अपने स्मार्टफोन के साथ कभी ना दोहराएं ये ७ गलतियां।

Kmsraj51 की कलम से…..

Kmsraj51-CYMT08

अपने स्मार्टफोन के साथ कभी ना दोहराएं ये गलतियां। 

महंगे गैजेट इस्तेमाल करना भला किसे पसंद नहीं होता लेकिन कम ही लोग इन गैजेट्स का सही ध्यान रख पाते हैं। ऐसे में गैजेट्स का सही इस्तेमाल नहीं हो पाता। हम आपको बता रहे हैं उन 7 गलतियों के बारे में जिन्हें आप इग्नोर करते हैं। इन गलतियों को सुधार लें तो आप अपने गैजेट का बेहतर इस्तेमाल पर पाएंगे।

कैमरा लेंस की सफाई ना करना।

कैमरा का लेंस धूल और गंदगी को अपनी तरफ खींचता है। ऐसे में रियर कैमरा मोबाइल में पीछे की तरफ होने से उसपर धूल का जमना जाहिर सी बात है। यूं तो यह मोबाइल कैमरा की गलती है पर आप भी एक गलती करते हैं कि आप कभी कैमरा लेंस को साफ करने की तरफ ध्यान नहीं देते। ऐसे में धूल जमने के कारण आपकी फोटो ब्लर हो सकती है। इससे बचने के लिए आपको सिर्फ इतना करना है कि फोटो शूट करने से पहले एक बार कैमरा लेंस को कॉटन के कपडे़ से पोंछ लें। इससे आपकी फोटो खराब नहीं होगी।
smartphone_care tips-kmsraj51

इन फीचर्स पर नहीं देते ध्यान।

आप फोन के प्रोसेसर, रैम और लुक्स पर तो बखूबी ध्यान देते हैं लेकिन बेटर फोटोग्राफी के लिए कैमरा और उसमें दिए गए अनेकों फीचर्स पर शायद ही आपका ध्यान जाता है। ऐसे में आप अच्छी फोटोग्राफी के लिए कुछ सेकंड्स कैमरा के ऑटो एक्सपोजर और ऑटो फोकस फीचर्स का पर ध्यान देने से आप बेटर फोटोग्राफी का आनंद ले सकते हैं।

हमेशा ब्लूटूथ रखते हैं ऑन।

हमारी आदत होती है कि फोन में थोड़ी-सी दिक्कत आने पर हम उसे बनाने वाली कंपनी को कोसने लगते हैं। इससे पहले कि आप अपने फोन या उसे बनाने वाली कंपनी के सिर बैटरी ज्यादा देर ना चलने का दोष थोप दें, जरा अपनी आदतों पर भी ध्यान दें। ब्लूटूथ को ऑन करके ऑफ ना करना लोगों की पुरानी आदत होती है। ऐसे में बैटरी जल्दी खत्म हो जाती है और आपको परेशानी का सामना करना पड़ता है।

ओवर एक्सपोजर है खराब।

जिस तरह आप से ज्यादा गर्मी या सर्दी सहन नहीं होती ठीक उसी तरह आपका गैजेट भी इसे सहन नहीं कर पाता। फोन या टैबलेट को 35 डिग्री से ज्यादा और 0 डिग्री से कम के तापमान से बचाएं। फोन को डायरेक्ट सन लाइट में इस्तेमाल करने से बचें।

गलत चार्जर का इस्तेमाल।

हमेशा अपने फोन के साथ दिया गया चार्जर का ही इस्तेमाल करें। बार-बार किसी अन्य फोन का चार्जर इस्तेमाल करने से फोन की बैटरी डैमेज हो सकती है। साथ ही, फोन को रात भर चार्ज ना करें इससे बैटरी की लाइफ कम हो जाती है। लैपटॉप के साथ भी यही होता है इसलिए किसी भी गैजेट को रात भर चार्ज ना करें।

अपडेट अलर्ट को इग्नोर करना।

कभी-कभी स्मार्टफोन में अपडेट अलर्ट इरिटेट करने लगते हैं। खासकर तब जब आप अपने फोन पर कुछ जरूरी काम कर रहे हों। माना कि ये इरिटेटिंग होते हैं, लेकिन इन्हें अपने रिस्क पर ही इग्नोर करें। इन्हें इग्नोर करना आपके फोन के लिए अच्छा नहीं होता। ऐप्स के अपडेट ना होने से आपका फोन स्लो हो सकता है।

