Tuesday, September 29, 2015

Windows 8.1 Kms Activator Full Version Download:

Hi welcome to my blog today i will be sharing with you a simple valid method or way for activating windows 8.1.sincerely speaking in other to make your windows 8.1 activator full version one must activate it with windows 8.1 activator
using windows 8.1 product key is not enough.with the limitation put in place for windows 8.1 it can be frustrating at times.we are providing with a working windows 8.1 keygen and windows 8.1 activator.with these tool you are guarantee of getting your windows 8.1 activated. 

With the windows 8.1 keygen you will be generating working product key for windows 8.1 and Windows 8.1 Activator not only that this keygen generator can also generate product keys and activator for windows 7 and 8.

Screenshoot:




this sound interesting not only that if any around maybe ask for your help you can definitely use this tool downloaded from this site to activate their windows version.of course it works on any windows version not just windows 8.1.All the various steps needed to successfully activate windows 8.1 have been fully documented in the download file.

what is required from you is to download windows 8.1 keygen and activator generator we provided follow each step by step instructions.if you are serious about activating windows 8.1 then i urge you not to delay any further this is your lucky day.remember download is free it cost nothing to download windows 8.1 activator with keygen below.

Friday, September 25, 2015



San Diego, Calif., Sept. 23, 2015 -- Why do babies smile when they interact with their parents? Could their smiles have a purpose? In the Sept. 23 issue of PLOS ONE, a team of computer scientists, roboticists and developmental psychologists confirm what most parents already suspect: when babies smile, they do so with a purpose—to make the person they interact with smile in return.

In addition, babies reach that goal by using sophisticated timing, much like comedians who time their jokes to maximize audience response. But there is a twist: babies seem to be doing this while smiling as little as possible.

Researchers detail their findings in an innovative study that combines developmental psychology, computer science and robotics—an approach that has never been tried before, to the best of the researchers’ knowledge. The study is part of an effort funded by the National Science Foundation to use robots to better understand human development. It gives developmental psychologists a tool for studying non-verbal children and adults, such as those with autism, researchers said.

To verify their findings, researchers programmed a toddler-like robot to behave like the babies they studied and had the robot interact with undergraduate students. They obtained the same results: the robot got the undergraduates to smile as much as possible, while smiling as little as possible.

 “If you’ve ever interacted with babies, you suspect that they’re up to something when they’re smiling. They’re not just smiling randomly,” said Javier Movellan, a research scientist in the Machine Perception Laboratory at the University of California, San Diego, and one of the study’s authors. “But proving this is difficult.”
To find out what babies are really up to, researchers turned to optimal control theory, a tool often used in robotics. The method allows researchers to design and program robots to perform a specific behavior based on specific goals. In this study, the researchers used the method to reverse engineer what the babies’ goals were based on their behavior.

Researchers used data from a previous study that observed the face to face interactions of 13 pairs of mothers and infants under the age of four months, including when and how often the mothers and babies smiled. After running the data through their reverse-control theory algorithms, researchers were actually surprised by the findings, said Paul Ruvolo, a professor at Olin College of Engineering and an alumnus of the Jacobs School of Engineering at UC San Diego. “We thought either the babies had no goal or it was about mutual smiling,” he said. Researchers are careful to point out that they can’t determine if the babies are conscious of what they’re doing. “We are not claiming that a particular cognitive mechanism, for instance conscious deliberation, is responsible for the observed behaviors. Our methods are agnostic to this question.” Ruvolo said.

Even though the sample size was small, the findings were statistically strong, said Movellan. The control theory data analysis found that 11 out of the 13 babies in the study showed clear signs of intentional smiling. Movellan and his team have been working for several years to program a realistic humanoid robot. “Our goal was to have human development inform the development of social robots,” said Ruvolo.

So the researchers developed a program that mimicked the babies’ actions and transferred it onto Diego San, a toddler-like robot that Movellan’s team had used for similar studies in the past. Diego San interacted with 32 UC San Diego undergraduates individually during three-minute sessions where it displayed one of four different behaviors. For example, the robot was programmed to smile back every time the undergraduates smiled—a big favorite with the study’s subjects. When Diego San behaved like the babies in the study, the undergraduate students behaved like the babies’ mothers: they smiled a lot even while the robot didn’t have to smile that much.

Study co-author Dan Messinger from the University of Miami, received a grant to model babies’ responses to brief pauses in interaction based on the study’s data.

