<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5123538834487374058</id><updated>2024-09-01T20:37:33.657-07:00</updated><category term="Tips and Tweaks"/><category term="Windows"/><category term="Hacks"/><category term="Networks"/><category term="Antivirus"/><category term="Certifications"/><category term="VPN"/><category term="CCNA"/><category term="Cisco"/><title type='text'>Problem Solver</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>15</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-3517524387130290354</id><published>2009-07-07T01:12:00.000-07:00</published><updated>2009-07-07T01:31:49.296-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CCNA"/><category scheme="http://www.blogger.com/atom/ns#" term="Certifications"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><title type='text'>Self Study CCNA in 5 Days</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://i603.photobucket.com/albums/tt120/problemsolverpc/img_CCNA.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 500px; height: 425px;&quot; src=&quot;http://i603.photobucket.com/albums/tt120/problemsolverpc/img_CCNA.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Cisco Certified Network Associate (CCNA)&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;, a certification which is the basic or the fundamental one in Network Career. Many of them go to a Institute for training themselves in this. But there are people who still try to study on their own. This post is for those people.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Every certification needs some hard work and concentration to complete them. You can study the entire syllabus and curriculum of &lt;span style=&quot;font-weight:bold;&quot;&gt;CCNA&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt; in just five days. Yes, it is possible.&lt;br /&gt;&lt;br /&gt;Here are the links given for each separate day. Download the files and start your self study right away.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5506732/CCNA-Day1.pdf.html&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CCNA Day 1&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5506888/CCNA-Day2.pdf.html&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CCNA Day 2&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5506887/CCNA-Day3.pdf.html&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CCNA Day 3&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5506890/CCNA-Day4.pdf.html&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CCNA Day 4&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5506889/CCNA-Day5.pdf.html&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CCNA Day 5&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Note : These are no replacement for your Study Materials or Books or Videos or Simulators or Dumps or Training. These are just used to support your study for CCNA.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/3517524387130290354/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/07/self-study-ccna-in-5-days.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/3517524387130290354'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/3517524387130290354'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/07/self-study-ccna-in-5-days.html' title='Self Study CCNA in 5 Days'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-8794664861924360826</id><published>2009-05-12T08:36:00.000-07:00</published><updated>2009-05-12T08:39:19.763-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><title type='text'>Computer Abbreviations</title><content type='html'>Here is the list of Computer Abbreviations especially for Newbies and Computer Enthusiasts. It is always good to know them all&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;--- A ---&lt;br /&gt;&lt;br /&gt;ADSL - Asymmetric Digital Subscriber Line&lt;br /&gt;AGP - Accelerated Graphics Port&lt;br /&gt;ALI - Acer Labs, Incorporated&lt;br /&gt;ALU - Arithmetic Logic Unit&lt;br /&gt;AMD - Advanced Micro Devices&lt;br /&gt;APC - American Power Conversion&lt;br /&gt;ASCII - American Standard Code for Information Interchange&lt;br /&gt;ASIC - Application Specific Integrated Circuit&lt;br /&gt;ASPI - Advanced SCSI Programming Interface&lt;br /&gt;AT - Advanced Technology&lt;br /&gt;ATI - ATI Technologies Inc.&lt;br /&gt;ATX - Advanced Technology Extended&lt;br /&gt;&lt;br /&gt;--- B ---&lt;br /&gt;BFG - BFG Technologies&lt;br /&gt;BIOS - Basic Input Output System&lt;br /&gt;BNC - Barrel Nut Connector&lt;br /&gt;&lt;br /&gt;--- C ---&lt;br /&gt;CAS - Column Address Signal&lt;br /&gt;CD - Compact Disk&lt;br /&gt;CDR - Compact Disk Recorder&lt;br /&gt;CDRW - Compact Disk Re-Writer&lt;br /&gt;CD-ROM - Compact Disk - Read Only Memory&lt;br /&gt;CFM - Cubic Feet per Minute&lt;br /&gt;CMOS - Complementary Metal Oxide Semiconductor&lt;br /&gt;CPU - Central Processing Unit&lt;br /&gt;CTX - CTX Technology Corporation (Commited to Excellence)&lt;br /&gt;&lt;br /&gt;--- D ---&lt;br /&gt;&lt;br /&gt;DDR - Double Data Rate&lt;br /&gt;DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory&lt;br /&gt;DFI - DFI Inc. (Design for Innovation)&lt;br /&gt;DIMM - Dual Inline Memory Module&lt;br /&gt;DRAM - Dynamic Random Access Memory&lt;br /&gt;DPI - Dots Per Inch&lt;br /&gt;DSL - See ASDL&lt;br /&gt;DVD - Digital Versatile Disc&lt;br /&gt;DVD-RAM - Digital Versatile Disk - Random Access Memory&lt;br /&gt;&lt;br /&gt;--- E ---&lt;br /&gt;ECC - Error Correction Code&lt;br /&gt;ECS - Elitegroup Computer Systems&lt;br /&gt;EDO - Extended Data Out&lt;br /&gt;EEPROM - Electrically Erasable Programmable Read-Only Memory&lt;br /&gt;EPROM - Erasable Programmable Read-Only Memory&lt;br /&gt;EVGA - EVGA Corporation&lt;br /&gt;&lt;br /&gt;--- F ---&lt;br /&gt;FC-PGA - Flip Chip Pin Grid Array&lt;br /&gt;FDC - Floppy Disk Controller&lt;br /&gt;FDD - Floppy Disk Drive&lt;br /&gt;FPS - Frame Per Second&lt;br /&gt;FPU - Floating Point Unit&lt;br /&gt;FSAA - Full Screen Anti-Aliasing&lt;br /&gt;FS - For Sale&lt;br /&gt;FSB - Front Side Bus&lt;br /&gt;&lt;br /&gt;--- G ---&lt;br /&gt;GB - Gigabytes&lt;br /&gt;GBps - Gigabytes per second or Gigabits per second&lt;br /&gt;GDI - Graphical Device Interface&lt;br /&gt;GHz - GigaHertz&lt;br /&gt;&lt;br /&gt;--- H ---&lt;br /&gt;HDD - Hard Disk Drive&lt;br /&gt;HIS - Hightech Information System Limited&lt;br /&gt;HP - Hewlett-Packard Development Company&lt;br /&gt;HSF - Heatsink-Fan&lt;br /&gt;&lt;br /&gt;--- I ---&lt;br /&gt;IBM - International Business Machines Corporation&lt;br /&gt;IC - Integrated Circuit&lt;br /&gt;IDE - Integrated Drive Electronics&lt;br /&gt;IFS- Item for Sale&lt;br /&gt;IRQ - Interrupt Request&lt;br /&gt;ISA - Industry Standard Architecture&lt;br /&gt;ISO - International Standards Organization&lt;br /&gt;&lt;br /&gt;--- J ---&lt;br /&gt;JBL - JBL (Jame B. Lansing) Speakers&lt;br /&gt;JVC - JVC Company of America&lt;br /&gt;&lt;br /&gt;- K ---&lt;br /&gt;Kbps - Kilobits Per Second&lt;br /&gt;KBps - KiloBytes per second&lt;br /&gt;&lt;br /&gt;--- L ---&lt;br /&gt;LG - LG Electronics&lt;br /&gt;LAN - Local Area Network&lt;br /&gt;LCD - Liquid Crystal Display&lt;br /&gt;LDT - Lightning Data Transport&lt;br /&gt;LED - Light Emitting Diode&lt;br /&gt;&lt;br /&gt;--- M ---&lt;br /&gt;MAC - Media Access Control&lt;br /&gt;MB - MotherBoard