पासवर्ड का इस्तेमाल ना करना।

अगर आपकी गर्लफ्रेंड आपको लेकर पजेसिव ना भी हो तो भी अपने पर्सनल गैजेट में प्रोटेक्शन के तौर पर पासवर्ड इस्तेमाल करना अच्छी आदत होती है। आप फिंगर प्रिंट लॉक सिस्टम या फिर फेस लॉक का इस्तेमाल कर अपने फोन को लॉक करें। इससे आपका फोन और डाटा दोनों सुरक्षित रहेंगे।

Please Share your comment`s.

आपका सबका प्रिय दोस्त,

Krishna Mohan Singh(KMS)
Head Editor, Founder & CEO
of,,  http://kmsraj51.com/

———– @ Best of Luck @ ———–

Note::-

यदि आपके पास हिंदी या अंग्रेजी में कोई Article, Inspirational StoryPoetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है: kmsraj51@hotmail.com. पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

Also mail me ID: cymtkmsraj51@hotmail.com (Fast reply)

cymt-kmsraj51

“अगर अपने कार्य से आप स्वयं संतुष्ट हैं, ताे फिर अन्य लोग क्या कहते हैं उसकी परवाह ना करें।”

-KMSRAJ51

 

 

_______Copyright © 2015 kmsraj51.com All Rights Reserved.________

Advertisements

वेब का इतिहास-(History of the Web)!!

kmsraj51 की कलम से …..

वेब का इतिहास(History of the Web)
Concept internet communication

Tim Berners-Lee invented the World Wide Web in 1989, about 20 years after the first connection was established over what is today known as the Internet. At the time, Tim was a software engineer at CERN, the large particle physics laboratory near Geneva, Switzerland. Many scientists participated in experiments at CERN for extended periods of time, then returned to their laboratories around the world. These scientists were eager to exchange data and results, but had difficulties doing so. Tim understood this need, and understood the unrealized potential of millions of computers connected together through the Internet.

Tim documented what was to become the World Wide Web with the submission of a proposal to his management at CERN, in late 1989 (see the proposal.), This proposal specified a set of technologies that would make the Internet truly accessible and useful to people. Believe it or not, Tim’s initial proposal was not immediately accepted. However, Tim persevered. By October of 1990, he had specified the three fundamental technologies that remain the foundation of today’s Web (and which you may have seen appear on parts of your Web browser):

=> HTML: HyperText Markup Language. The publishing format for the Web, including the ability to format documents and link to other documents and resources.

=> URI: Uniform Resource Identifier. A kind of “address” that is unique to each resource on the Web.

=> HTTP: Hypertext Transfer Protocol. Allows for the retrieval of linked resources from across the Web.

Tim also wrote the first Web page editor/browser (“WorldWideWeb”) and the first Web server (“httpd“). By the end of 1990, the first Web page was served. By 1991, people outside of CERN joined the new Web community. Very important to the growth of the Web, CERN announced in April 1993 that the World Wide Web technology would be available for anyone to use on a royalty-free basis.

Since that time, the Web has changed the world. It has arguably become the most powerful communication medium the world has ever known. Whereas only 25% of the people on the planet are currently using the Web (and the Web Foundation aims to accelerate this growth substantially), the Web has changed the way we teach and learn, buy and sell, inform and are informed, agree and disagree, share and collaborate, meet and love, and tackle problems ranging from putting food on our tables to curing cancer.

Tim Berners-Lee and others realized that for the Web to reach its full potential, the underlying technologies must become global standards, implemented in the same way around the world. Therefore, in 1994, Tim founded the World Wide Web Consortium (W3C) as a place for stakeholders to reach consensus around the specification and guidelines to ensure that the Web works for everyone and that it evolves in a responsible manner. W3C standards have enabled a single World Wide Web of information and people, and an increasingly-rich set of capabilities: Web 2.0 (personal and dynamic), Web 3.0 (a semantic Web of linked data), Web services, voice access, mobile access, accessibility for people with disabilities and for people speaking many languages, richer graphics and video, etc. The Web Foundation supports the work of W3C to ensure that the Web and the technologies that underpin it remain free and open to all.

