Thursday, August 8, 2013

What is Web Hosting?

 Since its inception in 1991, internet is flourishing tremendously and cheap web hosting providers are responsible for all this development. Immense development has been achieved over the course of last 11 years. Its relation with World Wide Web is also very important. We can say that with the e-commerce, entertainment and plenty of opportunities, web hosting is one of the greatest technical innovations of our time. World Wide Web revolutionized the internet world within short span of time.
In the early days, internet was confined to the computer experts, universities and government agencies. But with technological development and affordability of acquiring personal computer, internet usage becomes more common. The concept of web hosting also came on the cyber scene during this evolutionary period. Web hosting made it much easier for the consumers to obtain the domain names and web pages. The web hosting supported the static pages and dynamic pages at the same time. Web hosting companies provide the space for the web sites on their server. They also provide internet connectivity.  Free email address search website.
     Web hosting used to be very simple yet expensive at the early stages of its inception. Responding to the diverse needs of customers, web hosting too becomes more technical and a bit complex. Now its quiet an easy thing to build and administer a web site. Web hoisting has also become competitive. There was a time when web hosting was only considered to be corporate sector or institutional solution. Today, everyone can make his own website and for personal as well as for business purpose.
     Web hosting was quite simple in the beginning but it has now become more diverse. It has so many different solutions and packages that one need to master it to make good use of it. The advent of audio-visual applications has added great freedom of entertainment to web hosting world. Web hosting is catering to whole world.
Most popular hosting service in India is Hostgator.
  Web hosts provide many facilities in web sites. You can have the data center space and internet connectivity with the web hosting. There are various types of web hosting like dedicated web hosting, shared hosting and collocation hosting etc. All these web hosting are good and the selection of the web ghosts depend on the needs and requirements of your business and web sites. Web hosting has brought a new concept to online world and has taken-away all the worries, hassles and complexity of managing website.

Monday, August 5, 2013

How to browse internet safe?

It's an ongoing battle -- companies large and small do their best to track our Web browsing habits, while we do our best to keep our surfing as private as possible. That's why it was so huge when the major browsers started rolling out "private mode" browsing. Finally, we could click a mouse and become invisible…right?
Not so fast.
Private mode, or "porn mode" as it's sometimes derisively called, isn't really as private as you might think. Depending on what you want to use privacy features for, it may be just what you need, but it's not a cloak of Web invisibility, and if you don't understand exactly what it does and doesn't do, you could find yourself pretty embarrassed.

What Does Private Mode Do?

In a nutshell, Private Mode prevents your browser from saving information locally. In every major browser, private mode does two very cool things: clear cookies and wipe your history and temporary files. The former keeps sites, advertisers and other entities from tracking your browsing. The latter prevents, say, your partner from finding out that you just spent the last two hours looking for decorations for a surprise party. (Hey, you can use private mode for good as well as evil!)
On the other hand, if you can't hand off cookies, game sites might not track your scores and items you buy may not stay in your shopping cart for later purchase. Disabling your history means the next time you want to find a site, your address bar won't autocomplete the URL for you. If you've enabled saved passwords in your browser, that functionality won't apply to passwords you enter during a private session, so make sure to remember any passwords you create while incognito.
While you can individually control how your browser handles cookies and history, Private Mode lets you disable them on demand without having to change individual preferences.

Safari

Apple was the first to add a "private mode," called Private Browsing, back in 2005. Private Browsing is easy to find in the Safari menu. You'll be asked to confirm whether you really want to browse privately. Strangely, Safari doesn't ask you to confirm when you want to stop. While you browse privately, Safari will accept temporary cookies so that you can log into sites or make purchases, but when you disable Private Browsing those cookies are tossed.
In addition to clearing cookies and blocking history, Private Browsing also clears completed downloads from Safari's Downloads window, and any search terms and URLs you type disappear after you delete them from the Address Bar, so that the Autocomplete function doesn't come back to haunt you. Safari will also suspend syncing with iCloud for the duration of your session.

Internet Explorer

Microsoft calls its privacy mode "InPrivate Browsing," and also sweeps clean all traces of your browsing when you're done. Unlike Safari, which puts the entire browser into privacy mode, IE enables you to open private tabs while browsing normally in others. This opens up new uses for the feature, such as signing into two Gmail accounts at the same time.
To open an InPrivate tab in Windows 10 within the Windows UI, choose "New InPrivate Tab" from the tab bar "…" menu. Otherwise, choose "InPrivate Browsing" from the Tools menu.
If you are using Internet Explorer 9, right click on the Internet Explorer icon in the task bar and choose "Start InPrivate Browsing."

