Health Tips, Yoga, Spiritual & Computer Hardware Drivers (1000 and above Free Software Download Center And Related Topics and Hot news)


Search This Blog

Saturday, November 15, 2014

How to stop drinking through government telugu

మందు(మద్యపానం) బానిసలకు విముక్తి! ప్రభుత్వం ద్వారా ....
ప్రభుత్వం అని ఎందుకు అన్నానంటే.. ప్రభుత్వం ప్రజలకు తల్లి తండ్రి లాంటిది. చిన్నతనంలో పిల్లలు మట్టి తింటారు. తల్లి చెబుతుంది, తిడుతుంది, కొడుతుంది కూడా, కానీ మానరు. చివరకు బిడ్డలకు అందకుండా చేస్తుంది. మనిషికి తన ఆరోగ్యం మీద నిర్లక్ష్యం ఎక్కువ. "మద్యపానం ఆరోగ్యానికి హానికరం" అని మందు సీసా మీద ఉంటుంది. ఈ విషయం ప్రతీ వ్యక్తికీ తెలుసు. కానీ తాగుతారు. ఎందుకు? మందు ముందుగా సరదా కోసం మొదలుపెడతారు. రోజుకో పార్టీ చేసుకుంటారు. చివరకు భానిసగా మారతారు. ఇలాగ మారిన వారు మందు ఎప్పుడు తాగుతారు అంటే.. సంతోషంగా వున్నా, భాదగా వున్నా, ఏపనీ లేక బోర్ కొట్టినా తాగుతారు. తాగడానికి కావలసినది ఒక వంక.
కుర్రవాళ్ళు ముందుగా మందు ప్రారంబించేది బీర్ తోనే.. ఎలాగనగా డిసెంబర్ 31 చాలమంది కుర్రవాళ్ళు మందు మొదలుపెట్టే రోజు. ఈ రోజునాడే మందుకు ఏరోజూ ఆఫర్ పెట్టని బార్ షాప్ లు ఈ ప్రత్యేకమయిన రోజునే ఆఫర్స్ ఇస్తారు. ఎందుకో? తాగుడు మొదలు పెట్టి జీవితంలో నాశనమవమని.  కనుక ముందుగా బీర్, వాట్కా లను రద్దు చేయాలి.
ఇధి భానిసగా మారినవారికి మాత్రమే. ప్రతీ మనిషికి కోరిక ఎక్కువగా వుంటుంధి, కావలసిన వస్తువు ఎదైనా అది దొరుకుతున్నంత వరకు మనసు అదుపులో ఉండదు. దొరకకుండా చేస్తేనే మనసు అదుపులోకి వస్తుంది.  ప్రవేటు భార్ షాపులు, బెల్టు షాపులు రద్దు చేయాలి. ప్రభుత్వం  మాత్రమే రేషన్ షాపులాగ  ప్రభుత్వ మంధు దుఖానం ప్రారంభించాలి. 30 సంవత్సరాలు ధాటిన వారికి మాత్రమే అమ్మాలి. అధి కూడా చాలా లిమిట్ గా ఇవ్వాలి. ప్రతీ సంవత్సరం వయస్సు  పరిమితి పెంచుకుంటూ వెళ్ళాలి. మంధుకు భాగా భానిస అయిన వాళ్ళు అధుపులోకి వస్తారు.  కొత్త తాగుబోతులు తయారు అవరు. పార్టీలు తగ్గుతాయి. తాగి డ్రైవింగ్ చేసే వాళ్ళు వుండరు. ప్రమాదాలు తగ్గుతాయి. 90% గ్యారంటీ..