With over 1 trillion public pages (in 2008) and 1.7 billion people on the Web (in 2009), we do not really understand how these pieces work together and how to best improve the Web into the future. In 2005, Tim and colleagues started the Web Science Trust (WST). WST is building an international, multidisciplinary research community to examine the World Wide Web as “humanity connected by technology”. WST brings together computer scientists, sociologists, mathematicians, policy experts, entrepreneurs, decision makers and many others from around the world to better understand today’s Web and to develop solutions to guide the use and design of tomorrow’s Web. The Web Foundation believes the discipline of Web Science is critically important to advancing the Web, and supports WST‘s efforts to build and coordinate this new field of study.

Most of the history of the Web is ahead of us. The Web is far from reaching its full potential as an agent of empowerment for everyone in the world. Web access through the world’s 4+ billion mobile phones is an incredible opportunity. New Web technologies will enable billions of people currently excluded from the Web community to join it. We must understand the Web and improve its capabilities. We must ensure that Web technologies are free and open for all to leverage. The work of the Web Foundation aims to have a substantial, positive impact on all of these factors, and on the future history of the Web.

==========kmsraj51==========

Note::-
यदि आपके पास Hindi या English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

tumblr_mw-kmsraj51

——————– —– https://kmsraj51.wordpress.com/ —– ——————

The Top 30 Internet Terms for Beginners, 2014

kmsraj51 की कलम से…..

WWW ( World Wide Web)
Concept internet communication

Welcome, readers! As you strive to make sense of the Internet and the World Wide Web, these 30 terms are bound to be very helpful.

1. The Web vs. the Internet

The Internet is a vast ‘interconnection of computer networks’. It is comprised of millions of computing devices that trade volumes of information. Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, and even soda pop machines are connected to the Net.

The Internet started in the late 1960’s as an American military project, and has since evolved into a massive public spiderweb. No single organization owns or controls the Internet. The Net has grown into a spectacular mishmash of non-profit, private sector, government, and entrepreneurial broadcasters.

The Internet houses many layers of information, with each layer dedicated to a different kind of documentation. These different layers are called ‘protocols’. The most popular protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and email.

The World Wide Web, or ‘Web’ for short, is the most popular portion of the Internet. The Web is viewed through web browser software.

Grammar and spelling note: Use capitalized ‘Internet’ and ‘Web’ when using either word as a noun. Use lowercase ‘internet’ or ‘web’ when using either word as an adjective. e.g. ‘We were browsing the Internet on our television last night.’ e.g. ‘We found a really good web page about global warming.’

==========kmsraj51==========

2. http and https

http is a technical acronym that means ‘hypertext transfer protocol’, the language of web pages. When a web page has this prefix, then your links, text, and pictures should work in your web browser.

https is ‘hypertext transfer protocol SECURED’. This means that the web page has a special layer of encryption added to hide your personal information and passwords. Whenever you log into your online bank or your web email account, you should see https at the front of the page address.

:// is the strange expression for ‘this is a computer protocol’. We add these 3 characters in a Web address to denote which set of computer lanaguage rules affect the document you are viewing.

==========kmsraj51==========

3. Browser

A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents.

The most popular web browsers in 2013 are: Google Chrome, Firefox, Internet Explorer, and Safari.

==========kmsraj51==========

4. HTML and XML

Hypertext Markup Language is the programmatic language that web pages are based on. HTML commands your web browser to display text and graphics in orderly fashion. HTML uses commands called ‘HTML tags’ that look like the following:

XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following:

XHTML is a combination of HTML and XML.

==========kmsraj51==========

5. URL

URL’s, or ‘uniform resource locators’, are the web browser addresses of internet pages and files. A URL works together with IP addresses to help us name, locate, and bookmark specific pages and files for our web browsers.

URL’s commonly use three parts to address a page or file: the protocol (which is the portion ending in ‘//:’); the host computer (which sometimes ends in .com); and the filename/pagename itself. For example:

https://personal.bankofamerica.com/login/password.htm
http://forums.about.com/ab-guitar/?msg61989.1
ftp://files.microsoft.com/public/eBookreader.msi
telnet://freenet.edmonton.ca/main

==========kmsraj51==========

6. IP Address

Your computer’s ‘internet protocol’ address is a four-part or eight-part electronic serial number. An IP address can look something like ‘202.3.104.55’ or like ’21DA:D3:0:2F3B:2AA:FF:FE28:9C5A’, complete with dot or colon separators. Every computer, cell phone, and device that accesses the Internet is assigned at least one IP address for tracking purposes. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address acts like a type of automobile licence plate to enforce accountability and traceability.