or Megabyte&lt;br /&gt;MBps - Megabytes Per Second&lt;br /&gt;Mbps - Megabits Per Second or Megabits Per Second&lt;br /&gt;MHz - MegaHertz&lt;br /&gt;MIPS - Million Instructions Per Second&lt;br /&gt;MMX - Multi-Media Extensions&lt;br /&gt;MSI - Micro Star International&lt;br /&gt;&lt;br /&gt;--- N ---&lt;br /&gt;NAS - Network Attached Storage&lt;br /&gt;NAT - Network Address Translation&lt;br /&gt;NEC - NEC Corporation&lt;br /&gt;NIC - Network Interface Card&lt;br /&gt;&lt;br /&gt;--- O ---&lt;br /&gt;OC - Overclock (Over Clock)&lt;br /&gt;OCZ - OCZ Technology&lt;br /&gt;OEM - Original Equipment Manufacturer&lt;br /&gt;&lt;br /&gt;--- P ---&lt;br /&gt;PC - Personal Computer&lt;br /&gt;PCB - Printed Circuit Board&lt;br /&gt;PCI - Peripheral Component Interconnect&lt;br /&gt;PDA - Personal Digital Assistant&lt;br /&gt;PCMCIA - Peripheral Component Microchannel Interconnect Architecture&lt;br /&gt;PGA - Professional Graphics Array&lt;br /&gt;PLD - Programmable Logic Device&lt;br /&gt;PM - Private Message / Private Messaging&lt;br /&gt;PnP - Plug &#39;n Play&lt;br /&gt;PNY - PNY Technology&lt;br /&gt;POST - Power On Self Test&lt;br /&gt;PPPoA - Point-to-Point Protocol over ATM&lt;br /&gt;PPPoE - Point-to-Point Protocol over Ethernet&lt;br /&gt;PQI - PQI Corporation&lt;br /&gt;PSU - Power Supply Unit&lt;br /&gt;&lt;br /&gt;--- R ---&lt;br /&gt;RAID - Redundant Array of Inexpensive Disks&lt;br /&gt;RAM - Random Access Memory&lt;br /&gt;RAMDAC - Random Access Memory Digital Analog Convertor&lt;br /&gt;RDRAM - Rambus Dynamic Random Access Memory&lt;br /&gt;ROM - Read Only Memory&lt;br /&gt;RPM - Revolutions Per Minute&lt;br /&gt;&lt;br /&gt;--- S ---&lt;br /&gt;SASID - Self-scanned Amorphous Silicon Integrated Display&lt;br /&gt;SCA - SCSI Configured Automatically&lt;br /&gt;SCSI - Small Computer System Interface&lt;br /&gt;SDRAM - Synchronous Dynamic Random Access Memory&lt;br /&gt;SECC - Single Edge Contact Connector&lt;br /&gt;SODIMM - Small Outline Dual Inline Memory Module&lt;br /&gt;SPARC - Scalable Processor ArChitecture&lt;br /&gt;SOHO - Small Office Home Office&lt;br /&gt;SRAM - Static Random Access Memory&lt;br /&gt;SSE - Streaming SIMD Extensions&lt;br /&gt;SVGA - Super Video Graphics Array&lt;br /&gt;S/PDIF - Sony/Philips Digital Interface&lt;br /&gt;&lt;br /&gt;--- T ---&lt;br /&gt;TB - Terabytes&lt;br /&gt;TBps - Terabytes per second&lt;br /&gt;Tbps - Terabits per second&lt;br /&gt;TDK - TDK Electronics&lt;br /&gt;TEC - Thermoelectric Cooler&lt;br /&gt;TPC - TipidPC&lt;br /&gt;TWAIN - Technology Without An Important Name&lt;br /&gt;&lt;br /&gt;--- U ---&lt;br /&gt;UART - Universal Asynchronous Receiver/Transmitter&lt;br /&gt;USB - Universal seri@l Bus&lt;br /&gt;UTP - Unshieled Twisted Pair&lt;br /&gt;&lt;br /&gt;--- V ---&lt;br /&gt;VCD - Video CD&lt;br /&gt;VPN - Virtual Private Network&lt;br /&gt;&lt;br /&gt;--- W ---&lt;br /&gt;WAN - Wide Area Network&lt;br /&gt;WTB - Want to Buy&lt;br /&gt;WYSIWYG - What You See Is What You Get&lt;br /&gt;&lt;br /&gt;--- X ---&lt;br /&gt;XGA - Extended Graphics Array&lt;br /&gt;XFX - XFX Graphics, a Division of Pine&lt;br /&gt;XMS - Extended Memory Specification&lt;br /&gt;XT - Extended Technology</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/8794664861924360826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/05/computer-abbreviations.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/8794664861924360826'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/8794664861924360826'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/05/computer-abbreviations.html' title='Computer Abbreviations'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-9132547435520728887</id><published>2009-05-12T08:19:00.000-07:00</published><updated>2009-05-12T08:31:46.670-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>How to remove Dont Send Error Report?</title><content type='html'>Got fed up on receiving the Send/Dont Send Error Report????&lt;br /&gt;&lt;br /&gt;Dont worry it is a easy task to disable this feature&lt;br /&gt;&lt;br /&gt;Go to Control Panel---&gt;Performance and Maintenance---&gt;System---&gt;Advanced Tab---&gt;&lt;br /&gt;Click on Error Reporting button--&gt;Select Disable Error Reporting and Click OK&lt;br /&gt;&lt;br /&gt;If some of you do not have the Performance and Maintenance Option in the Control Panel, then go to the System Properties and there click the Advanced Tab and then click on Error Reporting button to disable the feature. To open the System properties right click the My Computer and click Properties or double click System option present in the Control Panel.&lt;br /&gt;&lt;br /&gt;Your are done!!!!&lt;br /&gt;&lt;br /&gt;Now you are free from the error reporting.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/9132547435520728887/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/05/how-to-remove-dont-send-error-report.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/9132547435520728887'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/9132547435520728887'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/05/how-to-remove-dont-send-error-report.html' title='How to remove Dont Send Error Report?'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-6754970541253876116</id><published>2009-03-20T05:40:00.000-07:00</published><updated>2009-03-20T05:48:56.558-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>All Run Commands in Windows XP</title><content type='html'>Ever felt lazy on searching for an application to open and work on it. Well if so then you can use the following run commands in your Run dialog box and then open the application as soon as possible.&lt;br /&gt;&lt;br /&gt;You can access all these programs by going through &lt;span style=&quot;font-weight:bold;&quot;&gt;START/RUN&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;  SQL Client Configuration - cliconfg&lt;br /&gt;  System Configuration Editor - sysedit&lt;br /&gt;  System Configuration Utility - msconfig&lt;br /&gt;  System File Checker Utility (Scan Immediately)- sfc /scannow&lt;br /&gt;  System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce&lt;br /&gt;  System File Checker Utility (Scan On Every Boot) - sfc /scanboot&lt;br /&gt;  System File Checker Utility (Return to Default Setting)- sfc /revert&lt;br /&gt;  System File Checker Utility (Purge File Cache)- sfc /purgecache&lt;br /&gt;  System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x&lt;br /&gt;  System Information - msinfo32.