network traffic is encrypted in the IP layer so that secure connections among the sub private networks are provided through the insecure public network.

    Hotmail Users Disapprove Microsoft’s Switch To Outlook.com

    Change brings out different sentiments in people. Some recognize and accept it with fervor, others show indifference, and yet a fair few express outrage at anything they find new.
    Microsoft has already pushed its Outlook.com service out of beta status a few days back, and also announced that it will be transferring all its users to the new email platform by summer this year. This is in addition to retiring the Windows Live Messenger, with Skype becoming the new focus.
    The transition has already begun and (quite unsurprisingly) a lot of Hotmail users are outraged by the company’s decision to completely retire the classic old email platform.
    In fact, the company’s support forums are already filling up with complaints as disappointed users blast the decision of being automatically transferred to Outlook.com. Here is one such user:
    “My Hotmail account was changed to Outlook yesterday without my permission or notification, does anyone know how I can change it back? I cannot see any option to change to back or to even contact Outlook.”
    Obviously, some may have overlooked the fact that Microsoft did send emails to users informing them that going back to old Hotmail is impossible. Moderators at the forum were quick to reply:
    “Microsoft has sent at least 2 emails to every single Hotmail account explaining when and why this change has taken place… That conversion is taking place and there is no option to revert back to the Hotmail format.”
    Redmond confirmed in a blog post a couple of days back that Hotmail would be entirely retired by summer with Outlook.com taking its place as the company’s only email platform.


    Wednesday 20 February 2013

    Seeking Glass Explorer



    Last year we showed Glass to the world for the first time - we jumped out of airships, crashed New York Fashion Week and even took a ride on the subway. It’s been an exhilarating journey so far and there’s a lot more to come, but we can’t go it alone. We’re developing new technology that is designed to be unobtrusive and liberating, and so far we’ve only scratched the surface of the true potential of Glass.

    Now we want you to get involved and that’s why today we’re expanding our Glass Explorer Program. We’re looking for bold, creative individuals who want to join us and be a part of shaping the future of Glass. Glass is still in the early stages, so we expect there will be some twists and turns along the way. While we can’t promise everything will be perfect, we can promise it will be exciting.

    We’d love to make everyone a Glass Explorer, but we’re starting a bit smaller. So, if you want to be one of the first Explorers, go to www.google.com/glass/start/how-to-get-one to find out how.

    Tuesday 19 February 2013

    Lock Your PC With A Single Click And Unlock It With USB – Portable Application

    If you are worried about your pc security and don’t want others to access it while you are not using it or not at your desk, then WinLockr is a great Portable Freeware application which you should give it a try. The sole purpose of this application is to Lock your PC, which it does with ease.
    What makes WinLockr little bit unique from other apps is that you can easily Unlock your PC with the help of a USB without entering the Password.
    How To Use WinLockr
    1. Download the application – WinLockr
    2. It’s a portable app, so double click it and it will ask you to make a new password. This password is required to configure the app and to unlock the PC. (always remember this password)
    WinLockr-Password

    3. After confirming your password, the main interface will open. Now you have three options : You can use password Only option to unlock the PC or USB or any of them.
    WinLockr-Main-Interface

    4. The best option though is USB only but incase you forget your USB somewhere or LOST it then… so it’s better to use the option which allow you to use both of the features.
    5. Click Install on USB
    6. It will ask you to Plug USB in the computer and then press OK
    WinLockr-Plug-USB

    7. Select your USB drive and then press OK button
    WinLockr-Install-USB

    8. It will show you the confirmation box that the password is stored on the USB, which can be used to Unlock your PC
    WinLockr-Password-Installed

    9. Now select USB unlock and it will show you message to Insert USB to verify the stored Password.
    WinLockr-USB-Verify

    10. If verified correctly, it will show you the confirmation message
    WinLockr-USB-Verification

    11. Now, if you want to UNLOCK the PC using USB only, then select the Only USB-Unlock option or select Allow Password Un-lock to have both the features enabled.
    WinLockr-Unlock-PC

    12. In order to lock the PC, simply click the Lock Windows button and it will lock your Mouse and Keyboard except the keys that are required to to enter your password.
    WinLockr-Lock-Windows

    13. Winlockr will also prevents Windows from shutdown, restart or log off actions while your PC is locked.
    14. To unlock the PC, simply PLUG the USB device or enter the password and press Enter.
    Last Words:
    WinLockr is a nice portable application which can be used to quickly lock the PC. Only USB unlocking feature is making it a unique app, otherwise it’s better to use windows built-in locking feature. Give it a try and then share your comments / suggestions at below page commenting section.
    Download The Software : WinLockr

    Thanks & Regards,

    "Remember Me When You Raise Your Hand For Dua"
    Raheel Ahmed Khan
    System Engineer
    send2raheel@yahoo.com
    send2raheel@engineer.com
    sirraheel@gmail.com
    send2raheel (skype id)

    My Blog Spot
    http://raheel-mydreamz.blogspot.com/

    what is Juice Jacking SCAM

      Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...