==========kmsraj51==========

7. Email

Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g. Microsoft Outlook).

Email has many cousins: text messaging, instant messaging, live chat, videomail (v-mail), Google Waving.

==========kmsraj51==========

8. Blogs and Blogging

A blog (‘web log’) is a modern online writer’s column. Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages.

Web logs are usually arranged chronologically, and with less formality than a full website. Blogs vary in quality from very amateurish to very professional. It costs nothing to start your own personal blog.

The 15 best blogging and publishing platforms on the Internet today. Which one is for you?

=> WordPress

=> Blogger

=> Tumblr

=> Medium

=> Svbtle

=> Quora

=> Postach.io

=> Google+

=> Facebook Notes

=> SETT

=> Ghost

=> Squarespace

=> Typepad

=> Posthaven

=> LinkedIn Influencers

=> The fallen heroes

==========kmsraj51==========

9. Social Media and Social Bookmarking

Social media is the broad term for any online tool that enables users to interact with thousands of other users. Instant messaging and chatting are common forms of social media, as are blogs with comments, discussion forums, video-sharing and photo-sharing websites. Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and Digg.com.

Social bookmarking is a the specific form of social media. Social bookmarking is where users interact by recommending websites to each other (‘tagging sites’).

==========kmsraj51==========

10. ISP

ISP is Internet Service Provider. That is the private company or government organization that plugs you into the vast Internet around the world. Your ISP will offer varying services for varying prices: web page access, email, hosting your own web page, hosting your own blog, and so on. ISP’s will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).

Today, you will also hear about WISP’s, which are Wireless Internet Service Providers. They cater to laptop users who travel regularly.

==========kmsraj51==========

11. Download

Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web. Commonly, downloading is associated with songs, music, and software files (e.g. “I want to download a new musical ringtone for my cell phone”, “I want to download a trial copy of Microsoft Office 2010”). The larger the file you are copying, the longer the download will take to transfer to your computer. Some downloads will take 12 to 15 hours, depending on your Internet speed.

Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music.

==========kmsraj51==========

12. Malware

Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things:

vandalize your computer in some way
steal your private information
take remote control of your computer (‘zombie’ your computer) for other ends
manipulate you into purchasing something
Malware programs are the time bombs and wicked minions of dishonest programmers.

==========kmsraj51==========

13. Router (aka ‘Network Router’)

A router, or in many cases, a router-modem combination, is the hardware device that acts as the traffic cop for network signals into your home. A router can be wired or wireless or both. Your router provides both a defense against hackers, and the redirection service of deciding which specific computer or printer should get which signals in your home. If your router or router-modem is configured correctly, your Internet speed will be fast, and hackers will be locked out. If your router is poorly configured, you will experience network sluggishness and possible hacker intrusions.

==========kmsraj51==========

14. Keywords and Tags/Labels

Keywords are search terms used to locate documents. Keywords are anywhere from one to five words long, separated by spaces or commas: e.g. “horseback riding calgary” e.g. “ipad purchasing advice” e.g. “ebay tips selling”. Keywords are the foundation for cataloging the Web, and the primary means by which you and I will find anything on the Web.

Tags (sometimes called ‘labels’) are recommendation keywords. Tags and labels focus on crosslinking you to related content… they are the modern evolution of ‘suggestions for further reading’.

==========kmsraj51==========

15. Texting/Chatting

Texting is the short way to say ‘text messaging’, the sending of short electronic notes usually from a cell phone or handheld electronic device. Texting is popular with people who are mobile and away from their desk computers. Texting is something like the pagers of old, but has the file attachment ability of email.

To send a text message, you will usually need a keyboard-enabled cellphone and a text message service through your cellphone provider. You address your text messages using the recipient’s phone number.

In 2010, texting has spawned a controversial habit called ‘sexting’, which is when young people send sexual photos of themselves to other cell phone users.

==========kmsraj51==========

16. I.M.

I.M. (usually spelled ‘IM’ without the periods) is instant messaging, a form of modern online chatting. IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer. That IM software in turn connects you to potentially thousands of other IM users through the Internet. You locate existing friends and make new friends by searching for their IM nicknames.

