Saturday, 8 November 2014



How to Create a Custom Hotkey for Your Favorite Application or Folder

Hotkeys are keyboard shortcuts that save time and effort. A number of them are built into Windows as well as into various applications and they are the subject of many of the tips in this section. Windows also has a feature that makes it possible to assign your own custom hotkeys to an application, folder, or file so that it can be opened with a minimum of effort.
There are two ways for designating a hotkey in Windows. One uses a combination of two of the so-called modifier keys Ctrl, Alt, and Shift together with one other key. The other method uses a single key, one of function keys F1 to F12 or a key from the numeric pad. This second method uses keys that often have other functions and must be assigned with care to avoid conflicts.
The usual way to set up a hotkey is with the default combination “Ctrl + Alt + (key)” where (key) is another of the standard keyboard keys. Certain keys such as Esc, Ins, Del, Enter, Tab, Spacebar, PrtScn, Shift, or Backspace keys are not allowed as the third key but punctuation keys, arrow keys, Home, Page Down and others are allowed as well as the usual letters and numbers.
The Ctrl + Alt combination is automatically applied by Windows in the method given here but other combinations using two of the three modifier keys Ctrl, Alt, and Shift are also possible.
There is a small catch. Windows does not apply hotkeys to a file or folder directly but only works with a shortcut file for the desired target. For applications that are listed in All Programs, a shortcut file already exists. For other files or folders, a shortcut file for the object in question will have to be created if one does not already exist. The shortcut file must be placed in either the All Programs list or on the Desktop or a folder on the Desktop.
How to assign a hotkey to an application
  1. Open the Start menu
  2. Find the application in the All Programs menu
  3. Right-click the desired program file and choose “Properties”
  4. In the Properties dialog, find the text box labeled “Shortcut key”
  5. Click in the text box and enter a key that you wish to use in your hotkey. Windows will automatically place “Ctrl + Alt +” in front. If you choose a function key or a numeric keypad key, only that key will be used and “Ctrl + Alt +” will not be added.
  6. Click "OK"
How to assign a hotkey to a folder or file not in the All Programs menu
  1. Create a shortcut file by right-click dragging the desired target file or folder to the Desktop (or to a folder on the Desktop) and choose “Create shortcuts here” from the right-click menu. (You can also use “Send to” but that will be covered in an upcoming tip.) You must create the shortcut exactly where you intend to keep it. If you create the shortcut one place and then move it, the hotkey won't work, 
  2. Right-click the new shortcut file and choose “Properties”
  3. Carry out steps 4-6 given above.
Scope of tip
I have used this tip on Windows XP, Vista, and 7. A comment below indicates that it also works in Windows 2000.



How Windows 64-bit Supports 32-bit Applications

Introduction
This article provides an overview of the Windows on Windows 64 (WOW64) sub-system and associated techniques that support 32-bit applications under Windows 64-bit.
 
Discussion

Windows 32-bit on Windows 64 (WOW64)

WOW64 emulates 32-bit Windows

Under Windows 64-bit, 32-bit applications run on top of an emulation of a 32-bit operating system that is called Windows 32-bit on Windows 64-bit, or WOW64 for short.  WOW64 intercepts all operating system calls made by a 32-bit application.
For each operating system call made, WOW64 generates native 64-bit system calls, converting 32-bit data structures into 64-bit aligned structures. The appropriate native 64-bit system call is passed to the operating system kernel, and any output data from the 64-bit system call is converted into a format appropriate for the calling application before being passed back.
Like 32-bit applications, WOW64 runs in user mode so any errors that occur in translating an operating system call will only occur at that level. The 64-bit operating system kernel cannot be affected.
Since WOW64 runs in user mode, all 32-bit application code must also run in user mode. This explains why 32-bit kernel mode device drivers and applications that rely on them, will not work under Windows 64-bit.
The WOW64 emulator consists of the following DLLs, the only 64-bit DLLS that can be loaded into a 32-bit process:
Wow64.dll – the core emulation infrastructure and the links to the Ntoskrnl.exe entry-point functions.
Wow64Win.dll – the links to the Win32k.sys entry-point functions.
Wow64Cpu.dll – switches the processor from 32-bit to 64-bit mode.
Ntdll.dll – 64-bit version.
Wow64.dll loads the 32-bit version (x86) of Ntdll.dll and all necessary 32-bit DLLs which are mostly unmodified 32-bit binaries..However, some of these DLLs have been modified to behave differently on WOW64 than they do on 32-bit Windows. This is usually because they share memory with 64-bit system components.

