Pages

Sunday, October 6, 2013

Tips and Software to Find Storage Space on Hard Disk

Sometimes if you’re hard drive storage capacity becomes full and you like to discover which folder is holding up the largest part space. Then you need to run such types of programs that will let you to find out the most occupy space and control it on your hard drives. Actually this type of problem considers like serious topic for a hard drive. It often gets full in no time and you are left surprising where are entire space gone. If you don’t sure where entire your space gone, then you need to run powerful software that will sniff out any space on your hard drive and describe you accurately how much storage space every folder takes.

Clean stored temp files first
If you don’t find out the where the Temp folder is stored, navigate to C:\Users<your_user>\AppData\Local\Temp and delete the content of the folder.
System tools for finding hidden space on your hard drive
There are a many freeware or license based software or tools that are designed for the reason of letting users to know what folders on their hard drives are occupying the most space. This software’s not only monitors your hard drive but also always find where all that space hides. At the bottom we are going to provides brief examples about such programs or tools that can let you locate space hogs on your hard drive.

This software is the simplest and user-friendly that you can use simply.TreeSize Free is a simple tool that will evaluate your partitions and show you a sign of how much every folder takes up. It is a simple interface that permits users to speedily browse folder and its sub-folders from any partition.
Selecting the partition from the menu at the top of the window and scan it. The whole process is completed in just seconds. The size of every folder is shown in MB and for multipart folder trees.

SpaceSniffer is small-weight software to find space hogs on your hard drive. It will permit you to scan any partition on hard drive and show a graphical look at how your folders are organized.
After the procedure completed, you will get all your folders in box-shapes, viewing the name and its size. By clicking on it, you will go one level down and see it’s containing folders.
Other Useful Software to find out Hard disk Space Hogs

Conclusion
With the help of above tools or software, you will always be capable to point out for big files that occupy a large quantity space on your hard drive. In additions, make sure that your hard drive’s is working properly.

Friday, October 4, 2013

10 Security Tips to Protect Your Computer and Network

Whether you like it or not, hackers and virus coders have always been a few steps ahead of us. They devise new ways to take control of our devices and bank accounts. In an edifying 
To check how secure your computer really is (and fixes, if it is not), take it out for a spin and undertake the following measures.
Plant a virus
This will sound absurd, and it probably is, but to check how effective your Anti-Virus suite is, you need to download a virus into your system. This is not any regular virus, but a very specific one. This is a part of the test called EICAR (European Institute for Computer Antivirus Research), which offers you a virus, and the catch is that if your Anti-Virus is efficient enough it will be able to detect that virus. Some Anti-Virus, like the one I am using (AVG) didn’t let the download to proceed. If your Anti-Virus does the same, it is a good thing, don’t sweat on it.
Remove saved passwords
Problem with so many great services available on the web is that you have to remember the username and password of all the accounts. To make things easier, most of us don’t mind letting our web-browsers save the login credentials. As convenient as it is, it arises some critical security concerns. Anyone locally or remotely can know your log-in credentials. It is that easy.

To remove your password from Chrome browser, go to the Settings, scroll down and from the Passwords and forms option, click on “Manage saved passwords.”. Delete all the entries.
Firefox users need to go the options, and under the security tab, they can remove all log-in credentials. You can use password management tools like KeePass and LastPass to save your time.

Check your browser plugins
There have been numerous cases in the past where the hacker got access to the victim’s computer through a malicious plug-in. Although there are many software, such as WinPatrol, Glary Utilities and many other which we have extensively covered in our weekly downloads articles, finding which extension is the crook can’t be done by them. To do that you will need to use BrowserCheck. It scans your browser and looks for the plug-ins you have installed on it. Additionally it will inform you if any of the installed plug-in is outdated.
Find who is on your WiFi network
If you don’t secure your WiFi network and make it password protected, you are simply inviting people to use your internet. Besides eating your data, with the help of many tools, the intruder can hop your WiFI network, if not get into your computer. Hence it is very important that you make your network password protected. To check who is on your WiFi network, download the tool Who is On My Wifi and the software will tell you all about it.
Don’t let anyone change your router’s settings

Many routers let any device which is connected to it configure its settings. All you need is the default IP address of your router, and the default password – both of which can be found very easily online. To stop anyone from changing your router’s settings, you will need to disable the port which is responsible for it and other remote management features. Depending on the manufacturer of your router, the step required to perform this will be listed in the router’s manual guide. While you are at it, also change the default password of your router’s page.
Disable data sharing through USB ports
Notably, some routers come with support for USB keys, which at times come handy, but mostly it is just another door for intruders to come in and plant and leave a virus inside it. If your router has a USB port too, you need to disable it. Depending on the manufacturer, you might see that option in the router’s webpage. Again, you need to check your router’s manual guide. 

