Author: Honey Singh
-

Creat a desktop icon to shutdown your computer
In order to shutdown your pc the key commands used are “shutdown -s -t 00” here
-

-
Microsoft Gets Religious About Data Anonymization
Before it plunges into the world of third-party advertising with the $6 billion purchase of aQuantive, Microsoft is getting its privacy ducks in a row. On July 23, the company called on the industry and the privacy community to work together on a common set of global privacy practices for data collection, use and protection…
-

5 Essential laptop security tips
Laptop theft is a huge problem. It is common nowadays to use a laptop to get work done away from your home or office. Unfortunately, the mobility and technology that make laptops so valuable also make them the target for theft around the world.If your laptop is stolen, company information can be exposed, as well…
-

How to SSH without password
Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks…
-

-

How to restore Linux Grub
Accidentally if GRUB of your dual-boot system with Linux and Windows was deleted either due to your monthly reinstall of Windows, and now you don’t see the linux bootloader anymore, so you can’t boot into Ubuntu or whatever flavor of linux you prefer.This is the easy way to re-enable Grub. Boot off the LiveCD Type…
-

IIT Site Hacked
 Once again the history repeated itself….. Last Night web site of worlds premier Institute of technology has been hacked. Yes I’m talking about IIT Kanpur which was ranked no 1 in the recent ranking by India Today magzine.Now The question arises Who is that person who beated the best technocrats of this world. It…
-

-
Student use ipod for cheating after Mobile.
Tehnology have its own loopholes.Where technology goes, cheating soon follows in the classroom. Many schools long ago banned cell phones after discovering that answers could come via text messages. And now the underhanded have turned to iPods, recording answers and then listening to them as they have an exam in front of them.About month ago…