“What makes our study unique is that previous approaches to studying infant-parent interaction essentially describe patterns,” said Messinger. “But we couldn’t say what the mother or infant is trying to obtain in the interaction. Here we find that infants have their own goals in the interaction, even before four months of age.”

Movellan will present a demonstration of related work Oct. 30 at the Contextual Robotics Forum at the Jacobs School of Engineering at UC San Diego.


Us San Diego

Using an electroencephalogram (EEG) cap, the system allows users to move forwards, turn left and right, sit and stand simply by staring at one of five flickering light emitting diodes (LEDs).

The results are published today (Tuesday 18th August) in the Journal of Neural Engineering.

Each of the five LEDs flickers at a different frequency, and when the user focusses their attention on a specific LED this frequency is reflected within the EEG readout. This signal is identified and used to control the exoskeleton.

A key problem has been separating these precise brain signals from those associated with other brain activity, and the highly artificial signals generated by the exoskeleton.

"Exoskeletons create lots of electrical 'noise'" explains Klaus Muller, an author on the paper. "The EEG signal gets buried under all this noise -- but our system is able to separate not only the EEG signal, but the frequency of the flickering LED within this signal."

Although the paper reports tests on healthy individuals, the system has the potential to aid sick or disabled people.

"People with amyotrophic lateral sclerosis (ALS) [motor neuron disease], or high spinal cord injuries face difficulties communicating or using their limbs" continues Muller. "Decoding what they intend from their brain signals could offer means to communicate and walk again."

The control system could serve as a technically simple and feasible add-on to other devices, with EEG caps and hardware now emerging on the consumer market.

It only took volunteers a few minutes to be training how to operate the system. Because of the flickering LEDs they were carefully screened for epilepsy prior to taking part in the research. The researchers are now working to reduce the 'visual fatigue' associated with longer-term users of such systems.

"We were driven to assist disabled people, and our study shows that this brain control interface can easily and intuitively control an exoskeleton system -- despite the highly challenging artefacts from the exoskeleton itself" concludes Muller.


Story Source:IOP

Thursday, September 24, 2015




Light travels down a fiber-optic cable by bouncing repeatedly off the walls. Each tiny photon (particle of light) bounces down the pipe like a bobsleigh going down an ice run. Now you might expect a beam of light, traveling in a clear glass pipe, simply to leak out of the edges. But if light hits glass at a really shallow angle (less than 42 degrees), it reflects back in again—as though the glass were really a mirror. This phenomenon is called total internal reflection. It's one of the things that keeps light inside the pipe.

The other thing that keeps light in the pipe is the structure of the cable, which is made up of two separate parts. The main part of the cable—in the middle—is called the core and that's the bit the light travels through. Wrapped around the outside of the core is another layer of glass called the cladding. The cladding's job is to keep the light signals inside the core. It can do this because it is made of a different type of glass to the core.


 
Back     Next


Optical fibers carry light signals down them in what are called modes. That sounds technical but it just means different ways of traveling: a mode is simply the path that a light beam follows down the fiber. One mode is to go straight down the middle of the fiber. Another is to bounce down the fiber at a shallow angle. Other modes involve bouncing down the fiber at other angles, more or less steep.
The simplest type of optical fiber is called single-mode. It has a very thin core about 5-10 microns (millionths of a meter) in diameter. In a single-mode fiber, all signals travel straight down the middle without bouncing off the edges (red line in diagram). Cable TV, Internet, and telephone signals are generally carried by single-mode fibers, wrapped together into a huge bundle. Cables like this can send information over 100 km (60 miles).

Another type of fiber-optic cable is called multi-mode. Each optical fiber in a multi-mode cable is about 10 times bigger than one in a single-mode cable. This means light beams can travel through the core by following a variety of different paths (purple, green, and blue lines)—in other words, in multiple different modes. Multi-mode cables can send information only over relatively short distances and are used (among other things) to link computer networks together.

Even thicker fibers are used in a medical tool called a gastroscope (a type of endoscope), which doctors poke down someone's throat for detecting illnesses inside their stomach. A gastroscope is a thick fiber-optic cable consisting of many optical fibers. At the top end of a gastroscope, there is an eyepiece and a lamp. The lamp shines its light down one part of the cable into the patient's stomach. When the light reaches the stomach, it reflects off the stomach walls into a lens at the bottom of the cable. Then it travels back up another part of the cable into the doctor's eyepiece. Other types of endoscopes work the same way and can be used to inspect different parts of the body. There is also an industrial version of the tool, called a fiberscope, which can be used to examine things like inaccessible pieces of machinery in airplane engines.