WOW64 manages file and registry settings

In addition to handling operating system calls, the WOW64 interface needs to ensure that files and registry settings for 32-bit applications are kept apart from those for 64-bit applications. To achieve this two mechanisms are used, File and Registry Redirection and Key Reflection. Redirection maintains logical views of the data as if it were in 32-bit Windows and maps it to the correct physical location. Reflection ensures that 32-bit and 64-bit settings will be consistent where that is required.

File Redirection

File redirection ensures that there are separate folders for program and operating system files for 32- and 64-bit applications.
32-bit applications files are installed into
C:\Program Files(x86)

32-bit system files are installed into
C:\WINDOWS\SysWOW64

For 64-bit applications, files are installed to:
C:\Program Files
C:\WINDOWS\SYSTEM32

The WOW64 file redirector ensures that requests from 32-bit applications to open files in C:\Program Files or C:\WINDOWS\SYSTEM32 are redirected to the appropriate 32-bit directories.
There is one issue with file redirection that users and developers should be aware of.
Many 64 bit applications still use 32 bit installation routines. To ensure that an application is installed correctly, i.e. to C:\Program Files, the installation routine should make an operating system call to temporarily suspend the WOW64 file redirector. After installation another operating system call needs to be made to re-enable the redirector. If this approach is not followed then the application will be installed to C:\Program Files (x86). A classic example of this is the 64 bit development version of Firefox 3.5, codenamed Shiretoko, which is installed to C:\Program Files(x86)\Shiretoko. Firefox still functions correctly, the only thing you can't do is change the icon for the application.

Registry Redirection

Registry keys specific to 32-bit applications are redirected from:
HKEY_LOCAL_MACHINE\Software

to:
HKEY_LOCAL_MACHINE\Software\WOW6432Node

You may also occasionally see Registry entries elsewhere although this is unusual
HKEY_CURRENT_USER\Software\WOW6432Node

This approach allows both the 32-bit and 64-bit versions of an application to be installed side-by-side without overwriting each other’s settings.

Registry reflection

Some redirected keys and/or values are also reflected. This means that if a 32-bit application makes a change to the redirected section of the registry, that change is also made to the 64 bit part of the registry, and vice-versa. Key reflection uses a policy of last writer wins. For example, if I install three applications with the same file extension then the last one to be installed will be associated with that extension.
  1. Install a 32-bit application that associates itself with the file extension XYZ.
  2. Install the 64-bit version of this application that associates itself with the file extension XYZ.
  3. Install another 32-bit application that associates itself with the file extension XYZ.
Double-clicking on a file with the extension XYZ in Explorer would load the application installed in step 3, as it was the last one to associate itself with this extension.
All of this is done transparently for 32-bit applications by WOW64, which, in intercepting calls to the operating system, detects references to file paths and registry keys and maps them accordingly.

WOW64 has several limitations

Some but not all 64-bit features are available to 32-bit applications
WOW64 provides 32-bit applications with access to some features of 64-bit systems. For example, applications can have more memory up to 4GB with the correct setting.. Other features are more limited due to overheads and restrictions. For example, 64-bit Windows will support logical 64 processors but 32-bit applications are restricted to the usual 32 logical processors.
Code Injection cannot mix between 32-bit and 64-bit
Under 64-bit Windows it is not possible to inject 32-bit code into a 64-bit process, nor is it possible to inject 64-bit code into a 32-bit process. Applications that rely on code injection to add functionality to existing applications will usually not work.
This explains why most 32-bit shell extensions do not work under Windows 64-bit. The majority of shell extensions rely on code injection to add themselves to Windows Explorer.

WOW64 does not support 16-bit installers

WOW64 provides support for Microsoft's 16-bit installer - by substituting a compatible 32-bit installer - but does not extend this support to third-party products.

