IT Infrastructure & Security Services
Naseeb Ali
Saturday, 16 July 2016
Tuesday, 5 July 2016
What is ActiveX Control? How it works? What are the risks?
ActiveX controls are the program, sometimes also called "Add-on" that are used on the Internet. They can enhance your browsing experience by allowing animation or they can help with tasks such as animation etc.
ActiveX controls and web browser add-ons are small programs that
are used extensively on the Internet. They can make browsing more enjoyable by
providing toolbars, stock tickers, video, animated content, and more. These
programs can malfunction, however, or give you content you don't want. In some
cases, these programs can be used to collect information from your computer in
ways you might not approve of, possibly damage information on your computer,
install software on your computer without your consent, or allow someone else to
control your computer remotely. Given these risks, you should only install
ActiveX controls or add-ons if you completely trust the publisher and the
website offering it.
Some websites require you to install ActiveX controls to see the site or perform certain tasks on it. When you visit such a site, Internet explorer asks if you want to install the ActiveX control.
The website that provides the ActiveX control should tell you what the control is for , It should also provide relevant details on the page before or after uou see the warning. Internet Explorer blocks websites from using and ActiveX control on your computer if the website tries to use the ActiveX control in a way that might not be safe.
What are the risks?
Unfortunately, ActiveX controls are like any other software program-- they can be misused. They can stop your computer from functioning correctly, collect your browsing habits and personal information without your knowledge, or can give you content, like Popup ads that you dont want. Also, good ActiveX controls might contain unintended code that allows bad websites to use them for malicious purposes.
Note:- If an ActiveX control is not essential to your computer activity, avoid installing it.
Note:- If an ActiveX control is not essential to your computer activity, avoid installing it.
Wednesday, 30 December 2015
How To Corrupt Windows Machine Within a Minute....
You can corrupt windows operating system by deleting bootmgr file, but there is two problems which prevent you by doing so.
Problem 1:- The system partitions which contains bootmgr file is not listed in your windows explorer.
Problem 2:- This file can not be deleted by normal user until you modified its ownership.
So here I m going to explain steps how to solve these problems...
Solution 1:- select computer icon & right click on it and select manage.
Solution 2:- Now select Bootmgr file and click on delete, but there will be error message showing that you cant delete this file...
Problem 1:- The system partitions which contains bootmgr file is not listed in your windows explorer.
Problem 2:- This file can not be deleted by normal user until you modified its ownership.
So here I m going to explain steps how to solve these problems...
Solution 1:- select computer icon & right click on it and select manage.
It will open Disk Management Utility, & there you will see the partitions but one partition does not have any drive letter like this...
Right click on that partition & select change drive letters...
click on Add then click on ok.
Now that partition is assigned letter F and open this drive but all files are hidden, so follow these steps to unhide these files in below snap you will see there are no contents..
Now go to Organize & select Folder and search options.
In folder options windows go to View Tab and select show hidden files, folders and drives radio button and uncheck all three check box below this..
after clicking on ok button your files would be in normal (unhide) condition like this..Solution 2:- Now select Bootmgr file and click on delete, but there will be error message showing that you cant delete this file...
Now right click on bootmgr file and select properties, go to security tab and click on advanced
Go to Owner tab and click on Edit...
In next window select Other users & groups...
In users and groups search box type Everyone...
After clicking on Ok button you will be directed to permissions dialog box and there select Edit...
Now click on Add button...
Type Everyone...
& select Everyone from group or users names and assign Full control permissions like below image...and select ok
Now go back to your drive & delete bootmgr file and restart the machine.
Legal Notice:- These steps are for educational purpose only.
Tuesday, 29 December 2015
Hardware & Networking Interview Questions
Q1:- What is Hardware Requirements of Windows XP?
Q2:- What is Hardware Compatibility?
Q3:- What are the booting files of Windows 7?
Q4:- What are the various types of partitions can be created on a basic disk?
Q5:- What is formatting?
Q6:- What is Safe Mode?
Q7:- What is Booting?
Q8:- What is the difference between NTFS & FAT?
Q9:- What is File System?
Q10:- What are the advantages of Laptop over Desktop?
Q11:- What are the various symptoms of virus infection?
Q12:- Explain about any three remote management softwares?
Q13:- What is Hot Swapping?
Q14:- What is Remote Management?
Q15:- What is IRQ?
Q16:- How to check the number of hard disk drives installed in a system?
Q17:- What is the use of Guest Account?
Q18:- How to check display driver in a system?
Q19:- Which command is used to check the connectivity between two machines?
Q20:- What is the full form of FAT?
Q21:- How many pins do serial ports have?
Q22:- What is IP Address?
Q23:- What is the difference between public & private ip address?
Q24:- What are the layers of osi model?
Q25:- What is LAN?
Ans:- LAN is short for Local Area Network it refers to the connection between computers and other networking devices that are located within a small area.
Q26:- What protocols fall under the TCP/IP Internet Layer?
Q27:- What is the one biggest advantage of mesh topology?
Q28:- What is SMTP?
Q29:- What is the biggest disadvantage of Ring Topology?
Q30:- Describe Ethernet?
Q31:- What is the difference between straight through and cross over cable?
Q32:- What is the difference between baseband & broadband transmission?
Q33:- What is Bandwidth?
Q34:- What is Subnet?
Q35:- What is Subnetting?
Q36:- What is MAC
Address?
Ans:- It is the 48-bit hardware address of LAN Card.
MAC Address is usually stored on a ROM chip of Network Interface Card(NIC) and
it is unique.