Check your Firewall
Windows has a built-in Firewall. But unfortunately it is not as strong as it should be. Take your firewall for a spin test. ShieldsUP is a nifty service that reviews your system’s firewall. With your consent it checks if your computer and router are vulnerable. If your PC is working fine, all its ports should be closed – which is the job of your firewall. If the website doesn’t find any vulnerable port, it means that your firewall is working fine.
Keep all the security modules up-to-date
Many non-Microsoft programs leave security vulnerabilities in your computer. To find such patches, and fix for it, Secunia PSI is the probably the best tool for this very task. Besides the aforementioned task, the software also checks if your Windows OS is up to date and has all the required security patches or not.

Reroute your DNS
If you want a simple solution to make all your browsing secure and well administered, you need to change the DNS settings of your network. OpenDNS is a very trusted service which offers you the same. The procedure to set it up is very easy and depends on the OS you are using. I can’t stress enough how much useful this service is. Once you have made the transition, which should take less than 10 minutes, you won’t have to worry about phishing and other common internet scams.


10 Tips to Make Internet Explorer a Better Web Browser

The latest version of Internet Web browser (Internet Explorer) has come with new useful features. This browser has added a tons of changes and proved as the top-rated world browser than chrome and Firefox The new version shows few important improvements over its previous versions.
if you install latest version like Internet Explorer 11 in your computer then you may tweak a few settings and a group of third party apps in order to make it as an adorable and user-friendly browser.
Bring back the Content Advisor
In Internet Explorer 8 and 9 version, we had this great utility that let us curate lists of sites that we don’t want Internet Explorer to access. This option was however disabled in IE 10 and IE 11. To reinstate it, you need to go to the start menu, search for “group policy” and select “Edit group policy” from the result. You will now see a window appearing on your screen, double click on Administrative Templates, then follow this string: Windows Components | Internet Explorer | Internet Control Panel | Content Page. Double click on Show Content Advisor and inside the window, click on the radio button that says “Enabled”.
Once you have done that, open Internet Explorer, click on the settings, go to the “Content” tab, and from there you can set parental controls to other user accounts of your computer.
Kill that “View next page”
One thing that I completely dislike while reading articles on some websites is the need to click on “next page” to read the rest of the article. Many popular websites including the humor site – Cracked, and Technology publication – Forbes, have implemented this format. If you want to access the whole article in one go, IE10 and 11 have an option called “Flip Ahead” that lets you do just that. The website automatically detects if the article or slideshow has been partitioned and when you scroll down the page it gives an arrow icon to flip to the next page. This feature was first introduced in IE10 and was only available in the tile view of Windows 8. To make this option work in Desktop mode, you can go to the internet settings, and from the “Advanced” tab, click on ‘Enable flip ahead’.
Set Desktop Viewing as default
Windows 8 isn’t doing too well, one of the several reasons for this was the big change they introduced in the form of Tiles which replaced Desktop Viewing. People don’t like changes, I’m not going to quote any song lyrics to justify my point, but just trust me on that. Thankfully, Microsoft was gracious enough to provide option to switch back to the Desktop Viewing. However, it is not enabled by Default. To make this default, open Internet Explorer in Desktop View, then go to the settings and under thePrograms tab, click on the dropdown box and select ‘Choose how you open links’ and click ‘Always in Internet Explorer on the desktop’. Save the settings.
Quickly share things with friends
If you are using Windows 8, there is an option in IE10 and 11 to share things right from the browser itself. You need to select the part you want to share with your friends, right click on it and it will give you an option to email the selected content to your friends. Provide their email IDs, and this should do it.
Add support for WebM files
Backed by Google, WebM is the new video standard in town. Though pretty slowly, many websites, including YouTube is implementing this new format. While many browsers have in-built support for the current crowned and WebM’s competition H.264, the new codec isn’t yet friends with all popular web browsers, including and especially Internet Explorer. However, if you want to add WebM playback functionality to Internet Explorer, you need to install this tool.
The clutter free web
If you don’t like bogus distracting elements such as adverts, sharing buttons, etc., which the web comes along, IE11 has something nice to offer. The new version has this option called “Reading View” which essentially takes all the sidetracking elements out of the page and changes the orientation of the article to make the reading experience even better. However, it is only available in IE11.
For those of you who are running any lower version of IE, there is something for you too. You can use Readability, which more or less does the same thing, and in addition, allows you to save articles for offline viewing as well.
Block advertisers from tracking you
If you are running IE10 or beta version of IE11, the good news is that your browser is already blocking many types of trackers. Both the versions have Microsoft’s Do Not Track service enabled which disables many websites from tracking your online activities. However, Microsoft doesn’t curate any lists of blocked websites. You can check out the popular Tracking Protection lists where many trustworthy companies have complied lists of sites that usually track you. You can click on the “+” button at the right side of the lists to add the list to your IE’s database. If you are still using IE8 or 9, you can download Abine Do Not Track Me utility for Internet Explorer which also protects your from trackers.
Add password management tool on your browser
With so many services online, it has become hard to keep track of passwords of all the accounts we manage. This is where password management software come in handy. If you don’t want to use a separate application for managing passwords and would rather have something built in the browser itself, Dashlane is a pretty nice pick. The software has both desktop clients as well as add-on and extensions. It prompts you to put the credential of the sites you frequently visit, and once saved, it automagically fills all the forms and credentials from there after. The app has recently implemented two factor authentication which strengthens its security.
Update your browser
The latest version of the browser IE11 will be shipping with Windows 8.1 next month. If you can’t wait to get your hands on it, Microsoft has made its preview build available on their website. The new version is faster, more secure, and is bursting with tons of new features. The browser has full support for touch and responsive devices, it canlevitate and lets you check more than one tab side-by-side at once. Additionally, unlike all its previous versions, IE11 lets you open “unlimited” tabs.
If your computer is running on Windows 7, you can download the browser from itsdownload page.
IE on Chrome
There is no denying that there are many websites – mostly government and education portals that work best on Internet Explorer. But if you have made your mind that no matter what you are not going to switch from Chrome, perhaps the below Chrome extension will help you stick to your plan.
IE Tab uses the in-built IE engine of your Operating System to render pages on Chrome. To run any website in IE mode, click on its icon from the extension bar (right next to address bar) and it will fire up a separate page for it. Additionally, you can also go to its settings (by right clicking on its icon) and add the websites you always want to be run in IE mode.