Once the software and your friends list is in place, you can send instantaneous short messages to each other, with the option of including file attachments and links. While the recipient sees your message instantly, they can choose to reply at their leisure.

==========kmsraj51==========

17. P2P

P2P file sharing (‘peer-to-peer’) is the most voluminous Internet activity today. P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other.

Through ‘uploading’ and ‘downloading’, users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P.

==========kmsraj51==========

18. E-commerce

E-commerce is ‘electronic commerce’: the transacting of business selling and buying online. Every day, billions of dollars exchange hands through the Internet and World Wide Web. Sometimes, the e-commerce is your company buying office products from another company (business-to-business ‘B2B’ e-commerce). Sometimes, the e-ecommerce is when you make a private purchase as a retail customer from an online vendor (business-to-consumer ‘B2C’ e-commerce).

E-commerce works because reasonable privacy can be assured through technical means (e.g. https secure web pages), and because modern business values the Internet as a transaction medium.

==========kmsraj51==========

19. Bookmark

A bookmark (aka “favorite”) is a marker that you can place on web pages and files. You would bookmark something because:

=> You want to return to the page or file later
=> You want to recommend the page or file to someone else

Bookmarks/Favorites can be made using your right mouse click menu, or the menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on your Mac or Windows computer files.

==========kmsraj51==========

20. Social Engineering

Social engineering is the conman art of talking directly to people to trick them into divulging passwords and their private information. All social engineering attacks are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards, bogus lottery winnings, stock investment scams, warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you.

==========kmsraj51==========

21. Phishing and Whaling

‘Phishing’ is what modern-day con men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens, phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says “you should login and confirm this”.

==========kmsraj51==========

22. Addons and Plugins

Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web.

Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.

==========kmsraj51==========

23. Trojan

A trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. Sometimes it will be an innocent-looking movie file, or an installer that pretends to be actual anti-hacker software. The power of the trojan attack comes from users naively downloading and running the trojan file.

==========kmsraj51==========

24. Spamming and Filtering

‘Spam’ has two meanings. 1) Spam can mean ‘the rapid reptition of a keyboard command’. But more commonly, 2) spam is the jargon name of ‘unwanted/unsolicited email’. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords.

Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, andthen either deletes or quarantines messages that appear to be spam. Look for a ‘spam’ or ‘junk’ folder in your mailbox to see your quarantine of filtered email.

==========kmsraj51==========

25. Cloud Computing and Software-as-a-Service (SaaS)

Cloud computing is a fancy term to describe that your software is online and ‘borrowed’, instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users’ email is all stored and accessed ‘in the cloud’ of the Internet, and not actually on their own computers. This is the modern version of the 1970’s mainframe computing model. As part of the cloud computing model, ‘Software as a Service’ is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet, and log into their online rented copies of their SaaS software.

==========kmsraj51==========

26. Apps and Applets

Apps and applets are small software applications. They are designed to be much smaller than regular computer software, but still provide very useful functions. Lately, apps are very popular with cellphone and mobile platforms; specifically: with the Apple iPhone and the Google Android phone.

Examples of apps: rangefinder GPS for golfing, song identification software, restaurant reviews, pocket video games, language translators for traveling.

==========kmsraj51==========

27. Encryption and Authentication

Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas (‘ciphers’) to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the public Internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. On the provision that reliable encryption is in place, your banking information and credit card numbers are kept private.

Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are.

==========kmsraj51==========

28. Ports and Port Forwarding

‘Network ports’ are thousands of tiny electronic ‘lanes’ that comprise your network connection. Every computer has 65,536 tiny ports, through which Internetworking data travels in and out. By using port management tools like a hardware router, users can control port access to better safeguard themselves against hackers.

‘Port forwarding’ is the semi-complex technique of opening specific network ports. You would port-forward to speed up your downloading and speed up your online connections for gaming and teleconferencing.

==========kmsraj51==========

29. Firewall

Firewall is a generic term to describe ‘a barrier against destruction’. It comes from the building term of a protective wall to prevent the spreading of housefires or engine compartment fires. In the case of computing, ‘firewall’ means to have software and/or hardware protecting you from hackers and viruses.

Computing firewalls range from small antivirus software packages, to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system.