Further options for running 32-bit applications with Windows 64-bit

Windows Virtual PC

Windows Virtual PC is free software that provides an environment that will support legacy hardware and software that will not work under Windows 7. Guest operating systems (OS) can run in a virtual machine which means they are not aware that they are running under another operating system.
The system requirements and features vary significantly between versions of Virtual PC and versions of Windows so check before you try Virtual PC. The latest version is, perhaps, the most limited with no support for operating systems before the current supported version of Windows XP which is Service Pack 3.

Windows XP Mode (XPM)

Windows XP Mode  is a specific implementation of Windows Virtual PC that comes with a pre-installed, licensed copy of Windows XP Professional with Service Pack 3. It is only available with the Enterprise, Ultimate and Professional editions of Windows 7 64-bit so you are expected to upgrade to these versions if you want it.
Many who have used XPM advise that it should be used as a last resort. It will provide legacy support if you have no other options but, compared to other virtualization products, performance is disappointing and the default configuration raises a number of security issues.

Dual boot Windows

You can install more than one version of Windows on the same computer by dual booting.For the purposes of this article, you would install a 32-bit version and a 64-bit version alongside each other. Each operating system is installed into its own disk partition and a boot manager is installed on the default partition to ensure that you can choose which operating system you want to use at startup.
Although you cannot use both operating systems at the same time it is a useful option because the entire computer is dedicated to the running operating system. Compared with virtual machines, there are no issues of compatibility and much less complexity in both installation and operation. You can also retain the ability to run 16-bit applications under the 32-bit version of Windows.
Summary
Most 32 bit applications will run quite happily under Windows 64. The main exceptions are:
  1. 32-bit device drivers.
  2. Applications that cannot function without the 32-bit device drivers that they use. Prime examples are antivirus, antimalware and firewall applications.
  3. Application extensions that rely on code injection into, for example, Explorer.
Some applications may work with reduced functionality. These include uninstallers, registry cleaners and tweaking programs, amongst others, since they only have access to that part of the Registry made visible to them by WOW64.
If you cannot run your 32-bit applications then consider virtualization or dual-booting with the old and new operating systems both installed.

Which runs faster 32-bit or 64-bit applications?

This question is asked a lot and there is no general rule because it depends on the application and which CPU features they use.
If we compared 32-bit and 64-bit applications in their native environments then 32-bit application usually use less memory than the equivalent 64-bit application because 64-bit versions use 64-bit values so they take up twice the space. The extra size affects the application startup and shutdown times and other activities that involve accessing the disk drives. Usually this means that the 32-bit application will run faster but 64-bit applications can access new and faster features in the 64-bit CPUs potentially giving improvements of up to 25% in processing speed.
Once both 32-bit and 64-bit versions of a program are running on 64-bit Windows you have to ignore any performance on a 32-bit CPU. The 32-bit application now requires WOW64 to run so that should be included in any performance comparison. This means you need to include all the duplicated resources used to map the 32-bit application to the 64-bit environment it runs under. Duplicated resources are used for memory mapping and redirection of files locations and registry entries. The result is that the 32-bit application uses more memory and runs slower than on an equivalent 32-bit CPU but it may still be faster than the 64-bit application.
 
Related Links
 
Editor
This software category is maintained by volunteer editor Remah.
 "I have used TechSupportAlert and the older Support Alert Newsletter for almost a decade so I have saved hundreds of hours of work and many more dollars by following Gizmo's Freeware recommendations. Thanks for the opportunity to give something back." 
If you have had a similar experience then you should consider becoming a reviewer too.
Tags
Windows on Windows 64, WOW64, 32 Applications under 64 bit Windows, 64 bit Windows Vista, 64 bit Windows 7, Windows Virtual PC, virtualization, dual boot, Securable

Friday, 7 November 2014



How To Remove All Your Google Web History?
Remove entire Google Web History

As most of you already know, Google keeps a tab on pretty much everything you do on a Google site, provided that you signed in on any one of these websites. Everything you do is recorded, and can be used against you in the future. Search data can reveal particularly sensitive information about you, such as facts about your location, interests, age, religious views, and so on. You can, however, choose to not be so vulnerable, and can remove all of your Google web history to protect yourself from an unforeseen eventuality.