Thursday, September 12, 2013

Guide to advantages of .Net Framework

1.        What are the advantages of using .NET ?
Consistent Programming Model:
Different programming languages have different approaches for doing a task. For example, accessing data with a VB application and a VC++ application is totally different. A developer has to know bothdifferent techniques to do the task. In case of .NET Environment, for the same example, displaying data from database in a grid accessing data with a VB.NET and a C# is very similar except slight syntactical differences. Both the programs use the System.Data namespace, establish a connection with the database and run a query and displays the data on a data grid.

Language Independence:
Language Independence means the developer has the independence to code one module of an application in one language and other module of same application in other language. This language interoperability can help in code reuse and improve the efficiency of the development process.

No versioning Problem - Easy Application Deployment and Maintenance:
The .NET Framework makes deployment of applications easy. Commonly, to install an application all we need to do is, copy the application along with the components it requires into a directory on the computer. The .NET handles the details of locating and loading the components an application needs, even if several versions of the same application exist on the computer. The .NET ensures that all the components the application depends on are available on the computer before the application begins to run.

Improved Security:
The .NET Framework provides several mechanisms for protecting resources and code from unauthorized users:
·            ASP.NET Web Application Security provides a way to control access to a web site by comparing authenticated permissions with File System permissions for proper authorization.
·            Code access security uses permissions to control the code accessing protected resources and operations. The computer systems are protected from suspicious mobile code and provide a way to run mobile code to safely.
·            Role-based security provides information needed to make decisions about user’s permissions.

Support for Web Services:
Web services are remote databases and programs, which access other computers to read the data files. Web services provide many built in Base Class library facilities which open up a whole new world of information for users.

Dynamic Web:
Content that changes with the user and user preferences is an example of dynamic web content. Dynamic web content is easier to create with .NET. ASP.NET and Visual Studio.NET allow developers to create dynamic web much easier than IIS and ASP technologies.