==========kmsraj51==========

30. Archives and Archiving

A computer ‘archive’ is one of two things: a compressed container of multiple smaller data files, or a purposeful long-term storage of files that are not going to be used often. In some cases, an archive can be both.

The act of ‘archiving’, similarly, is one of two things: to combine and squeeze multiple files into a larger single file (for easier emailing); or, archiving is when you will retire data and documents to be put into long-term storage (e.g. your thousands of old emails in your inbox).

Source:: http://www.about.com/

Note::-
यदि आपके पास Hindi या English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

Google-internet-006

——————– —– https://kmsraj51.wordpress.com/ —– ——————

Windows 8.1 Keyboard Shortcuts !!

kmsraj51 की कलम से …..
nature_KMSRAJ51

windows-logo-non-transparent
We have put together a list of 15 new keyboard shortcuts you can use on Windows 8.1.

15 – Usefull Keyboard Shortcuts

Shortcut Action

Windows Key + S => Open Search Charm to search Windows and Web

Windows Key + Q => Search within the opened app

Windows Key + F => Search files

Windows Key + Z => Get Commands and Context Menus within an app

Windows Key + . + Right Arrow => Snap app to the right

Windows Key + . + Left Arrow => Snap app to the left

Ctrl + Plus (+) => Zoom in on Start Screen

Ctrl + Minus (-) => Zoom out on Start Screen

Windows Key + Down Arrow => Close an app

Windows Key + Start Typing => Search your PC

Windows Key + O => Lock the screen orientation (portrait or landscape)

Windows Key + Ctrl + Spacebar => Change to a previously selected input language

Windows Key + P => Choose a presentation display mode

Windows Key + X => Open Start Button options

Windows Key + Home => Minimize all but the active desktop window

Note::-
यदि आपके पास Hindi या English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

HD - KMSRAJ51

——————– —– https://kmsraj51.wordpress.com/ —– ——————

Windows XP – Support is ending soon

kmsraj51 की कलम से …..
nature_KMSRAJ51

Support is ending soon
On April 8, 2014, support and updates for Windows XP will no longer be available. Don’t let your PC go unprotected.


What is Windows XP end of support?
=================================
Microsoft has provided support for Windows XP for the past 12 years. But now the time has come for us, along with our hardware and software partners, to invest our resources toward supporting more recent technologies so that we can continue to deliver great new experiences.

As a result, after April 8, 2014, technical assistance for Windows XP will no longer be available, including automatic updates that help protect your PC. Microsoft will also stop providing Microsoft Security Essentials for download on Windows XP on this date. (If you already have Microsoft Security Essentials installed, you will continue to receive antimalware signature updates for a limited time, but this does not mean that your PC will be secure because Microsoft will no longer be providing security updates to help protect your PC.)

If you continue to use Windows XP after support ends, your computer will still work but it might become more vulnerable to security risks and viruses. Also, as more software and hardware manufacturers continue to optimize for more recent versions of Windows, you can expect to encounter greater numbers of apps and devices that do not work with Windows XP.

Desktop

What does it mean if my version of Windows is no longer supported?
==================================================================
An unsupported version of Windows will no longer receive software updates from Windows Update. These include security updates that can help protect your PC from harmful viruses, spyware, and other malicious software, which can steal your personal information. Windows Update also installs the latest software updates to improve the reliability of Windows—new drivers for your hardware and more.

Support end dates

Here are the dates when support will end for PCs running Windows XP and Windows Vista without the latest service packs:

Support for Windows XP is ending on April 8, 2014. For more information, see Support is ending for Windows XP.

Support for Windows Vista Service Pack 1 (SP1) ended on July 12, 2011. To continue support, make sure you’ve installed Windows Vista Service Pack 2 (SP2).

Support for Windows Vista without any service packs ended on April 13, 2010. To continue support, make sure you’ve installed Windows Vista SP2.

Support for Windows XP SP2 ended on July 13, 2010. To continue support, make sure you’ve installed Windows XP Service Pack 3 (SP3).