Chrome

When you choose "New Incognito Window" from the Chrome menu, you'll enter the feature Google calls "incognito mode." Like other browsers, Chrome will accept cookies during your incognito session but delete them when you close the windows. It will also scrub your browser and search histories. Like IE, Chrome allows you to open both incognito and regular windows at the same time, so be careful that you don't inadvertently use a regular window for your "private" browsing.
Another gotcha you might encounter with Chrome is its connection to Google's Web properties: if you sign into your Google account from an incognito window, your subsequent searches will be saved in your online Google Web history. To completely cover your search tracks, you must disable Web history in your Google account.

Firefox

Private Browsing in Firefox covers all the usual bases, leaving no cookies, cache or history when you're done. Firefox also adds the option to always start in Private Browsing mode in the browser's Preferences window. For per-session privacy, choose "Start Private Browsing" from the "Tools" menu.

What Doesn't Private Mode Do?

The largest flaw in Private Mode is that sites can still track your browsing using your computer's IP address. What's more, so can your Internet Service Provider and your employer's IT department. For that reason (among others), Private Mode browsing isn't for surfing forbidden sites while on the job, for example. Your own home's router can even betray you if you -- or someone else -- set it to log usage.
Private Mode usually doesn't block cookies entirely, so your web activities can be tracked during your private session. Most browsers also offer a "do not track" preference, although bear in mind that "do not track" works a lot like "do not call" -- it relies on other parties to respect the request. Bottom line: Don't trust that you are not being tracked.
If you've downloaded any files during your private session, those files will remain on your computer until you manually delete them. Same for any bookmarks you make while you're incognito. Older browser versions didn't scrub Flash cookies, so update to the latest version for the best privacy.
Finally, private mode won't protect you from malicious software that spies on your browsing habits, and as Google warns you when you open an incognito window, you'll still have to look out for people standing behind you.

What is an IP address?

Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.
Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).

Monday, July 29, 2013

How to perchase used electronics items?

Research the product itself. Some products last a long time, some do not last as long. Also, there are versions of particular products that may have a known fault to them. Read online reviews, then you can ask the owner questions to get an idea of if the product may have these problems. For example, let's say a certain electronic shows several complaints about the handle coming off, or the unit overheating when it sits idle for a few minutes--you can look closely at the used electronic in person to see if these defects are present. If you hadn't done the preliminary research, you would've never known to look! Another thing to consider, what does the device come with if you buy it new? This way, you'll know if there is anything missing, and the price should be adjusted to suit.

Become familiar with the lingo. A refurbished product hasn't necessarily been used; it may have been sent back to the manufacturer for a cosmetic reason, fixed accordingly, and sold as refurbished (often with a manufacturer's warranty). A reconditioned item, on the other hand, has been used and fixed up; they usually come with a warranty from the company who's selling it, but not from the manufacturer.

Ask about who fixed or refurbished the product. If the manufacturer did it, then there is less risk involved than if it was done by a third party. You might also be able to find out what about the product was fixed or changed.

 Make sure the product comes with a decent warranty. If you are buying from a retail chain or other reputable sellers ,chances are there will be a warranty of some sort provided. Find out how long this lasts and what it covers. Can you buy additional coverage? If so, for how long and how much does it cost? Even if you choose not to get the extended warranty, the fact that it's offered might indicate the company or manufacturer's confidence in the product. A short warranty (about 6-months and under) could indicate a lack of confidence in the product.

 Ask about return and exchange policy. Most reputable places won't even ask questions if you return a product within a month or so.

If possible, test the product before buying it. If you are buying from someone besides a retail chain, this is especially important. While this won't guarantee that it won't break later, it at least makes sure that you have a currently working product.

Hold on to any receipts and/or paperwork you received. If you have any sort of warranty for the product, you will need this to receive a repair or replacement. This is especially important if you are paying with cash. Only a receipt can prove that you purchased it and when. Keep that receipt in a safe place for at least as long as the warranty lasts. You never know when it can come in handy.