Back  


The Romans must have been particularly pleased with themselves the day they invented lead pipes around 2000 years ago. At last, they had an easy way to carry their water from one place to another. Imagine what they'd make of modern fiber-optic cables—"pipes" that can carry telephone calls and emails right around the world in a seventh of a second!

What is fiber optics?

We're used to the idea of information traveling in different ways. When we speak into a landline telephone, a wire cable carries the sounds from our voice into a socket in the wall, where another cable takes it to the local telephone exchange. Cellphones work a different way: they send and receive information using invisible radio waves—a technology called wireless because it uses no cables. Fiber optics works a third way. It sends information coded in a beam of light down a glass or plastic pipe. It was originally developed for endoscopes in the 1950s to help doctors see inside the human body without having to cut it open first. In the 1960s, engineers found a way of using the same technology to transmit telephone calls at the speed of light (186,000 miles or 300,000 km per second).

Optical technology

A fiber-optic cable is made up of incredibly thin strands of glass or plastic known as optical fibers; one cable can have as few as two strands or as many as several hundred. Each strand is less than a tenth as thick as a human hair and can carry something like 25,000 telephone calls, so an entire fiber-optic cable can easily carry several million calls.
Fiber-optic cables carry information between two places using entirely optical (light-based) technology. Suppose you wanted to send information from your computer to a friend's house down the street using fiber optics. You could hook your computer up to a laser, which would convert electrical information from the computer into a series of light pulses. Then you'd fire the laser down the fiber-optic cable. After traveling down the cable, the light beams would emerge at the other end. Your friend would need a photoelectric cell (light-detecting component) to turn the pulses of light back into electrical information his or her computer could understand. So the whole apparatus would be like a really neat, hi-tech version of the kind of telephone you can make out of two baked-bean cans and a length of string!


 

Tuesday, September 22, 2015

  Supercomputers are very different from mainframe computers. A supercomputer is a computer that is at the frontline of current processing capacity, particularly speed of calculation. Supercomputer can be based on any type of computer design (e.g., FPGA, vector processing,microprocessor, and GPGPU based computer).Supercomputers are used for scientific and engineering problems which are limited by processing speed and memory size, while mainframes are used for problems which are limited by input/output and reliability and for handling multiple business transactions concurrently. The differences are as follows:


  •     Mainframes are measured in integer operations per second or MIPS; whereas, Supercomputers are measured in floating point operations per second or FLOPS. Example of integer operation is moving data around in memory or adding integers. Example of floating point operation is the calculation of mathematical equations in real numbers. In terms of computational ability, Supercomputers are more powerful. Mainframes are built to be reliable for transaction processing as it is commonly understood in the business world: a commercial exchange of goods, services, or money. A typical transaction would include the updating to a database system for such things as inventory control (goods), airline reservations (services), or banking (money). A transaction could refer to a set of operations including disk read/writes, operating system calls, or some form of data transfer from one subsystem to another.
  •     Both types of systems offer parallel processing, although this has not always been the case. Parallel processing (i.e., multiple CPUs executing instructions simultaneously) was used in supercomputers (e.g., the Cray-1) for decades before this feature appeared in mainframes. Supercomputers typically expose parallel processing to the programmer in complex manners, while mainframes typically use it to run multiple tasks. One result of this difference is that adding processors to a mainframe often speeds up the entire workload transparently, with important exceptions of single batch jobs and CICS regions that don't run faster.
  •     Supercomputers are often built to run complex algorithm in wide application area such as in industry, academic, research, government or military (e.g., nuclear simulation and modeling, life science, medicine, telecommunication, weather forecasting), while mainframes run simple algorithm to handle variety of tasks (e.g. database query, warehousing, inventory, operating system). Supercomputer uses both off-design technology (e.g.: microprocessor based cluster computer) or advanced technology (e.g., vector processing, NUMA, liquid-cooling); whereas mainframes typically form part of a manufacturer's standard model lineup.
  •     Mainframes tend to have numerous ancillary service processors assisting their main central processors (for cryptographic support, I/O handling, monitoring, memory handling, etc.) so that the actual "processor count" is much higher than would otherwise be obvious. Supercomputer design tends not to include as many service processors since they don't appreciably add to raw number-crunching power.
  •     Mainframes are exceptionally adept at batch processing, such as billing, owing to their heritage, decades of increasing customer expectations for batch improvements. Supercomputers are very expensive and not cost-effective just to perform batch or transaction processing.