&lt;br /&gt;  Task Manager – taskmgr&lt;br /&gt;  System Properties - sysdm.cpl&lt;br /&gt;  Task Manager – taskmgr&lt;br /&gt;  TCP Tester - tcptest&lt;br /&gt;  Telnet Client - telnet&lt;br /&gt;  Tweak UI (if installed) - tweakui&lt;br /&gt;  User Account Management- nusrmgr.cpl&lt;br /&gt;  Utility Manager - utilman&lt;br /&gt;  Windows Address Book - wab&lt;br /&gt;  Windows Address Book Import Utility - wabmig&lt;br /&gt;  Windows Backup Utility (if installed)- ntbackup&lt;br /&gt;  Windows Explorer - explorer&lt;br /&gt;  Windows Firewall- firewall.cpl&lt;br /&gt;  Windows Magnifier- magnify&lt;br /&gt;  Windows Management Infrastructure - wmimgmt.msc&lt;br /&gt;  Windows Media Player - wmplayer&lt;br /&gt;  Windows Messenger - msmsgs&lt;br /&gt;  Windows Picture Import Wizard (need camera connected)- wiaacmgr&lt;br /&gt;  Windows System Security Tool – syskey&lt;br /&gt;  Windows Update Launches - wupdmgr&lt;br /&gt;  Windows Version (to show which version of windows)- winver&lt;br /&gt;  Windows XP Tour Wizard - tourstart&lt;br /&gt;  Wordpad - write&lt;br /&gt;  Password Properties - password.cpl&lt;br /&gt;  Performance Monitor - perfmon.msc&lt;br /&gt;  Phone and Modem Options - telephon.cpl&lt;br /&gt;  Phone Dialer - dialer&lt;br /&gt;  Pinball Game - pinball&lt;br /&gt;  Power Configuration - powercfg.cpl&lt;br /&gt;  Printers and Faxes - control printers&lt;br /&gt;  Printers Folder – printers&lt;br /&gt;  Private Character Editor - eudcedit&lt;br /&gt;  Quicktime (If Installed)- QuickTime.cpl&lt;br /&gt;  Real Player (if installed)- realplay&lt;br /&gt;  Regional Settings - intl.cpl&lt;br /&gt;  Registry Editor - regedit&lt;br /&gt;  Registry Editor - regedit32&lt;br /&gt;  Remote Access Phonebook - rasphone&lt;br /&gt;  Remote Desktop - mstsc&lt;br /&gt;  Removable Storage - ntmsmgr.msc&lt;br /&gt;  Removable Storage Operator Requests - ntmsoprq.msc&lt;br /&gt;  Resultant Set of Policy (XP Prof) - rsop.msc&lt;br /&gt;  Scanners and Cameras - sticpl.cpl&lt;br /&gt;  Scheduled Tasks - control schedtasks&lt;br /&gt;  Security Center - wscui.cpl&lt;br /&gt;  Services - services.msc&lt;br /&gt;  Shared Folders - fsmgmt.msc&lt;br /&gt;  Shuts Down Windows - shutdown&lt;br /&gt;  Sounds and Audio - mmsys.cpl&lt;br /&gt;  Spider Solitare Card Game - spider&lt;br /&gt;  Malicious Software Removal Tool - mrt&lt;br /&gt;  Microsoft Access (if installed) - access.cpl&lt;br /&gt;  Microsoft Chat - winchat&lt;br /&gt;  Microsoft Excel (if installed) - excel&lt;br /&gt;  Microsoft Frontpage (if installed)- frontpg&lt;br /&gt;  Microsoft Movie Maker - moviemk&lt;br /&gt;  Microsoft Paint - mspaint&lt;br /&gt;  Microsoft Powerpoint (if installed)- powerpnt&lt;br /&gt;  Microsoft Word (if installed)- winword&lt;br /&gt;  Microsoft Syncronization Tool - mobsync&lt;br /&gt;  Minesweeper Game - winmine&lt;br /&gt;  Mouse Properties - control mouse&lt;br /&gt;  Mouse Properties - main.cpl&lt;br /&gt;  Nero (if installed)- nero&lt;br /&gt;  Netmeeting - conf&lt;br /&gt;  Network Connections - control netconnections&lt;br /&gt;  Network Connections - ncpa.cpl&lt;br /&gt;  Network Setup Wizard - netsetup.cpl&lt;br /&gt;  Notepad - notepad&lt;br /&gt;  Nview Desktop Manager (If Installed)- nvtuicpl.cpl&lt;br /&gt;  Object Packager - packager&lt;br /&gt;  ODBC Data Source Administrator- odbccp32.cpl&lt;br /&gt;  On Screen Keyboard - osk&lt;br /&gt;  Opens AC3 Filter (If Installed) - ac3filter.cpl&lt;br /&gt;  Outlook Express - msimn&lt;br /&gt;  Paint – pbrush&lt;br /&gt;  Keyboard Properties - control keyboard&lt;br /&gt;  IP Configuration (Display Connection Configuration) - ipconfi/all&lt;br /&gt;  IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns&lt;br /&gt;  IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns&lt;br /&gt;  IP Configuration (Release All Connections)- ipconfig /release&lt;br /&gt;  IP Configuration (Renew All Connections)- ipconfig /renew&lt;br /&gt;  IP Configuration(RefreshesDHCP&amp;Re-RegistersDNS)-ipconfig/registerdns&lt;br /&gt;  IP Configuration (Display DHCP Class ID)- ipconfig/showclassid&lt;br /&gt;  IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid&lt;br /&gt;  Java Control Panel (If Installed)- jpicpl32.cpl&lt;br /&gt;  Java Control Panel (If Installed)- javaws&lt;br /&gt;  Local Security Settings - secpol.msc&lt;br /&gt;  Local Users and Groups - lusrmgr.msc&lt;br /&gt;  Logs You Out Of Windows - logoff.....&lt;br /&gt;  Accessibility Controls - access.cpl&lt;br /&gt;  Accessibility Wizard - accwiz&lt;br /&gt;  Add Hardware - Wizardhdwwiz.cpl&lt;br /&gt;  Add/Remove Programs - appwiz.cpl&lt;br /&gt;  Administrative Tools control - admintools&lt;br /&gt;  Adobe Acrobat (if installed) - acrobat&lt;br /&gt;  Adobe Designer (if installed)- acrodist&lt;br /&gt;  Adobe Distiller (if installed)- acrodist&lt;br /&gt;  Adobe ImageReady (if installed)- imageready&lt;br /&gt;  Adobe Photoshop (if installed)- photoshop&lt;br /&gt;  Automatic Updates - wuaucpl.cpl&lt;br /&gt;  Bluetooth Transfer Wizard – fsquirt&lt;br /&gt;  Calculator - calc&lt;br /&gt;  Certificate Manager - certmgr.msc&lt;br /&gt;  Character Map - charmap&lt;br /&gt;  Check Disk Utility - chkdsk&lt;br /&gt;  Clipboard Viewer - clipbrd&lt;br /&gt;  Command Prompt - cmd&lt;br /&gt;  Component Services - dcomcnfg&lt;br /&gt;  Computer Management - compmgmt.msc&lt;br /&gt;  Control Panel - control&lt;br /&gt;  Date and Time Properties - timedate.cpl&lt;br /&gt;  DDE Shares - ddeshare&lt;br /&gt;  Device Manager - devmgmt.msc&lt;br /&gt;  Direct X Control Panel (If Installed)- directx.cpl&lt;br /&gt;  Direct X Troubleshooter- dxdiag&lt;br /&gt;  Disk Cleanup Utility- cleanmgr&lt;br /&gt;  Disk Defragment- dfrg.msc&lt;br /&gt;  Disk Management- diskmgmt.msc&lt;br /&gt;  Disk Partition Manager- diskpart&lt;br /&gt;  Display Properties- control desktop&lt;br /&gt;  Display Properties- desk.cpl&lt;br /&gt;  Display Properties (w/Appearance Tab Preselected)- control color&lt;br /&gt;  Dr. Watson System Troubleshooting Utility- drwtsn32&lt;br /&gt;  Driver Verifier Utility- verifier&lt;br /&gt;  Event Viewer- eventvwr.msc&lt;br /&gt;  Files and Settings Transfer Tool- migwiz&lt;br /&gt;  File Signature Verification Tool- sigverif&lt;br /&gt;  Findfast- findfast.cpl&lt;br /&gt;  Firefox (if installed)- firefox&lt;br /&gt;  Folders Properties- control folders&lt;br /&gt;  Fonts- control fonts&lt;br /&gt;  Fonts Folder- fonts&lt;br /&gt;  Free Cell Card Game- freecell&lt;br /&gt;  Game Controllers- joy.cpl&lt;br /&gt;  Group Policy Editor (XP Prof)- gpedit.msc&lt;br /&gt;  Hearts Card Game- mshearts&lt;br /&gt;  Help and Support- helpctr&lt;br /&gt;  HyperTerminal- hypertrm&lt;br /&gt;  Iexpress Wizard- iexpress&lt;br /&gt;  Indexing Service- ciadv.msc&lt;br /&gt;  Internet Connection Wizard- icwconn1&lt;br /&gt;  Internet Explorer- iexplore&lt;br /&gt;  Internet Setup Wizard- inetwiz&lt;br /&gt;  Internet Properties- inetcpl.cpl</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/6754970541253876116/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/all-run-commands-in-windows-xp.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/6754970541253876116'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/6754970541253876116'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/all-run-commands-in-windows-xp.html' title='All Run Commands in Windows XP'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-7649061250709066542</id><published>2009-03-20T05:25:00.000-07:00</published><updated>2009-03-20T05:38:48.465-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antivirus"/><title type='text'>Remove Brontok Virus Manually</title><content type='html'>Here we will see on how to remove the most sticky virus &quot;&lt;span style=&quot;font-weight:bold;&quot;&gt;BRONTOK&lt;/span&gt;&quot;. Nowadays this is the virus that is found in most of the systems. It makes the Registry Editor (Regedit) disabled, it disables the Hidden folders and files option and it also sometimes disables the Task Manager.