How do I stay protected?
To stay protected after support ends, you have two options:

Upgrade your current PC
Very few older computers will be able to run Windows 8.1, which is the latest version of Windows. We recommend that you download and run the Windows Upgrade Assistant to check if your PC meets the system requirements for Windows 8.1 and then follow the steps in the tutorial to upgrade if your PC is able. For more detailed information, read the FAQ…..
=> http://windows.microsoft.com/en-us/windows-8/upgrade-to-windows-8

Get a new PC

If your current PC can’t run Windows 8.1, it might be time to consider shopping for a new one. Be sure to explore our great selection of new PCs. They’re more powerful, lightweight, and stylish than ever before—and with an average price that’s considerably less expensive than the average PC was 10 years ago.

Find Your Perfect PC

http://www.microsoft.com/windows/en-us/xp/pcs-and-offers.aspx?ocid=XPEOS_O_WOL_NULL_NULL

How do I move all my Windows XP stuff to a new PC?

You can move your Windows XP stuff with Laplink, a free data migration solution that will walk you through all the steps to getting your files, setings, and user profiles from your Windows XP PC to your new Windows laptop, desktop, or tablet. (Note that you will need your Windows XP PC to migrate your data, and you can only migrate to a PC running Windows 7, Windows 8, or Windows 8.1.)

What do I get with Windows 8.1?

Windows 8.1 makes it easy to do all the things you’re used to doing with Windows XP while opening up a whole new world of possibilities for you to explore and enjoy.

8 win-kmsraj51

windows-logo_large_verge_medium_landscape-kmsraj51

Note::-
यदि आपके पास Hindi “OR” English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

HD - KMSRAJ51

95 kmsraj51 readers

baby-TU NA HO NIRASH KABHI MAN SE

=========================================================
——————– —– https://kmsraj51.wordpress.com/ —– ——————
=======================================================

Free See Online Movies/Vedio/TV shows/Clips HD Quality

kmsraj51 की कलम से …..
nature_KMSRAJ51


ABOUT HULU

Go To Hulu => http://www.hulu.com/

Mission
Hulu’s mission is to help people find and enjoy the world’s premium video content when, where and how they want it. As we pursue this mission, we aspire to create a service that users, advertisers and content owners unabashedly love.

hulu-kmsraj51

Overview

Hulu is an online video service that offers a selection of hit TV shows, clips, movies and more on the free, ad-supported Hulu.com service, and the subscription service Hulu Plus. Instantly stream any current season episode of primetime TV shows like Family Guy, Modern Family, Glee, Grey’s Anatomy, The Daily Show with Jon Stewart, The Colbert Report and many others. Catch up on classic series including Lost, The Office, I Love Lucy, The Cosby Show, Frasier, Star Trek and Family Ties. Enjoy full episodes and clips from Saturday Night Live. Explore a wide array of acclaimed movies and documentaries, including hundreds of titles from The Criterion Collection. Discover Hulu Original Series like The Awesomes and A Day in the Life.

For just $7.99 a month, Hulu Plus subscribers can access premium programming anytime on internet-connected TVs, smartphones, game consoles, set top boxes and additional devices, in HD (when available). More details on Hulu Plus enabled devices can be found here.

http://www.hulu.com/plus/devices

Watch The 13th Unit (2014)HD
http://www.hulu.com/watch/609941

Hulu

User Experience

Hulu is focused on quality and convenience and strives to create the best possible online video experience.
Hulu gives users the ability to customize their viewing experience online.
Hulu allows users to watch favorites or discover new shows anytime — at home or on the road.
Hulu’s search feature helps users find any premium video online even if it is not directly available on Hulu.com.
Hulu is easy to use and share. Simply go to http://www.hulu.com, and click on a video to watch right away.
Hulu does not require a download of any software. Users only need a Flash 10.1.53.64 enabled computer and an Internet connection to enjoy.
Hulu offers the freedom to share full-length episodes or clips via e-mail or embeds on other websites, blogs and social networking pages.
Hulu’s clipping feature allows users to select a portion of the video they would like to share.
Hulu is free and legal through an advertising supported model.
Videos are available for unlimited streaming; watch favorite shows and clips over and over for free.
A modest amount of advertising runs during normal commercial breaks.
Hulu acquires the rights to distribute its videos, making them available to users legally.
Hulu Plus is an ad-supported subscription service that offers current and back season shows from ABC, Comedy Central, The CW, FOX, NBC, MTV and Univision to connected devices for $7.99 monthly.
Exclusive streaming access to full current and past seasons.
Available on smart TVs, gaming consoles, mobile phones and tablets and more.
Easy to set up, watch and share.