Q37:- What is a Node?
Ans:- A node refers to a point or joint where a
connection takes place. It can be a computer or device that is part of a
network. Two or more nodes are needed to form a network.
Q38:- What is Hardware?
Ans:- All the physical components of a computer system
are called hardware like Keyboard, Monitor, Motherboard, Disk Drives etc.
Q39:- What is
Software?
Ans:- Software is a program or machine-readable
instructions that directs a Computer's Processor to perform specific
operations.
Q40:- What is Network?
Ans:- The interconnection of two or more computer or
devices through a media is called network. It can be PAN, LAN, CAN, MAN, WAN
& SAN.
Q41:- What is
Networking?
Ans:- The process of creating network is called
networking. It requires designing, implementing and securing the network.
Q42:- What is NIC?
Ans:- NIC stands for Network Interface Card, it is a
hardware device which acts as an interface between Computer & Network.
Q43:- What is WAN?
Ans:- WAN stands for Wide Area Network, It is an interconnection
of computers and networking devices that geographically dispersed. It connects
networks that are located in different regions & countries.
Q44:- What is IP
Address?
Ans:- IP stands for Internet Protocol and it is a
32-bit decimal address assigned to each devices which is connected
to computer network.
Q45:- What is BIOS?
Ans:- BIOS stands for Basic Input Output System which
works as an interface between Operating system and Hardware. It resides on ROM
Chip of motherboard.
Q46:- What is WWW?
Ans:- WWW stands for World Wide Web and it is system
of interlinked hypertext documents that are accessed via the Internet. With a
web browser one can view web pages that can contain text, images, videos and
other multimedia contents via hyperlink.
Q47:- How many pins
are there in IDE/EIDE Connector?
Ans:- 40 Pins.
Q48:- What is
Protocol?
Ans:- Protocol is a set of rules that govern data
communication. It represents an agreement between the communicating devices
without protocol two devices may be connected but not communicating like a
person speaking French can not be understood by a Chinese.
Q49:- What is Gateway?
Ans:- A Gateway is a network point that
act as an entrance point for another network. On a home network a broadband
router serves as network gateway although a ordinary computer can also be used
as a gateway. In enterprises a gateway node often acts as proxy server or firewall.
Q50:- What is Default
Gateway?
Ans:- A Default Gateway is the device that passes traffic from the local subnet to the
device on other subnet, it connects local network to the Internet.
Internet default
gateways are typically of two types:-
- On a home or small business network with a broadband
router to share the internet connection, the Broadband router serves as a
default gateway.
- On a home or small business network without a broadband
router such as residences with a dial-up internet access, a router at the
ISP end serves as a default gateway.
Q51:- What is DNS?
Ans:- DNS stands for Domain Name System that maintains
a database of Domain names and its IP Address. It is necessary because domain
names are easy for people to remember but machines communicate on internet through
IP Address.
Q52:- What is DHCP?
Ans:- Dynamic Host Configuration Protocol is a network
protocol that enables a server to automatically assign IP address to clients.
Q53:- What is the
difference between Northbridge & Southbridge?
Ans:- Northbridge is the portion of chipset that
connects the faster I/O buses to the processor like RAM, Graphics and PCI
Express. but Southbridge is the chipset that connects the slower I/O buses to
the system bus like USB, Audio, LAN, Super I/O etc.
Northbridge is called
Graphics Memory Controller Hub(GMCH) while southbridge is called Input/output
Controller Hub(ICH)
Q54:- What is the
difference between SIMM & DIMM?
Ans:- SIMM stands for Single In line Memory Module the
gold or tin pins on the lower end of front and back edge of memory module are
connected providing a single line of connection between Memory Module and
System. And DIMM stands for Dual In line Memory Module and the pins on this
module are not connected, providing two lines of communication path between
module and system.
SIMM provide 32-bit
channel while DIMM provide 64-bit channel.
Q55:- Explain RAID-5?
Ans:- RAID-5 provides redundancy by writing data and
parity information across three or more hard disk drives thus increasing
performance and it is the most popular RAID implementation.
Q56:- What is the Difference between Offline & Online UPS?
Q57:- What is NTLDR & what does it do?
Q58:- Write Short Notes on FTP, SMTP & HTTP.
Q59:- Explain two difference between Hub, Switch & Router.
Q60:- What is IRQ?
Q56:- What is the Difference between Offline & Online UPS?
Q57:- What is NTLDR & what does it do?
Q58:- Write Short Notes on FTP, SMTP & HTTP.
Q59:- Explain two difference between Hub, Switch & Router.
Q60:- What is IRQ?
work in progress
we will back soon with some more Q&A...keep visiting..
Tuesday, 22 December 2015
Mapping Network Drive With CMD Prompt...
First of all I want to explain about Mapping, suppose there is a shared resource on your network and you need to access that resource frequently then each time you access that data you have to type the network address(IP Address) of that machine.
If you want to make shortcut of that data on your local machine then type the following command
net use z: \\100.0.0.236\sharedfolder
in my scenarios its
net use z: \\100.0.0.236\myname
If you want to make shortcut of that data on your local machine then type the following command
net use z: \\100.0.0.236\sharedfolder
in my scenarios its
net use z: \\100.0.0.236\myname
in the above example the shared data name myname and we want to make shortcuts of that data in my machine as my local drives having the drive letter of Z Drive like the following image.
now we are successful in creating a mapped network drive having letter Z.
Subscribe to:
Posts (Atom)