&lt;br /&gt;&lt;br /&gt;The process for removing the brontok virus is simpler and without relying on any anti-virus softwares, we can remove the virus manually. &lt;br /&gt;&lt;br /&gt;The procedure to do so :&lt;br /&gt;&lt;br /&gt;1. Open the computer using Safe Mode with Command prompt and give the following two commands&lt;br /&gt;&lt;br /&gt;reg delete HKCU\software\microsoft\windows\currentversion\policies\system /v &quot;DisableRegistryTools&quot;&lt;br /&gt;&lt;br /&gt;run HKLM\software\microsoft\windows\currentversion\policies\system /v &quot;DisableRegistryTools&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now these two commands makes your registry editor enabled using which we will finish up the task.&lt;br /&gt;&lt;br /&gt;2. Now go to Run and type regedit and hit enter.&lt;br /&gt;&lt;br /&gt;3.Now follow the path&lt;br /&gt;HKLM\Software\Microsoft\Windows\Currentversion\Run&lt;br /&gt;&lt;br /&gt;and delete the entries in the right side of the screen having keywords &quot;Brontok&quot; or &quot;Tok&quot;.&lt;br /&gt;&lt;br /&gt;Now the virus is deleted but we have to make the folder options enabled.&lt;br /&gt;&lt;br /&gt;4. Restart the system, open the registry editor and follow the path&lt;br /&gt;&lt;br /&gt;HKCU\Software\Microsoft\Windows\Currentversion\Policies\Explorer\ &#39;NoFolderOption&#39;&lt;br /&gt;&lt;br /&gt;and delete this entry.&lt;br /&gt;&lt;br /&gt;To be on the safe side search your computer with the name *.exe and do remember to include the hidden files option and delete the search results which has as a Folder Icon.&lt;br /&gt;&lt;br /&gt;Now your system is free from Brontok Virus.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/7649061250709066542/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/remove-brontok-virus-manually.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/7649061250709066542'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/7649061250709066542'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/remove-brontok-virus-manually.html' title='Remove Brontok Virus Manually'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-482667385468515049</id><published>2009-03-19T09:38:00.000-07:00</published><updated>2009-03-19T09:46:16.373-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><title type='text'>Trace International Mobile Numbers - Worldwide</title><content type='html'>We have already seen on how to trace the mobile numbers in India.&lt;br /&gt;&lt;br /&gt;There was a big thought by the users on  how the database was maintained for such a large country like India. Still the question is unanswered.But as the users were gazed, more tricks came.&lt;br /&gt;&lt;br /&gt;I saw this website which was capable of tracing mobilenumbers worldwide. This website is used for resolving any telephone number to its geographical location. Be it any country, any state and any city. It is possible to trace the mobile number from where it was originated and it also displays the Operator of the number.&lt;br /&gt;&lt;br /&gt;Click on the following link to trace the numbers &lt;br /&gt;&lt;a href=&quot;http://www.tp2location.com&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Trace the Mobile Numbers - International&lt;/span&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Disclaimer :&lt;/span&gt; Sharing the precise name and address details of mobile number is crime . It is against the privacy law. Land lines are more associated to houses or organizations, where as Mobile is very personal. The purpose of this tool is to give you some directions of location of mobile, so that if you call the person, you know how you&#39;ll be billed. Or you could recall the person by knowing the state and operator.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/482667385468515049/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/trace-international-mobile-numbers.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/482667385468515049'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/482667385468515049'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/trace-international-mobile-numbers.html' title='Trace International Mobile Numbers - Worldwide'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-8438980633956413729</id><published>2009-03-02T08:27:00.000-08:00</published><updated>2009-03-02T08:41:27.082-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><title type='text'>Find Invisible People in Gtalk, Yahoo Messenger</title><content type='html'>This is one of the most common trick which you would find in the Internet. But the trick wasn&#39;t available for Gtalk(Google Talk) for a long time. And soon after it was released too not many people knew the method to find out their friends who are invisible in the Chat list.&lt;br /&gt;&lt;br /&gt;Well, the methods are pretty simple and they can be done by anyone .&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;GTalk (Google Talk)&lt;/span&gt;&lt;br /&gt;1. Open the Chat window of the particular User on whom you want to find whether he/she is invisible.&lt;br /&gt;2. Now Click on Option and Select the &#39;Go off the Record&#39; option.&lt;br /&gt;3. Now type some message and send it.&lt;br /&gt;4. Now here is the trick, if you get a response &quot;User is Offline and can&#39;t receive messages&quot; in red font colour, then it means your victim is really offline.&lt;br /&gt;5. If you dont get a response, it means your friend is in invisible mode and you are now ready to disturb them.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Yahoo Messenger&lt;/span&gt;&lt;br /&gt; Well it is really easy to find out the same in Yahoo Messenger.&lt;br /&gt;1. Open the Chat window of the particular User on whom you want to find whether he/she is invisible.&lt;br /&gt;2. Now load the IMvironment &quot;Doodle&quot; and please wait since the IMvironment takes some time to load which depends on you connection speed.&lt;br /&gt;3. Now if the Imvironemnt loads then the user is online.&lt;br /&gt;&lt;br /&gt;These are tricks for checking the invisible people in Gtalk and Yahoo Messenger.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/8438980633956413729/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/find-invisible-people-in-gtalk-yahoo.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/8438980633956413729'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/8438980633956413729'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/find-invisible-people-in-gtalk-yahoo.html' title='Find Invisible People in Gtalk, Yahoo Messenger'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-4325066706255263767</id><published>2009-03-01T04:25:00.000-08:00</published><updated>2009-03-01T05:28:38.426-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Certifications"/><title type='text'>Certifications</title><content type='html'>In the current situation where the recession plays an important role, the job market has found his dark shadow and for the freshers it is a night mare to enter the corporate IT World. So what are the other options available to them????&lt;br /&gt;&lt;br /&gt;Well they have to update themselves with the upcoming technology and platforms and the factor which tells that they are in form is the Certifications.&lt;br /&gt;&lt;br /&gt;Certifications play an important role in each and every body&#39;s profile. Say you are certified in something it means you have gone through the platform earlier and you are familiar with it and thus it reduces the company&#39;s training expenditure and you have a additional chance of getting recruited.