Friday, November 14, 2014

Indian cricketer Rohith Sarma 264 in ODIs All time record

Indian Cricketer Rohith Sarma created ODI world record the highest score in One-Day internationals and also became the first in the history of cricket to hit two double centuries in the 50-overs format in the fourth ODI against Srilanka at the Eden Gardens in Kolkata, on Thursday. He Created history in ODIs, Exactly a year back, Rohit Sarma had smashed 209 against Australia in Bangalore in November 2013, and second double is 264 runs in the ODI cricket All time History Against Srilanka. Dropped on 4, he was out to the last ball of the innings for 264, which came off 173 deliveries and was studded with 33Fours, 9 Sixes, becoming the only player to have two double centuries in ODIs. He broke Virnder Sehwag's record of 219, against the West Indies in Indore in 2011. Virendra Sehwag had broken Sachin Tendulkar record which was 200 runs in ODIs. Sachin Tendulkar got first ODI double century(200) against South Africa. Second Double century was Virendra Sehwad(219), and third double century and fourth double century Rohith sarma (209, 264 runs). He made his Ranji Trophy debut at the Eden Gardens and arrived in Test cricket against West indies with a century on debut in 2013,
Oneday Double Century Records
           1.   Sachin Tendulkar  200   Against  South Africa  2010
           2.   Virendra Sehwad   219  Against   West Indies   2011
           3.   Rohith Sharma       209  Against  Australia        2013
           4.   Rohith Sharma       264  Against  Sri Lanka       2014

Thursday, November 13, 2014

What is Computer Hardware ?

There are many different kinds of hardware that can be installed and connected to the outside of a computer.
List of Computer Hardware Components

Inside of Components:
          1.   Processor (CPU -  Central Processing Unit)
          2.   Mother Board
          3.   RAM (Random Access Memory
          4.   SMPS (Switch Mode Power Supply)
          5.   Hard-disk (HDD)
          6.   CD/DVD Drive(Rom/Writer)
          7.   Floppy Drive (FDD Drive)
          8.   Keyboard, Mouse ports are backside of the CPU
          9.   Parallel port, VGA Port, sound port built-en, Lanport built-en, USB ports including
Outside Components:-
         1.  Monitor
         2.  Keyboard
         3.  Mouse.
         4.  Speakers
         5.  UPS
         6.  Printer and Other External Devises.


          

Saturday, December 10, 2011

Snipping Tool

Snipping Tool

Windows 7 Snipping Tool imageA feature introduced inWindows 7 that allows the user to take all or part of a screen shot and save that image. For example, if you wanted to send a recipe to a friend, but didn't want to send the whole web page to him/her, you would use this tool to crop out just the recipe and send it to them. Above is an image of what this tool looks like. To use this tool, follow the instructions below. NOTE - This feature is not available on Windows 7 Starter edition.

.

  1. Click Start
  2. Type in Snipping Tool.
  3. Under New, choose whether you would like to Free-form snip, Rectangle Snip, Window snip, or Full Screen snip.
  4. Once you have highlighted the Snip you wish to save, a new menu will appear on your toolbar. You can choose from Save, Copy, or Send the file. You will also be able to write your own message on the Snip, or Highlight the Snip.

Friday, December 2, 2011

Denial Of Service (DoS) Attacks




Denial Of Service (DoS) Attacks :-
A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-

1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).
example:- c:/>ping -l 65540 hostname
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.

2) Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another. Rather than sending the entire chunk in asingle packet, the data is broken down into smaller packets as given below:
* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.
In teardrop attack, however, the data packets sent to the target computer contais bytes that overlaps with each other.
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)
When the target system receives such a series of packets, it can not reassemble the data and therefore will crash, hang, or reboot.
Old Linux systems, Windows NT/95 are vulnerable.

3) SYN - Flood Attack :- In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems' memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.

4) Land Attack :- A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target sysetm itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.

5) Smurf Attack :- There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
Result:- Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable, i.e. clogging the network and preventing legitimate users from obtaining network services.

6) UDP - Flood Attack :- Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.

Computer Hardware and Software Related Topics

My Blog List

My Blog List

Popular Posts

Powered By Blogger