Monday 30 September 2013

Operating system

       by  Vijay kaushik

What Is An Operating System ??





An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a co.mputer system. Application programs usually require an operating system to function.An operating system is the single most important software when you run a computer, it is what takes care of pretty much everything on a computer system, while the majority of computers we see happen to be using one ‘type’ of operating system performing the same functions, operating systems can be branched into several different types as well

History Of Operating System 



Early computers were built to perform a series of single tasks, like a calculator. Basic operating system features were developed in the 1950s, such as resident monitor functions that could automatically run different programs in succession to speed up processing. Operating systems did not exist in their modern and more complex forms until the early 1960s. Hardware features were added that enabled use of runtime librariesinterrupts, and parallel processing. When personal computers became popular in the 1980s, operating systems were made for them similar in concept to those used on larger computers.
In the 1940s, the earliest electronic digital systems had no operating systems. Electronic systems of this time were programmed on rows of mechanical switches or by jumper wires on plug boards. These were special-purpose systems that, for example, generated ballistics tables for the military or controlled the printing of payroll checks from data on punched paper cards. After programmable general purpose computers were invented, machine languages (consisting of strings of the binary digits 0 and 1 on punched paper tape) were introduced that sped up the programming process .
In the early 1950s, a computer could execute only one program at a time. Each user had sole use of the computer for a limited period of time and would arrive at a scheduled time with program and data on punched paper cards and/or punched tape. The program would be loaded into the machine, and the machine would be set to work until the program completed or crashed. Programs could generally be debugged via a front panel using toggle switches and panel lights



Types Of Operating Systems 





Batch Processing Operating System




In a batch processing operating system interaction between the user and processor is limited or there is no interaction at all during the execution of work. Data and programs that need to be processed are bundled and collected as a ‘batch’ and executed together.

Batch processing operating systems are ideal in situations where:
- There are large amounts of data to be processed.
- Similar data needs to be processed.
- Similar processing is involved when executing the data.

The system is capable of identifying times when the processor is idle at which time ‘batches’ maybe processed. Processing is all performed automatically without any user intervention.

Real-time Operating System



A real-time operating system processes inputs simultaneously, fast enough to affect the next input or process. Real-time systems are usually used to control complex systems that require a lot of processing like machinery and industrial systems.


Single User Operating System


A single user OS as the name suggests is designed for one user to effectively use a computer at a time.


Multi-Tasking Operating System


In this type of OS several applications maybe simultaneously loaded and used in the memory. While the processor handles only one application at a particular time it is capable of switching between the applications effectively to apparently simultaneously execute each application. This type of operating system is seen everywhere today and is the most common type of OS, the Windows operating system would be an example.


Multi-User Operating System



This type of OS allows multiple users to simultaneously use the system, while here as well, the processor splits its resources and handles one user at a time, the speed and efficiency at which it does this makes it apparent that users are simultaneously using the system, some network systems utilize this kind of operating system.


Distributed Operating System


In a distributed system, software and data maybe distributed around the system, programs and files maybe stored on different storage devices which are located in different geographical locations and maybe accessed from different computer terminals.
While we are mostly accustomed to seeing multi-tasking and multi-user operating systems, the other operating systems are usually used in companies and firms to power special systems.




 

Thursday 5 September 2013

Trace Mobile Number with Name,location,operator

by @Sincere learner

 
 
 
In today's generation mobile is most important for daily life.And now a days every one is having mobile .so often the disadvantages are equal to the advantages.One major problem increasing day by day is getting MISS CALLS and prank calls.some times this may lead to serious issue.....
so for this problem i am writing an article  How can we trace mobile number?


Tracemobilephoneinindia

After my research i listed the best possible ways to trace mobile number.
To Trace Mobile Number with Name Scroll Down to Post

    1.Mobile telephone numbering in India:

    • Here in this we can see list of  of mobile numbers with location and telecom operator. all you need is to just search the list first four digits.
    • This process is bit confussing and takes some time.
    • click here to go to wikipedia page

    2.Trace mobile number by online:

    Here in this process you can trace mobile number by just entering  the number you want to trace in the search column click the below link to trace mobile number
    mobile+trace

    3. Download mobile number locator software :

     When you download mobile number locator software you can trace mobile number from your mobile 
    download here: Mobile number locator

    Now Check below method to trace with name

    Trace Name Using Mobile Number

    To Trace Mobile Number with Name: Click Here( True Caller ) and ENTER THE NUMBER
      

    Download True caller for your Mobile Now:



    @Sincere learner

    thanks  for  Read my blog..   <  keep  visiting  >


    join for more..  https://www.facebook.com/cyberarticles
     

    Tuesday 3 September 2013

    Beginner: How To Create a Virtual Machine in Windows 7 Using Virtual PC

    BY Vijay Kaushik


      Beginner: How To Create a Virtual Machine in Windows 7 Using Virtual PC
     
    <  special post for beginner  >


    header_vpc



    Microsoft Virtual PC is a free application that helps you create your own virtual machines inside your current operating system, so you can test software, or learn a new environment easily. Here’s how to get started


    Using Windows Virtual PC

    First, you need to download Virtual PC from Microsoft’s web site. You’ll want to make sure to select the right Windows 7 edition from the drop-down menu and then select Windows Virtual PC.