&lt;br /&gt;&lt;br /&gt;There are enormous amount of Certifications available for the aspirants and they can specialize them in which domain they need to be. And there are World Class Vendors which provides the Certifications. The Certifications not only helps you to fetch up a job but it also enhances your knowledge and your career options.&lt;br /&gt;&lt;br /&gt;Some of the vendors are Sun, Cisco, Microsft, HP, IBM etc.&lt;br /&gt;&lt;br /&gt;We will be concentrating on Cisco and Microsoft.&lt;br /&gt;&lt;br /&gt;The Certifications available from Microsoft are : &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCTS&lt;/span&gt;&lt;br /&gt;Microsoft Certified Technology Specialist (MCTS) certifications enable professionals to target specific technologies and to distinguish themselves by demonstrating in-depth knowledge and expertise in Microsoft specialized technologies.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCITP&lt;/span&gt;&lt;br /&gt;Microsoft Certified IT Professional (MCITP) certifications demonstrate comprehensive skills in planning, deploying, supporting, maintaining, and optimizing IT infrastructures.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCPD&lt;/span&gt;&lt;br /&gt;Microsoft Certified Professional Developer (MCPD) certifications demonstrate comprehensive skills in designing, developing, and deploying applications for a particular job role. These certifications show that you have the skills required to perform the job successfully. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Microsoft Certified Architect Program&lt;/span&gt;&lt;br /&gt;The Microsoft Certified Architect program recognizes and provides advanced certification to practicing architects in an enterprise setting.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Microsoft Certified Master Program&lt;/span&gt; &lt;br /&gt;The Microsoft Certified Master program enables experienced IT professionals to demonstrate and validate their ability to successfully design and implement solutions that meet the most complex business requirements.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCDST&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Desktop Support Technician (MCDST) demonstrates technical and customer service skills in troubleshooting hardware and software operation issues in Microsoft Windows environments. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCLC&lt;/span&gt;&lt;br /&gt;The Microsoft Certified Learning Consultant (MCLC) credential recognizes Microsoft Certified Trainers (MCTs) whose job roles have grown to include frequent consultative engagements with customers. These MCTs are experts in designing and delivering customized learning solutions. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCSA&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Systems Administrator (MCSA) administers network and systems environments based on the Windows operating systems. Specializations include the MCSA: Messaging and the MCSA: Security. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCSE&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Systems Engineer (MCSE) designs and implements an infrastructure solution that is based on the Windows operating system and Windows Server System software. Specializations include the MCSE: Messaging and the MCSE: Security. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCDBA&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Database Administrator (MCDBA) designs, implements, and administers Microsoft SQL Server databases.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCT&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Trainer (MCT) is a qualified instructor who is certified by Microsoft to deliver Microsoft training courses to IT professionals and developers. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCAD&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Application Developer (MCAD) uses Microsoft technologies to develop and maintain department-level applications, components, Web or desktop clients, or back-end data services. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCSD&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Solution Developer (MCSD) designs and develops leading-edge business solutions with Microsoft development tools, technologies, platforms, and the Windows operating system. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Microsoft Certified Business Solutions Specialist&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Business Management Solutions Specialist demonstrates proficiency with Microsoft Dynamics and related business products. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Microsoft Certified Business Management Solutions Professional&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Business Management Solutions Professional demonstrates professional proficiency with Microsoft Dynamics in one of three knowledge areas: applications, developer, or installation and configuration. &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;br /&gt;MOS&lt;/span&gt;&lt;br /&gt;A Microsoft Office Specialist (Office Specialist) is globally recognized for demonstrating advanced skills in using Microsoft desktop software.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MCAS&lt;/span&gt;&lt;br /&gt;A Microsoft Certified Application Specialist (MCAS) has advanced business skills with the 2007 Microsoft Office system and Windows Vista.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CISCO&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now as far as Cisco is concerned there are 4 levels of certifications Entry, Associate, Professional and Expert with seven different paths.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i603.photobucket.com/albums/tt120/problemsolverpc/cisco.jpg&quot;&gt;&lt;br /&gt;&lt;br /&gt;And similarly there are a lot of vendors offering a lot of Certifications, we will see all of them as the time passes.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/4325066706255263767/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/certifications.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/4325066706255263767'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/4325066706255263767'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/03/certifications.html' title='Certifications'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-7590640460631994846</id><published>2009-02-24T08:59:00.000-08:00</published><updated>2009-02-24T09:12:40.894-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Google Search Engine</title><content type='html'>Google is world’s most popular and powerful search engine which has the ability to accept pre-defined commands as input and produce unbelievable results. This enables malicious users like hackers, crackers, and script kiddies etc to use Google search engine extensively to gather confidential or sensitive information which is not visible through common searches.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Google’s Advance Search Query Syntaxes&lt;br /&gt;&lt;br /&gt;Below discussed are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for critical information digging.