Saturday, June 29, 2013

List of Delhi Gurdwra

Historical Gurudwaras in Delhi

GURUDWARA SHRI BALA SAHIB, DELHI
GURUDWARA SHRI DAMDAMA SAHIB, DELHI
GURUDWARA SHRI SHAHIDI ASTHAAN BABA BANDA SINGH JI BAHADUR SAHIB, DELHI
GURUDWARA SHRI BANGLA SAHIB, DELHI
GURUDWARA SHRI MATA SUNDRI JI, DELHI
GURUDWARA SHRI NANAK PIAO SAHIB, DELHI
GURUDWARA SHRI MOTI BAGH SAHIB, DELHI
GURUDWARA SHRI RAKAB GANJ SAHIB, DELHI
GURUDWARA SHRI SISGANJ SAHIB, DELHI
GURUDWARA SHRI MAJNU KA TILLA SAHIB, DELHI

Sunday, June 23, 2013

Wonderful Search Engine PolyCola.com

PolyCola, previously known as GahooYoogle, is a metasearch engine that searches multiple search engines at once was created by Arbel Hakopian.
It was started with the domain www.GahooYoogle.com in 2005. When it was first known to the public, it was discussed in BBC radio, was chosen at HotSite by USA Today and managed to have entries in Fox News Channel. However, the site was shut down due to legal problems. GahooYoogle.com had a legal problem, so after the shut down, the site was moved to Yahoo! with the order made by the court after being an issue for couple of years. After the shut down, the creator, Arbel Hakopian, decided to expand his original idea of GahooYoogle.com and came up with the idea of PolyCola.com; currently it is operating with the address www.polycola.com. The new and improved PolyCola.com lets searchers to minimize the time and problem they might have in using multiple search engines.

Saturday, June 22, 2013

Norton Ghost 15.0 Backup and Recovery

Norton Ghost 15.0 - This newest version of Norton Ghost automatically backs up and recovers everything on your computer! A very powerful imaging software program that can help you take care of all those bytes, megabytes and gigabytes that are stored in your computer. Taking care of all those bits and bytes isn't an easy task without the help of a program like Ghost.
Too many unexpected things can happen to your computer that would make you wish you had this program. If your hard drive crashed, Ghost would be there to restore your data to a new drive. If the Operating System (Windows) crashed, Ghost can restore it back to a working state in minutes! Ghost can automatically backup and restore all of those bits and bytes on your computer.
Did you ever stop and think what would happen if the hard drive crashed and you lost all your gigabytes of data? Think of all the data you have stored within those bits and bytes. You probably have some music, probably a lot of digital photos, not counting all of the financial or personal documents that may be stored on the drive. What would you lose if you lost millions of bytes of data?
What if the Operating System crashed? You know all the data is still there somewhere but you just wouldn't be able to use it. With Norton Ghost you could restore the image and have those bits and bytes working together again in no time.
Norton Ghost does backups on the fly without restarting your system. It also backs up your data to almost any media including USB and Firewire devices. Ghost also has a wizard that will walk you through the backup and imaging process and will trigger backups after a new software installation or system change. Losing gigabytes of data is no fun, don't wait until it is too late.
Symantec, the maker of Norton Ghost 15.0 is a world leader in protecting your computer.
Norton Ghost 15.0 offers exclusive remote backup management, industry leading encryption and advanced compression. Norton Ghost 15.0 is an ideal solution for people who want advanced backup and recovery tools to protect their computers and everything on them. Here are some of the new features of Norton Ghost.
  • FTP backup - Copies recovery points to a FTP site for easier offsite backup management
  • Offsite backup - backs up your files to network-attached storage devices.
  • Symantec ThreatCon integration - Leverages intelligence from Symantec's industry-leading security research organization by triggering incremental backups whenever ThreatCon reaches a specified threat level. Great for computers without antivirus protection.
  • EXCLUSIVE! Google Desktop integration - Makes data recovery even faster with searchable backup indexes

Ghost 15.0 Basic Features

  • Automatically creates an initial backup schedule based on your computer's configuration.
  • Automatically detects storage devices, analyzes your system, and offers "best practice" backup advice during installation.
  • Automatically monitors and optimizes backup disk space.
  • Triggers backups on key events, like new program installations or user logins.
  • Creates new backups on demand with One Button "Back Up Now".
  • Encrypts backups to help keep them secure.
  • Task-based interface simplifies management and monitoring.
  • Displays all scheduled backups - plus the degree of backup protection for each drive on your computer - in one convenient view.