    It will ask you to install Virtual PC as a Windows software update.

    You will need to restart after the installation is done.

    After rebooting, you can find Windows Virtual PC in your start menu and select it to open the program.

    Click on Create virtual machine in the new window that opened.

    Now, you can write the name for your new Virtual Machine and the location to store the virtual machine file.

    In the next window, you can select the amount of RAM memory to assign to your virtual machine.

    In the next window, you will create a virtual hard disk where you will install your virtual operating system. You can select between a dynamically expanding virtual hard disk (it will grow according to your virtual machine space requirements), use an existing virtual hard disk or use advanced options.

    In the advanced options window, you can select to create a dynamically expanding hard disk (the hard drive will grow as your virtual machine needs), a fixed sized hard drive (you assign the amount of storage for it) and a differencing hard drive (the changes will be stored in a different hard drive so the original hard drive can be intact)
    We will use a dynamically virtual hard drive for this example.

    You can now select the location for your virtual hard drive in your computer and the name for it.

    As we selected the dynamically expanding virtual hard drive, we will specify the maximum storage space for it to grow in the next window.

    And that’s pretty much it!
    You have created a virtual machine and only need to install the operating system.
    You can go to Virtual PC again, and will find your new Virtual Machine. Right click on it to select the settings or click on the Settings menu.

    In the settings windows, you can specify where the installation disk for your new operating system is located to install it in your new virtual machine.
    Go to DVD Drive and select Access a physical drive if you loaded the installation CD / DVD in the computer’s Rom.
    Or select Open an ISO image to select an image with the installation files to install an operating system on your new virtual machine.



    Once you’ve started up the virtual machine, just follow through the normal installation prompts to create your virtual operating system.


    by @Sincere learner

    <<  kepp  visiting  >>










     

    Monday 2 September 2013

    Matrix Effect on your Desktop

    By @ Sincere learner

    matrix effect trick

    In this you will make a batch file in notepad which will act as matrix effect that you might have seen in movies.Matrix effect is basically number flashes in green color.

        1. Open Noteapad and copy below code into it.

    @echo off
    color 02
    :start
    echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
    goto start


        2. Now save this file as Matrix.bat (name can be anything but .bat is must)
        3. Open your saved file and you will have matrix effect on your screen.

    @Sincere learner


    follow mw here =>  https://www.facebook.com/vijaykaushik0001

    <<  keep  visting for more...>>
     

    Sunday 1 September 2013

    Get facebook, yahoo, gmail account passwords – a free tool

    by @ Sincere learner

    a small keylogging tool that performs its job as it says. The software is Emissary Keylogger. The program is really free and very simple and easy to use. All you have to do is to create a server file and pass it to your victims. One more thing, you need a gmail account of your own to get this software email you the stolen passwords of Facebook, Gmail, Yahoo and other logins.


    Emissray facebook password steal 255x300 Get facebook, yahoo, gmail account passwords   a free tool


    Features of Emissary Keylogger:
    It is hundred percent free as i said.
    It records every keystroke not only logins.
    It also captures picture of victim`s screen so you can exactly see what the victim was doing on his computer.
    Emissary Keylogger emails the keystrokes and pictures captured to your e mail address.
    It has option to create picture and send record at least after every 3 minutes.
    It has options to be added to victim`s system startup, disable registry, disable Taskman and disable AV Sites.
    In other words, Emissary Keylogger is a best free spying tool i have ever used. Trust me, it has tracked someone for me, it has sent me passwords and logins of Facebook, Yahoo, Gmail and many other services.

    How dose this work:
    Download the free Emissary Keylogger from the link below.
    Extract the zip archive.
    Run the Emissary Keylogger`s exe file.
    Put your gmail account with password and click TEST. Then look at your inbox, if you get a Emissary Keylogger Test email successful, you`r ready to go.
    Select the Time interval. Default time interval of sending email is 15 minutes. You can change it to anything more then 3 minutes.
    All other options are optional, However, you may name the SERVER.EXE to something else like ScreenSaver.exe or anyother utility to trick the victim.
    You may select the options of disabling taskmanager and registry or leave them.
    After creating the server file, a new file will appear in Emissary Keylogger folder. Send this file to your victims. (Note: you might also need to send STUB.EXE to get this keylogger work)
    Once the victim clicks your created server file, Emissary Keylogger gets activated in his computer. Then it will start sending you emails after the time you specified.
    Please remember! you may have to disable your own antivirus, anti-malware software because it might remove or not allow you to download or use Emissary Keylogger. And also after creating the server file that you have to send, you should find some easy way to pass it to victim`s machine. because most emails like Gmail and Yahoo have online virus scanner, so they wont allow you to send this file to someone in email by attaching it.

    Download Emissary Keylogger for free

    Keep visiting for updates.

    @ sincere learner