&lt;br /&gt;&lt;br /&gt;[ intitle: ]&lt;br /&gt;&lt;br /&gt;The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title. For example, “intitle: Windows XP&quot; (without quotes) will return links to those pages that has the word &quot;Windows&quot; in their title, and the word &quot;XP&quot; anywhere in the page.&lt;br /&gt;&lt;br /&gt;Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle” to get the list of pages containing all those words in its title. For example using “intitle: Windows intitle: XP” is same as querying “allintitle: Windows XP”.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ inurl: ]&lt;br /&gt;&lt;br /&gt;The “inurl:” syntax restricts the search results to those URLs containing the search keyword. For example: “inurl: edu” (without quotes) will return only links to those pages that have &quot;edu&quot; in the URL.&lt;br /&gt;&lt;br /&gt;Similarly, if one has to query for more than one word in an URL then in that case “allinurl:” can be used instead of “inurl” to get the list of URLs containing all those search keywords in it. For example: “allinurl: forum/edu“ will look for the URLs containing “forum” and “edu&quot;The slash (“/”) between the words will be ignored by Google.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ site: ]&lt;br /&gt;&lt;br /&gt;The “site:” syntax restricts Google to query for certain keywords in a particular site or domain. For example: “Windows site:google.com” (without quotes) will look for the keyword “Windows” in those pages present in all the links of the domain “google.com”. There should not be any space between “site:” and the “domain name”.&lt;br /&gt;&lt;br /&gt;This can be used for searching on rapidshare as well.&lt;br /&gt;&lt;br /&gt;[ filetype: ]&lt;br /&gt;&lt;br /&gt;This “filetype:” syntax restricts Google search for files on internet with particular extensions (i.e. doc, pdf or ppt etc). For example: “filetype:doc site:gov confidential” (without quotes) will look for files with “.doc” extension in all government domains with “.gov” extension and containing the word “confidential” either in the pages or in the “.doc” file. i.e. the result will contain the links to all confidential word document files on the government sites.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ link: ]&lt;br /&gt;&lt;br /&gt;“link:” syntax will list down webpages that have links to the specified webpage. For Example: “link:google.com” will list webpages that have links pointing to the google homepage. Note there can be no space between the &quot;link:&quot; and the web page url.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ related: ]&lt;br /&gt;&lt;br /&gt;The “related:” will list web pages that are &quot;similar&quot; to a specified web page. For Example: “related:google.com” will list web pages that are similar to the google homepage. Note there can be no space between the &quot;related:&quot; and the web page url.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ cache: ]&lt;br /&gt;&lt;br /&gt;The query “cache:” will show the version of the web page that Google has in its cache. For Example: “cache:yahoo.com” will show Google&#39;s cache of the Google homepage. Note there can be no space between the &quot;cache:&quot; and the web page url.&lt;br /&gt;&lt;br /&gt;If you include other words in the query, Google will highlight those words within the cached document. For Example: “cache:yahoo.com user” will show the cached content with the word &quot;user&quot; highlighted.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ intext: ]&lt;br /&gt;&lt;br /&gt;The “intext:” syntax searches for words in a particular website. It ignores links or URLs and page titles. For example: “intext:Windows” (without quotes) will return only links to those web pages that has the search keyword &quot;Windows&quot; in its webpage.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[ phonebook: ]&lt;br /&gt;&lt;br /&gt;“phonebook” searches for U.S. street address and phone number information. For Example:  “phonebook:Lisa+CA” will list down all names of person having “Lisa” in their names and located in “California (CA)”. This can be used as a great tool for hackers incase someone want to do dig personal information for social engineering.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The syntaxes will help you to have a better search result with Google. Try it and Enjoy searching in Google guys!!!&lt;br /&gt;&lt;br /&gt;Note : Some of the syntaxes would not work since Google frequently does changes in the queries and syntaxes.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/7590640460631994846/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/google-search-engine.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/7590640460631994846'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/7590640460631994846'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/google-search-engine.html' title='Google Search Engine'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-1717515888357772129</id><published>2009-02-24T08:31:00.000-08:00</published><updated>2009-02-26T05:51:19.437-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><title type='text'>Trace Mobile Number</title><content type='html'>You would have seen how to trace a IP Address by seeing my other post,there are a lot of other sites similar to that to trace the IP address.&lt;br /&gt;&lt;br /&gt;But have you ever thought that you would be able to trace the Mobile Number. Well if you still think is it possible??? The answer is a big YES&lt;br /&gt;&lt;br /&gt;I came across the following website which would help you to track down the Mobile Number, this site will be able to tell you the operator and the region where the mobile was operated and the Signaling method i.e whether GSM or CDMA.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Click the below link : &lt;br /&gt;&lt;a href=&quot;http://trace.bharatiyamobile.com&quot;&gt; TRACE THE NUMBER NOW &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The following image describes it more &lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i603.photobucket.com/albums/tt120/problemsolverpc/tracemobile.jpg&quot; width=&quot;530&quot; height=&quot;520&quot;&gt;&lt;br /&gt;&lt;br /&gt;Sorry guys the tool works only for mobilenumbers in INDIA.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Disclaimer : Sharing the precise name and address details of mobile number is crime in India. It is against the privacy law. Land lines are more associated to houses or organizations, where as Mobile is very personal. The purpose of this tool is to give you some directions of location of mobile, so that if you call the person, you know how you&#39;ll be billed. Or you could recall the person by knowing the state and operator.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/1717515888357772129/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/trace-mobile-number.