Sunday, 9 March 2014

How to Change the Displayed Name of the Processor in Windows 7, XP, and Vista

Step One: Open up the Registry editor (RegEdit).
First, click Start, and search RegEdit (Windows 7/Vista). Open up regedit when the search has found it.

Step Two: On the left hand column in Registry Editor, open HKEY_LOCAL_MACHINE, under it,
open up: Hardware->DESCRIPTION->System->CentralProcess

Step Three: Now you can see a few lines of text on your right side in Registry Editor. Double-Click the one that is named "ProcessorNameString". A small box will pop-up, and you can change the processor's name to anything you like. After your done, press enter and close Registry Editor.

Step Four: Now we will see what we have changed under Windows.
Open Start, and Right-Click Computer, then click Properties in the Context Menu

Step Five: You can see your processor name changed to what ever you changed it to .

Troubleshooting: If the processor name did not change, Do step one, but on Step Two, instead of going into the number 1, go into number 0, and follow the rest of the Tutorial

Full Virus Guide (Explaning Everything)

A virus is a piece of software designed to infect a
computer system. The virus may do nothing
more than reside on the computer. A virus may
also damage the data on your hard disk,
destroy your operating system, and possibly spread
to other systems. Viruses get into your
computer in one of three ways: on contaminated
media (floppy, USB drive, or CD-ROM),
through mail and peer-to-peer sites, or as part of
another program.
Viruses can be classified as polymorphic, stealth,
retroviruses, multipartite, armored,
companion, phage, and macro viruses. Each type of
virus has a different attack strategy
and different consequences.
Many viruses will announce that you're infected as
soon as they gain access to your system.
They may take control of your system and flash
annoying messages on your screen or
destroy your hard disk. When this occurs, you'll
know that you're a victim. Other viruses
will cause your system to slow down, cause files to
disappear from your computer, or take
over your disk space.
You should look for some of the following
symptoms when determining if a virus infection
has occurred:
The programs on your system start to load more
slowly. T his happens because the
virus is spreading to other files in your system or is
taking over system resources.
* Unusual files appear on your hard drive, or files
start to disappear from your system.
Many viruses delete key files in your system to
render it inoperable.
* Program sizes change from the installed versions.
This occurs because the virus is
attaching itself to these programs on your disk.
* Your browser, word processing application, or
other software begins to exhibit unusual
operating characteristics. Screens or menus may
* The system mysteriously shuts itself down or
starts itself up and does a great deal of
unanticipated disk activity.
* You mysteriously lose access to a disk drive or
other system resources. The virus has
changed the settings on a device to make it
* Your system suddenly doesn't reboot or gives
unexpected error messages during startup.
This list is by no means comprehensive.
A virus, in most cases, tries to accomplish one of
two things: render your system inoperable
or spread to other systems. Many viruses will
spread to other systems given the chance and
then render your system unusable. This is common
with many of the newer viruses.
If your system is infected, the virus may try to
attach itself to every file in your system
and spread each time you send a file or document
to other users.
Viruses take many different forms. The following
sections briefly introduce these forms
and explain how they work. These are the most
common types, but this isn't a comprehensive
Types of viruses

Armored Virus
An armored virus is designed to make itself difficult
to detect or analyze. Armored viruses
cover themselves with protective code that stops
debuggers or disassemblers from examining
critical elements of the virus. The virus may be
written in such a way that some aspects of the
programming act as a decoy to distract analysis
while the actual code hides in other areas in
the program.
From the perspective of the creator, the more time
it takes to deconstruct the virus, the
longer it can live. The longer it can live, the more
time it has to replicate and spread to as
many machines as possible. The key to stopping
most viruses is to identify them quickly
and educate administrators about them the very
things that the armor intensifies the
difficulty of accomplishing.

Companion Virus
A companion virus attaches itself to legitimate
programs and then creates a program with a
different filename extension. This file may reside in
your systems temporary directory. When
a user types the name of the legitimate program,
the companion virus executes instead of the
real program. This effectively hides the virus from
the user. Many of the viruses that are used
to attack Windows systems make changes to
program pointers in the Registry so that they
point to the infected program. The infected program
may perform its dirty deed and then
start the real program.