Visual Studio.NET:

Visual Studio.NET is the Microsoft application and interface for programming in .NET. Visual Studio .NET provides all the programming advantages mentioned so far. This development environment has extensive set of ready to use controls, good debugging facilities, easy and simple programming features and vast set of .NET Base Classes.


1.        Explain different features of .NET.

2.        What is .NET ?
List the advantage of .NET frame work.

Consistent Programming Model:
Different programming languages have different approaches for doing a task. For example, accessing data with a VB application and a VC++ application is totally different. A developer has to know bothdifferent techniques to do the task. In case of .NET Environment, for the same example, displaying data from database in a grid accessing data with a VB.NET and a C# is very similar except slight syntactical differences. Both the programs use the System.Data namespace, establish a connection with the database and run a query and displays the data on a data grid.

Language Independence:
Language Independence means the developer has the independence to code one module of an application in one language and other module of same application in other language. This language interoperability can help in code reuse and improve the efficiency of the development process.

No versioning Problem - Easy Application Deployment and Maintenance:
The .NET Framework makes deployment of applications easy. Commonly, to install an application all we need to do is, copy the application along with the components it requires into a directory on the computer. The .NET handles the details of locating and loading the components an application needs, even if several versions of the same application exist on the computer. The .NET ensures that all the components the application depends on are available on the computer before the application begins to run.

Improved Security:
The .NET Framework provides several mechanisms for protecting resources and code from unauthorized users:
ASP.NET Web Application Security provides a way to control access to a web site by comparing authenticated permissions with File System permissions for proper authorization
·             Code access security uses permissions to control the code accessing protected resources and operations. The computer systems are protected from suspicious mobile code and provide a way to run mobile code to safely.
·             Role-based security provides information needed to make decisions about user’s permissions.

Support for Web Services:
Web services are remote databases and programs, which access other computers to read the data files. Web services provide many built in Base Class library facilities which open up a whole new world of information for users.

Dynamic Web:
Content that changes with the user and user preferences is an example of dynamic web content. Dynamic web content is easier to create with .NET. ASP.NET and Visual Studio.NET allow developers to create dynamic web much easier than IIS and ASP technologies.

Visual Studio.NET:

Visual Studio.NET is the Microsoft application and interface for programming in .NET. Visual Studio .NET provides all the programming advantages mentioned so far. This development environment has extensive set of ready to use controls, good debugging facilities, easy and simple programming features and vast set of .NET Base Classes.

1.        Explain .NET framework?
The .NET Framework is the foundation on which you can design, develop, and deploy applications. It is the core of the .NET infrastructure. It exists as a layer between the .NET applications and the underlying operating system. The .NET Framework encapsulates much of the basic functionality, such as debugging and security services, which was earlier built into various programming languages.

2.        What is unsafe code? Explain.

Unsafe code refers to the code that is processed with low security levels. There are situations where access to pointer types becomes a necessity. For example, interfacing with the underlying operating system, accessing a memory-mapped device, or implementing a time-critical algorithm may not be possible without access to pointers. To address this need, C# provides the ability to write unsafe code. In unsafe code, it is possible to declare and operate on pointers, to perform conversions between pointers and integral types, to take the address of variables, and so forth. In a sense, it is like writing C code within a C# program. Unsafe code must be clearly marked with the modifier unsafe, so developers cannot possibly use unsafe features accidentally. When CLR finds this unsafe modifier, the execution engine works to ensure that the unsafe code cannot be executed in an untrusted environment.

3.        Explain the following:

b) JIT compiler.
JIT compilation converts IL into its native machine code. The name JIT is because it compiles portion of code as and when required at runtime.



4.        How .NET remoting different from web services and DCOM ?
The differences between .NET Remoting and Web services are listed as follows:
·             ASP.NET based Web services can only be accessed over HTTP, whereas the .NET Remoting can be used across any protocol.
·             Web services work in a stateless environment where each request results in a new object created to service the request. .NET Remoting supports state management options and can identify multiple calls from the same client.
·             Web services serialize objects through XML contained in the SOAP messages and can thus only handle items that can be fully expressed in XML. .NET Remoting relies on the existence of the metadata within assemblies that contain information about data types. This limited metadata information is passed about an object, when it is passed by reference.
·             Web services support interoperability across platforms and are good for heterogeneous environments. .NET Remoting requires the clients to be by built using .NET, which means a homogeneous environment.
The difference between .NET Remoting and DCOM is listed as follows:
·             DCOM relies on a proprietary binary protocol that not all object models support. It also wants to communicate over a range of ports that are typically blocked by firewalls. However, .NET Remoting supports different transport protocol formats and communication protocols. This allows .NET Remoting to be adaptable to the network environment in which it is being used.
1.        Write a program in C# to display “Welcome to C Sharp”. Explain the program.
The C# program is as follows:
using System;
namespace ConsoleApplication1
{
class Welcome
{
                             static void Main()
                             {
                             System.Console.WriteLine("Welcome to C Sharp");
                             Console.Read();
}
}
}