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/1717515888357772129'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/1717515888357772129'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/trace-mobile-number.html' title='Trace Mobile Number'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-2840714535948249849</id><published>2009-02-24T07:46:00.000-08:00</published><updated>2009-02-24T07:54:52.890-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tweaks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Windows Genuine Validation</title><content type='html'>Nowadays most people encounter the Windows Genuine Validation and the you get the software counterfeiting problem well the solution of the problem is very simple, we just need to edit the product id for the current Windows XP product.&lt;br /&gt;&lt;br /&gt;Just follow the following steps and you can get rid of the problem &lt;br /&gt;&lt;br /&gt;1. Open Notepad&lt;br /&gt;2. Paste the following code and then save the file as with whatever name you want to but remember to name the file with the extension .reg, so your filename should be shown as WindowsGen.reg (example).&lt;br /&gt;3. Now the next step is to merge the file, which is nothing but to double click the file.&lt;br /&gt;4. A dialog box appears and asks you confirmation whether to join the file with the registry or not, just click OK and then again a dialog box appears and click OK.&lt;br /&gt;&lt;br /&gt;5. You are done. Just refresh the desktop or restart the computer and you will find the Software counterfeiting sign disappeared.&lt;br /&gt;&lt;br /&gt;Now your Windows is Genuine.&lt;br /&gt;&lt;br /&gt;The Code is :&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Windows Registry Editor Version 5.00&lt;br /&gt;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]&lt;br /&gt;&quot;CurrentBuild&quot;=&quot;1.511.1 () (Obsolete data - do not use)&quot;&lt;br /&gt;&quot;ProductId&quot;=&quot;55274-640-1011873-23081&quot;&lt;br /&gt;&quot;DigitalProductId&quot;=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\&lt;br /&gt;31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\&lt;br /&gt;30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\&lt;br /&gt;00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\&lt;br /&gt;00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\&lt;br /&gt;00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\&lt;br /&gt;00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3&lt;br /&gt;&quot;LicenseInfo&quot;=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\&lt;br /&gt;d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\&lt;br /&gt;4a,d9,db,64,5c,c4,e2,0f,34,f3,ea&lt;br /&gt;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]&lt;br /&gt;&quot;OOBETimer&quot;=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/2840714535948249849/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/windows-genuine-validation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/2840714535948249849'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/2840714535948249849'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/windows-genuine-validation.html' title='Windows Genuine Validation'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-3278762690645745692</id><published>2009-02-17T08:41:00.000-08:00</published><updated>2009-02-17T08:58:40.814-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Networks"/><title type='text'>IP Tracker</title><content type='html'>Ever thought of tracing the Location of a particular IP&lt;br /&gt;&lt;br /&gt;Well its simple.Those days it was very difficult and we had to obtain some sort of licenses to track down the IP&#39;s.&lt;br /&gt;But now it is very easy to obtain the exact location of the IP. You can get the exact Latitude and Longitude location of the person and the country and even the Internet Service Provider (ISP).&lt;br /&gt;&lt;br /&gt;There are a lot of applications for the purpose. But i found this application could be much useful.&lt;br /&gt;&lt;br /&gt;Its very simple, Just enter the IP address in the box provided and then hit Search button&lt;br /&gt;&lt;br /&gt;&lt;!-- Start ip2location.com Link --&gt; &lt;table width=&quot;239&quot; border=&quot;0&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://www.ip2location.com&quot;&gt;&lt;img src=&quot;http://www.ip2location.com/images/searchboxtitle.gif&quot; width=&quot;239&quot; height=&quot;14&quot; border=&quot;0&quot;&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;table width=&quot;100%&quot; border=&quot;0&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;&lt;tr&gt;&lt;td background=&quot;http://www.ip2location.com/images/searchboxbg.gif&quot; align=&quot;center&quot; valign=&quot;middle&quot; width=&quot;108&quot; height=&quot;112&quot; &gt;&lt;table width=&quot;108&quot; height=&quot;112&quot; border=&quot;0&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;&lt;tr&gt;&lt;td  align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;form name=&quot;form1&quot; method=&quot;post&quot; action=&quot;http://www.ip2location.com/demo.aspx&quot;&gt;&lt;textarea name=&quot;ipaddresses&quot; cols=&quot;15&quot; rows=&quot;5&quot; wrap=&quot;ON&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;font-size: 9px;color: #333333;text-decoration: none; border: 1px solid #A1D2FE;&quot;&gt;&lt;/textarea&gt;&lt;br&gt;&lt;input type=&quot;image&quot; src=&quot;http://www.ip2location.com/images/searchboxbutton.gif&quot; name=&quot;submit&quot; width=&quot;76&quot; height=&quot;16&quot;&gt;&lt;/form&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/td&gt;&lt;td width=&quot;131&quot; height=&quot;112&quot; valign=&quot;top&quot;&gt;&lt;a href=&quot;http://www.ip2location.com&quot;&gt;&lt;img src=&quot;http://www.ip2location.com/images/searchboxinfo.gif&quot; width=&quot;131&quot; height=&quot;112&quot; border=&quot;0&quot;&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;!-- End ip2location.com Link --&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;And your own IP Information&lt;br /&gt;&lt;br /&gt;&lt;!-- Start ip2location.com Link --&gt;&lt;IFRAME SRC=&quot;http://www.ip2location.com/ib2/&quot; WIDTH=&quot;204&quot; HEIGHT=&quot;162&quot; MARGINWIDTH=&quot;1&quot; SCROLLING=&quot;no&quot; FRAMEBORDER=&quot;0&quot;&gt;&lt;/IFRAME&gt;&lt;!-- End ip2location.com Link --&gt;</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/3278762690645745692/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/ip-tracker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/3278762690645745692'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/3278762690645745692'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/ip-tracker.html' title='IP Tracker'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-7174753344388815496</id><published>2009-02-17T08:30:00.000-08:00</published><updated>2009-02-17T08:40:33.504-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antivirus"/><title type='text'>Remove Virus Manually Part-I</title><content type='html'>Do you suspect your computer for viruses in it????&lt;br /&gt;&lt;br /&gt;Are there sudden changes in your Operating system or your computer???&lt;br /&gt;&lt;br /&gt;Well there are various applications for scanning the viruses but you need to install a specific application i.e. a Antivirus to do the job but ever thought that any other application could do the same job.&lt;br /&gt;&lt;br /&gt;Yup, there are ways, heard of the Winrar Application most of you would have. Just open the application and open the specific path where you have suspected of virus and then in the content window it shows the Hidden Virus and thats the job, just select them and delete them forever.