Distribution

Hulu allows users to enjoy great videos on Hulu.com and on many other popular sites across the Web. Hulu videos are available on Yahoo!, MSN, AOL, IMDb and TV Guide, as well as a growing network of personal blogs, fan sites and other sites where users choose to embed the Hulu video player.

Additionally, Hulu Plus subscribers can access more than 400 million connected TVs, smartphones, game consoles and set top boxes (not including PCs). Click here http://www.hulu.com/plus/devices for more information on Hulu Plus enabled devices.

hulu-logo-WATCH-KMSRAJ51

Advertising

Hulu gives advertisers an opportunity to associate their brands with premium online video content and connect with highly engaged consumers. And, through the Hulu Plus subscription service, advertisers can extend their reach to the users of the millions of Hulu Plus enabled devices on market today.

Additionally, Hulu offers and is committed to the continued development of innovative advertising experiences. More than 1000 advertisers have leveraged the Hulu service since launch in 2008, including Johnson & Johnson, McDonald’s, Visa, Pepsi, Nestle, Microsoft, GEICO, Target, Verizon Wireless, Sprint, Purina, Nissan, Toyota, Honda, State Farm, Allstate, Unilever and Procter & Gamble.

==================================================================
——————————————————————
Source :: http://www.hulu.com/
——————————————————————
==================================================================

hulu_logo-kmsraj51

Note::-
यदि आपके पास Hindi “OR” English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

HD - KMSRAJ51

===============================================================
——————– —– https://kmsraj51.wordpress.com/ —– ———————–
=============================================================

baby-TU NA HO NIRASH KABHI MAN SE
Indian Flag

===============================================================
——————– —– https://kmsraj51.wordpress.com/ —– ———————–
=============================================================

Optimize PC: Fix Network Connection Problems in Windows 7

kmsraj51 की कलम से …..
nature_KMSRAJ51

Some portable computers have a wireless network adapter wherein the user can view a list of available wireless networks and then connect to one of that network. This network will appear if the computer has a wireless network adapter installed, if the adapter is turned on and the wireless access point is in range.
wireless-connection-problem

To view and connect to wireless networks in Windows 7:

Click the wireless network icon in the notification area of the taskbar.
Choose the desired network to connect to in the list of wireless networks and t hen click Connect.
Type the security key if connecting to a secure network and then click OK.

It is important to have a PC that works at its best to ensure tasks accomplishment and other errands everyday. However, if the PC is not functioning well, this will trigger a problem to the user. The user must make it a habit to check the computer daily since it can not be avoided that errors may arise anytime, whether caused by internal functions of the computer or from the outside environment. If a problem in the wireless network connection arises, just do the following steps to cure it.

EXAMINE THE HARDWARE

Usually, improperly connected hardware is the major cause of network connection problems. Check the network adapter switch, reset modem and check for problems with the network adapter. If a laptop is being used, se to it that the network adapter switch is turned on. There are numbers of laptop that has a physical switch somewhere on the front, side or top of the laptop that turns network adapter on or off. Usually, the laptop has an indicator light that tells whether the wireless network adapter is enabled or not. Check also the network adapter in the Device Manager and verify the status of the network adapter by doing the following steps:

=> Hit the Start button and type “device manager” in the search box.
=> Choose Device Manager in the resulting list. If the computer requires for an administrator password or confirmation, supply the necessary information to proceed with the process.
=> Double-click Network Adapter then right-click the network adapter.
=> Select properties and then under Device status, check if the device is working properly.
=> Select Enable Device to enable network adapter if it is disabled.

UTILIZE THE AUTOMATED TROUBLESHOOTER

To start with, use the Network troubleshooter and then test the internet connection. To open the Network troubleshooter, simply right-click the wireless network connection icon in the notification area of the taskbar then selects Troubleshoot problems.

UPDATE DRIVERS
Network adapter driver is an application used by the computer to communicate with the wireless network adapter. Network adapter drivers which are corrupted or obsolete prevent network connection to fail.

“Just execute these steps properly and the problem in wireless network connection will surely be resolved.”

tumblr_mw-kmsraj51

Note::-
यदि आपके पास Hindi “OR” English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

HD - KMSRAJ51

————————————————————————————————
——————– —– https://kmsraj51.wordpress.com/ —– ——————
————————————————————————————————