The important points to be noted in this program are:
·             Main method: Program execution begins with the Main method.
·             Input and output: The WriteLine function displays the string on the standard output device.
·             Compilation and execution: To compile the program, enter the following command:
cscWelcome.cs
To execute the program, enter the following command:
Welcome

2.        How does C# supports multiple inheritance?
C# directly does not support multiple inheritance. But we can use this feature by using interface. Interface supports multiple inheritance.
interfaceIControl
{
void Paint();
}

interfaceITextBox: IControl //ITextBox inherits IControl
{
voidSetText(string text);
}

interfaceIListBox: IControl //IListBox inherits IControl
{
voidSetItems(string[] items);
}

interfaceIComboBox: ITextBox, IListBox {}
the interface IComboBox inherits from both ITextBox and IListBox. Classes and structs can implementmultiple interfaces.
1.        Define the following :
CLR, CTS, CLS, Intermediate language.
CLR:The CLR loads and executes the code. Code management is a fundamental principle of the runtime. It also provides services such as memory management, thread management, remoting, type safety, code security, and robustness.
CTS:The CTS is a standardized set of basic data types. This system provides a way to language interoperability. An object implemented in one .NET supported language can call an object implemented in another .NET supported language.
CLS: Common Language Specification (CLS) is a set of rules for basic language features that have been defined to enhance and ensure language interoperability.




2.        Give the classification of comman data type system.

3.        What is the function of CTS ? Explain the classification of types in CTS with a diagram.
The CTS defines how types are declared, used, and managed in the runtime. It is important for language interoperability. The CTS performs the following functions:
·             Establishes a common framework that enables cross-language integration, type safety, and high performance code execution.
·             Provides an object-oriented model.
·             Defines rules that languages must follow, so that different languages can interact with each other
CTS can be classified into:
·             Value types
·             Reference types
The following diagram illustrates type classification.
Value types directly store data in the variable. Value types can be built-in type, user-defined types, or enumerations.
Reference types store a reference to the data's memory address. Reference types can be self-describing types, pointer types, or interface types. Self-describing types are further split into arrays and class types. The class types are user-defined classes, boxed value types, and delegates.
All types derive from the System.Object base type


4.        What is operator overloading? Explain with an example.
Operator overloading refers to loading an operator to perform different operations on different data types on different contexts. To overload an operator in a class, one defines a method by using the 'operator' keyword.
The following program uses operator overloading to create a complex number class ComplexAdd that defines complex addition. The program displays the imaginary and the real parts of the numbers and the addition result using an override of the ToString method.
// complexAdd.cs
using System;
public struct ComplexAdd
{
public int r;
public int img;
public Complex(int r, int img)
   {
      this.r = r;
      this.img = img;
   }
   // Declare which operator to overload
public static ComplexAdd operator +(ComplexAdd c1, ComplexAdd c2)
   {
return new ComplexAdd(c1.r + c2.r, c1.img + c2.img);}
   // Override the ToString method to display a complex number in a required format:
public override string ToString()
   {
return(String.Format("{0} + {1}i", r, img));}
public static void Main()
   {
      ComplexAdd var1 = new ComplexAdd(5,3);
      Complex var2 = new Complex(6,2);
      // Add two Complex objects (var1 and var2) through the
      // overloaded plus operator:
      ComplexAdd total = var1 + var2;
     // Print the numbers and the sum using the overridden ToString method:
Console.WriteLine("First complex number:  {0}",var1);
Console.WriteLine("Second complex number: {0}",var2);
Console.WriteLine("The sum of the two numbers: {0}",total);}}
Output
First complex number: 5 + 3i
Second complex number: 6 + 2i
The sum of the two numbers: 11 + 5i