In this post, I'll show you how to remove your entire Google web history.


Before we begin, please note that any data you remove will be deleted permanently. Google keeps a lot of useful information that helps you find what you're looking for faster. It gives you quick access to webpages you've visited in the past, and even lets you know in search results which pages you've visited, and when. This information can be useful if you're a power user, and like to get things done quickly.
Google Web History


But if you still want, you can go ahead and erase your entire web history. You can also pick and choose individual items to remove, so that you won't lose everything.

Delete your Google Web History

Follow these steps to partially or completely.
  • Step 1: Visit your Google History page at https://www.google.com/history. Alternatively, you can click the gear icon  on the upper right corner of a search results page, and then go to Search history.
  • Step 2: Click on the gear  icon again, and then go to Settings.
Settings
  • Step 3: Click on the delete all link. You'll be prompted for a confirmation. Click on Delete all again, and your entire search history is gone!
  • Step 4 (optional): Click on the Turn off button on the Settings page to stop Google from storing your history again


If you don't want to delete your entire history, you can select individual items from the History main page, and delete them. This, by no means, implies that Google has nothing more to do with your data. They still keep some of your information on their servers for auditing and other such purposes. But at least your personal data is off the line now, and isn't susceptible to leaking out into the wrong hands.

Rest easy :)

Tuesday, 14 October 2014




Download Sahi Bukhari Sharif in Urdu and Arabic This is available in 6 Volumes Download here and open in Adobe Reader, Adobe Acrobet and other PDF Readers.   Click Here to DOWNLOAD .pdf format A02a-Sahih_Al-Bukhari_3D
  1. Volume 1
  2. Volume 2
  3. Volume 3
  4. Volume 4
  5. Volume 5
  6. Volume 6




Download The Holy Quran with Urdu Translation

 Click Here to Download in PDF Format

Holy-Quran-With-Urdu-Translation-By-Syed-Riaz-Hussain-Shah_04




Cyber Crime or computer crime includes any criminal act which deals with computers or networks. All such crimes are operated in order to abuse the electronic media or to influence the functioning of computer or networks.


cyber-crime

Performing crime with computer systems is called computer hacking or simply Hacking. And the person who has accepted hacking as his lifestyle is called a Hacker. Computer Hacking is the most popular form of today hacking. It exists in computer security but also in many other forms such as phone hacking, call intercepting, social media’s password hacking and data divergence etc. Hacking is becoming very popular and spreading very rapidly now-a-days, as there is always some reason behind something. Similarly, in hacking, Hacker has some goals or missions. If a Hacker is hacking some-where it means that he has some reasons or some objectives in his mind.
There are many reasons due to which people become hackers and hence they hack into different organizations, institutes and many computers as well as over the internet.
cyber-crime-vpnchoice-dot-com

Here, I am showing you some reasons of hacking:
  • Defacement: to deface or delete some contents/information e.g. documents/data files.
  • Planting viruses: to put viruses (malwares) which result damage or disabling of a computer network.
  • Getting passwords: this is the most popular hacking as people tries to get password of others so-that they may see their emails, chats etc.
  • Steal information: to steal personal information or data of an organization or agency.
  • Monetary loss: to make monetary loss by hacking pin code of debt cards and ATM’s etc.
  • Damage others: to damage other devices and self safety.
For security reasons: special police and agencies, national security and defense department use hacking for the sake of catching criminals and for other objectives as well. Now the question arises that who are hackers? It is not easy to recognize but they are often found in following forms. They may be employees of some organization, as they wanted to deface documents against them so as they get personal benefits. Hackers may be teenagers, teenagers usually hack passwords to get money and to make fun as well as they wanted to get university documents; papers etc. Political Activists hack the information of other parties for sake of getting or defacing blunders of corruption etc. There are some professional hackers also. They are professionally trained and are highly skilled in computer hacking and cyber crimes. They work for organizations, defense departments and intelligence/ investigation agencies etc. Some hackers earn money by hacking and they adopt it as their profession. Victims of hacking are ‘Gullible People, Desperados and greedy people, unskilled and inexperienced people, unlucky people, celebrities and famous people and sometimes Government’ J There are several documented cases of hacking. Wiki-leaks is the example of hacking in which secrets of Government were exposed L According to a web portal in 2000 eBay, Amazon and Yahoo was hacked between February 6 to February 12 by a hacker. There is another example of hacking a bank in 1995 by a Russian Vladimir Levin. He stole about $10 million.
cybercrime-top-20-countries-pie-chart

