STUDY_GUIDE: CISF MA 1800 VACANCY, CBI MA INSPECTOR NI VACANCY,INDIAN FOREST MA OFFICER NI VACANCY,INDIAN RAILWAY MA 20,000 VACANCY: APRIL-1 ANK

STUDY_GUIDE: CISF MA 1800 VACANCY, CBI MA INSPECTOR NI VACANCY,INDIAN FOREST MA OFFICER NI VACANCY,INDIAN RAILWAY MA 20,000 VACANCY: APRIL-1 ANK

CNN Hero Narayanan Krishnan

Freelance Jobs


Freelance Jobs









"Out of Memory" error message appears when you have a large number of programs running

When you run a large number of Windows-based programs, "Out Of Memory"
error messages appear when you attempt to start new programs or try to
use programs that are already running, even though you still have
plenty of physical and pagefile memory available.

o correct this problem, increase the size of the desktop heap:

  1. Run Registry Editor (Regedt32.exe).
  2. From the HKEY_LOCAL_MACHINE subtree, go to the following key:
\System\CurrentControlSet\Control\Session Manager\SubSystems
  3. Select the Windows value.
  4. From the Edit menu, choose String.
  5. Increase the SharedSection parameter.

     For Windows NT:
     SharedSection specifies the system and desktop heaps using the
following format:
     SharedSection=xxxx,yyyy
     Add ",256" or ",512" after the yyyy number.

     For Windows 2000, Windows XP, and Windows Server 2003:
     SharedSection uses the following format to specify the system
and desktop heaps:
     SharedSection=xxxx,yyyy,zzz
     Increase the zzz number to "256" or "512."

Self-Motivation:the key the success

How to disable certain (IPv6) components in Windows Vista, Windows 7 and Windows Server 2008

1. Click Start

, type regedit in the Start Search box, and then click
regedit.exe in the Programs list.
2. In the User Account Control dialog box, click Continue.

3. In Registry Editor, locate and then click the following registry
subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
\Tcpip6\Parameters\

4. Double-click DisabledComponents to modify the DisabledComponents
entry.


Note If the DisabledComponents entry is unavailable, you must
create it. To do this, follow these steps:

1. In the Edit menu, point to New, and then click DWORD (32-
bit) Value.

2. Type DisabledComponents, and then press ENTER.

3. Double-click DisabledComponents.

5. Type any one of the following values to configure the IPv6
protocol, and then click OK:

1. Type 0 to enable all IPv6 components.

Note The value "0" is the default setting.

2. Type 0xffffffff to disable all IPv6 components, except the
IPv6 loopback interface. This

value also configures Windows Vista to use Internet Protocol version 4
(IPv4) instead of IPv6 in

prefix policies.

3. Type 0x20 to use IPv4 instead of IPv6 in prefix policies.

4. Type 0x10 to disable native IPv6 interfaces.

5. Type 0x01 to disable all tunnel IPv6 interfaces.

6. Type 0x11 to disable all IPv6 interfaces except for the
IPv6 loopback interface.

Notes

* Using a value other than 0x0 or 0x20 will cause the Routing and
Remote Access service to fail after this change goes into effect.
* You must restart your computer for these changes to take affect

How to install and uninstall IPv6 in windows xp windows 2003 server

To install IPv6:-

Start, point to All Programs, point to Accessories, and then click
Command Prompt.
At the command prompt, type: ipv6 install and press the Enter Key.

To uninstall IPv6:-

Start, point to All Programs, point to Accessories, and then click
Command Prompt.
At the command prompt, type:netsh int ipv6 uninstall and press the
Enter Key.

 





Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!

What is BCC?

BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the To: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, the BCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:, the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?

Here are the reasons for using BCC:

Privacy

– BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends. If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.

Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients. As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses. This makes it easy for the spammers to collect and target those emails for spamming.

How to BCC an email message?

Most email clients provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To: field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.

The moral is that you should use BCC: while sending bulk messages so as to protect the privacy of your recipients.



How to Test the Working of your Antivirus – EICAR Test

Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.

1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Rename the file from New Text Document.TXT to myfile.com

3. Now run the antivirus scan on this myfile.com file.

If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.

NOTE: Most antivirus will pop-out a warning message in the Step-1 itself.

You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.