Friday, 15 November 2013


* Google : Sept 4, 1998
* Facebook : Feb 4, 2004
* YouTube : Feb 14, 2005
* Yahoo ! : March 1994
* Baidu : Jan 1, 2000
* Wikipedia : Jan 15, 2001
* Windows Live : Nov 1, 2005
* : 1994
* Tencent QQ : February 1999
* Twitter : March 21, 2006

Wednesday, 13 November 2013

Win 8 Keyboard Shortcuts

Who R Using Win 8 ??
Some Keyboard Shortcuts 4 them...
Windows key – brings up the Metro start screen. You can start typing to search for an app, just like the Win7 start menu.
Win + D – brings up the old Windows desktop.
Win + C – brings up the Charms menu, where you can search, share, and change settings.
Win + I – opens the Settings panel, where you can change settings for the current app, change volume, wireless networks, shut down, or adjust the brightness.
Win + Z – opens the App Bar for the current Metro application.
Win + H – opens the Metro Share panel.
Win + Q – brings up the Metro App Search screen.
Win + W – brings up the Metro Settings search screen.
Win + F – brings up the Metro File search screen.
Win + K – opens the Devices panel (for connecting to a projector or some other device)
Win + , (comma) – Aero Peek at the desktop.
Win + . (period) – Snaps the current Metro application to one side of the screen. (Right side)
Win + Shift + . (period) – Snaps the current Metro application to the other side of the screen. (Left side)
Win + J – switches focus between snapped Metro applications.
Win + Page Up / Down – moves the current app to the other monitor.
Win + Tab – opens the Metro application switcher menu, switches between applications.
You might notice that we didn’t show screenshots of how all these shortcut keys work, and there’s a reason for that: you need to test them out for yourself to really learn how they work.
Win+X – lunch kind of start menu, very useful
Windows Key + Print Screen saves a screenshot into your Pictures folder. It’s quite handy.


1- www.driverzone. com
2- www.opendrivers .com
3- www.notebook-dr
4- www.notebookera .com
Note- First 2 websites are best for your laptop drivers

Tracing facebook user

Someone has made your fake account….Don’t Worry…..Tracingfacebook user..
First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).
note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
When command prompt opens Type the following command and hit Enter.
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s.
The Next Step is to Trace that user using his IP address.
To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.
Other netstat commands:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p option may be used to specify a subset of the default.

Saturday, 27 July 2013

Cybersecurity: US needs to build partnership with India

Times of India 

The US needs to build up partnership with India on cybersecurity issues, eminent American experts have said, noting that New Delhi faces threat in the cybersphere from Pakistan, China and non-state actors.

"The Indians' primary concern in cybersecurity is with Pakistan and Pakistani non-state actors or state-sponsored actors launching some kind of attack against India. Their second concern is Chinese espionage," James Lewis, Director and Senior Fellow, Centre for Strategic International Studies' Technology and Public Policy Programme, told lawmakers during a Congressional hearing.

"One of the things that works in our favour is they aren't particularly friends with the Chinese all the time, and they worry a lot about it. So we have an opportunity to work with India. The thing we have to avoid in doing that is giving the impression that we're trying to contain China," he said.

"The Chinese worry about this a lot. We do need to build up partnership with India, but we have to do it in a way that doesn't appear to be deliberately trying to contain China," Lewis said in response to a question during a hearing of the Asia and the Pacific Subcommittee of the House Foreign Affairs Committee on 'Asia: The Cyber Security Battleground'.

Karl Rauscher, Chief Technology Officer and Distinguished Fellow, at the East West Institute, said New Delhi's decision to create this National Cyber Coordination Centre is in the right direction.

Noting that India is recognised as the leading producer of international spam, he said: "Their co-ordination with external experts to root out these botnets and sources of spam is really critical not only for India but for the rest of the world, particularly English-speaking countries."

Congressman Steve Chabot said, "Cooperation with India is an important aspect of US efforts to rebound towards Asia, especially in regards to trade and military cooperation."

Sample Text

Muthukumar. Powered by Blogger.

About Me

My Photo
Hi i am Muthu kumar,software engineer working on PL/SQL,ASP.Net,VB.Net,C#.Net,SQL Server.