&lt;br /&gt;&lt;br /&gt;This particular method works fine Newfolder.exe and the Autorun.inf virus.&lt;br /&gt;&lt;br /&gt;Try it guys!!</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/7174753344388815496/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/remove-virus-manually-part-i.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/7174753344388815496'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/7174753344388815496'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/remove-virus-manually-part-i.html' title='Remove Virus Manually Part-I'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-5090008351205881086</id><published>2009-02-10T06:44:00.000-08:00</published><updated>2009-02-17T08:29:57.590-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Networks"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Configure a VPN Connection</title><content type='html'>&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;How to configure a VPN&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Guys I saw this article and thought this could be useful to everyone on how to create and manage a VPN connection. Try doing it guys!!!!!&lt;br /&gt;&lt;br /&gt;If you are looking for a free and easy way to create a VPN(Virtual Private Network) connection to another computer, share files, remote control or share screens between computers? Gbridge helps you to manage your multiple PCs, and collaborate works with close friends. In addition, you will be able to use it when you want to privately exchange large media files with your friends. Gbridge is a free tool which you can use to sync folders, share files, control another computer, share your desktop, or chat. It connects two computers directly and securely.&lt;br /&gt;&lt;br /&gt;Find the application at : &lt;a href=&quot;http://www.gbridge.com/&quot; class=&quot;bbc_link new_win&quot; target=&quot;_blank&quot;&gt;http://www.gbridge.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Once you are done with the installation, you’ll be asked for your Google account information, and to give a host name in the login screen .&lt;br /&gt;&lt;br /&gt;When everything’s set up, you’re ready to go, but you need two systems to create a VPN connection so set up a Gbridge on other computers you where you want to create a virtual network. You can install and auto-start Gbridge on multiple computers, using the same Gmail logon, and it will keep all those computers connected and ready to trade or stream files.&lt;br /&gt;&lt;br /&gt;The easiest way to use Gbridge is to create SecureShares Hit the big button for SecureShares at the top on the Gbridge client that’s doing the sharing, choose a folder, and choose the people who can access it and set a password by clicking on Create SecureShare as show below.From here you would choose the people who can access it and set a password.&lt;br /&gt;&lt;br /&gt;So if your friends want to quickly connect to your computer, just ask them to install the Gbridge client software and you can now send large files, instantly play MP3’s off each other’s computer, share your desktops, and even create photo slideshows from your folders and let others watch.</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/5090008351205881086/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/configure-vpn-connection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/5090008351205881086'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/5090008351205881086'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/configure-vpn-connection.html' title='Configure a VPN Connection'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5123538834487374058.post-1037261201646002224</id><published>2009-02-10T06:39:00.000-08:00</published><updated>2009-02-10T06:43:47.106-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Networks"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>VPN (Virtual Private Network)</title><content type='html'>&lt;p style=&quot;font-family: times new roman;&quot;&gt;&lt;strong&gt;What is VPN?&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt; VPN (Virtual Private Network) &lt;/span&gt;uses public network such as internet to provide the remote offices the secure access to their organization’s network. VPN is an alternative to the expensive system of the leased lines that are owned and used by an organization. VPN maintains the privacy and security by the security procedures and tunneling protocols such as PPTP (Point to point tunneling protocol), IPSec, L2TP, L2TPv3, L2F and MPLS (Multi Protocol Label Switching).&lt;/span&gt;&lt;span style=&quot;font-family: times new roman;font-family:Verdana, Arial, Helvetica, sans-serif;&quot; &gt; &lt;/span&gt;                                                                                                     &lt;/div&gt;&lt;p style=&quot;font-family: times new roman; text-align: justify;&quot;&gt;A VPN network can send voice, data, and video over secure and encrypted private channels in the public network. There are many VPN client programs that are configure in such a way that all the IP traffic must pass the VPN tunnels before reaching the destination. &lt;/p&gt;                                     &lt;p style=&quot;font-family: times new roman;&quot;&gt;&lt;strong&gt;VPN Features&lt;/strong&gt;&lt;/p&gt;                                     &lt;p style=&quot;font-family: times new roman;&quot;&gt;A VPN connection can provide the following features.&lt;/p&gt;                                                                          &lt;p&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;• Global Networking&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;   • Broadband Network Compatibility System&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;   • Secure Communication&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;   • Cost Effective solution for the corporate offices.&lt;/span&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-4195761278546593&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text_image&quot;; google_ad_channel = &quot;&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;000000&quot;; google_color_text = &quot;000000&quot;; google_color_url = &quot;000000&quot;; //--&gt;&lt;/script&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;   • Reduced Operational cost&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;• Faster Return on investmen&lt;/span&gt;t&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Still confused????&lt;/p&gt;&lt;p&gt;See tho other post on VPN on how to configure it between two systems and share data&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://dealwithknowledge.blogspot.com/feeds/1037261201646002224/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/vpn-virtual-private-network.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/1037261201646002224'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5123538834487374058/posts/default/1037261201646002224'/><link rel='alternate' type='text/html' href='http://dealwithknowledge.blogspot.com/2009/02/vpn-virtual-private-network.html' title='VPN (Virtual Private Network)'/><author><name>Problem Solver</name><uri>http://www.blogger.com/profile/00078498578417807312</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry></feed>