Hacking doesn’t depict ethics of any religion. Its
against the ethical values and it creates anxiety and unpleasantness. There are no as such rules or ordinance which is able fully uproot cyber crime. In cross its ratting is increasing day by day. Mr. Binyamin Mughal see also on Binyamin g+

Monday, 13 October 2014



Visit the following link and watch news channels free online.

Select any of the below channel


















Sunday, 12 October 2014



How to Write a Comparative Analysis


How to Write a Comparative Analysis. Few college students are able to avoid the infamous comparative analysis paper, also called a "compare and contrast essay." This academic standby requires you to compare two things--whether you're analyzing two different governmental policies or two different Shakespearean sonnets. The key to writing a successful comparative analysis is to establish a good thesis and organizational scheme before you start writing. Read on to learn more.


Step 1
Start with a frame of reference--a basis for comparison. Sometimes the assignment provides this to you by asking you specifically to compare the use of propaganda in two different governments--rather than just to compare two governments--or the way a novelist uses physical descriptions to characterize two of her protagonists, rather than just to compare these characters. If your professor doesn't provide a specific means of comparison, you'll need to come up with this on your own.
Step 2
Make a list of the similarities and differences between the two things you're comparing. As you do this, remember that your goal from this exercise will be to craft a thesis--an argument about how the two things are similar and/or different.
Step 3
Write your thesis. You might want to do some brainstorming on paper before you come up with a thesis, or another prewriting technique like clustering. Another good way to come up with a strong thesis is to discuss your topic with another classmate and bounce ideas off of him.
Step 4
Outline the rest of your paper using one of the following two effective ways to organize a comparative analysis. One is to write several paragraphs about the first subject, and then a few paragraphs on the second subject you're comparing the first one to, noting similarities and differences. The second is to write a paragraph about the first subject, then a paragraph about the second--noting how the second differs or is similar to the first one. You repeat this process of alternating from one subject to the other until you have touched on all of the similarities and differences that you wish to compare and contrast.
Step 5
Write a conclusion that goes over the gist of what you discussed in the previous paragraphs and reinforces your thesis.
Step 6
Carefully proofread before you submit your work. Also make sure you've cited all sources properly, using APA or MLA style--or whatever style guide your professor has asked you to rely upon.

Tips

Read a few comparative analysis papers before writing one, so you'll understand the genre.Talk to your professor and/or a writing tutor as you begin thinking through ideas for your paper. The best time to get help on a writing assignment is while you're in the process of writing it--not when you've done a first draft that needs reworking. It's better to get a handle on the topic before you start drafting it.

Friday, 10 October 2014



Libertagia Online Work Video Guide

Libertagia Online Work Video Guide: This video include all the guide regarding online woriking with Libertagia.see this video and ask for any qurries and comments for that.


                                    Register free

What is Libertagia??

Salam Friend hope you are all good :).... before some time i was make a blog for you but its not effected because some people was can't understand how to work on it now we have first time tutorials in urdu its mine tutorial for All of you :)


PART 1

                     
                      libertagia introduction ( what Is Libertagia... by Binyamin Mughal



 Register free


PART 2

                      
                     how to register on libertagia part 2/4 by Binyamin Mughal



PART 3

                    
                   how to approve your account in libertagia... by Binyamin Mughal


 Register free



PART 4

                     
                     how to work on libertagia and how to make... by Binyamin Mughal



                           Register free


Other Questions and their answers:
Final Concepts


                       
                       Libertagia All Concepts Clear by Binyamin Mughal




How to make Libertagia account ?
How to approve Libertagia account ?
How to work and earn with Libertagia ?

All these questions are answerd in this video.