Mainframes are computers in which all the processing is done centrally, and the user terminals are called "dumb terminals" since they only input and output (and do not process). In modern systems, a PC or a web app often acts as the dumb terminal. Mainframes are computers used mainly by large organizations for critical applications, typically bulk data processing such as a census. Examples: banks, airlines, insurance companies, and colleges. They support hundreds of users simultaneously.
At SRU, the mainframe handles registration, records, reports, and various Human Resource functions. You are much more likely to use a mainframe in your professional career (today) than a supercomputer.

A supercomputer is a computer with a high-level computational capacity compared to a general-purpose computer. Performance of a supercomputer is measured in floating point operations per second (FLOPS) instead of million instructions per second (MIPS). As of 2015, there are supercomputers which can perform up to quadrillions of FLOPS.[2]

Supercomputers were introduced in the 1960s, made initially, and for decades primarily, by Seymour Cray at Control Data Corporation (CDC), Cray Research and subsequent companies bearing his name or monogram. While the supercomputers of the 1970s used only a few processors, in the 1990s machines with thousands of processors began to appear and, by the end of the 20th century, massively parallel supercomputers with tens of thousands of "off-the-shelf" processors were the norm.[3][4] Since its introduction in June 2013, China's Tianhe-2 supercomputer is currently the fastest in the world at 33.86 petaFLOPS (PFLOPS), or 33.86 quadrillions of FLOPS.

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling (computing the structures and properties of chemical compounds, biological macromolecules, polymers, and crystals), and physical simulations (such as simulations of the early moments of the universe, airplane and spacecraft aerodynamics, the detonation of nuclear weapons, and nuclear fusion). Throughout their history, they have been essential in the field of cryptanalysis.[5]

Systems with massive numbers of processors generally take one of two paths: In one approach (e.g., in distributed computing), a large number of discrete computers (e.g., laptops) distributed across a network (e.g., the Internet) devote some or all of their time to solving a common problem; each individual computer (client) receives and completes many small tasks, reporting the results to a central server which integrates the task results from all the clients into the overall solution.[6][7] In another approach, a large number of dedicated processors are placed in close proximity to each other (e.g. in a computer cluster); this saves considerable time moving data around and makes it possible for the processors to work together (rather than on separate tasks), for example in mesh and hypercube architectures.

The use of multi-core processors combined with centralization is an emerging trend; one can think of this as a small cluster (the multicore processor in a smartphone, tablet, laptop, etc.) that both depends upon and contributes to the cloud

Friday, September 18, 2015

Step 1: Open Notepad

Picture of Open Notepad

Open your Notepad [Start >> Run >> Type ”Notepad” >> Enter]

Step 2: Create Batch File

Picture of Create Batch File

Copy The Following code in notepad.


REM ============================================================
REM errorcode401.blogspot.in
@echo off
title Rar Password Cracker
mode con: cols=47 lines=20
copy "C:\Program Files\WinRAR\Unrar.exe"
SET PSWD=0
SET DEST=%TEMP%\%RANDOM%
MD %DEST%
:RAR
cls
echo ----------------------------------------------
echo                   GET DETAIL
echo ----------------------------------------------
echo.
SET/P "NAME=Enter File Name  : "
IF "%NAME%"=="" goto NERROR
goto GPATH
:NERROR
echo ----------------------------------------------
echo                      ERROR
echo ----------------------------------------------
echo Sorry you can't leave it blank.
pause
goto RAR
:GPATH
SET/P "PATH=Enter Full Path : "
IF "%PATH%"=="" goto PERROR
goto NEXT
:PERROR
echo ----------------------------------------------
echo                      ERROR
echo ----------------------------------------------
echo Sorry you can't leave it blank.
pause
goto RAR
:NEXT
IF EXIST "%PATH%\%NAME%" GOTO START
goto PATH
:PATH
cls
echo ----------------------------------------------
echo                     ERROR
echo ----------------------------------------------
echo Opppss File does not Exist..
pause
goto RAR
:START
SET /A PSWD=%PSWD%+1
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 0 0 1 0 1
echo  1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 1 1 0 0 0
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 0 0 1 1 1
echo  0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 0 0 0 0 0
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 1 0 1 0 0
echo  1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 1 1 0
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 0 0 0 1 1 0
echo  1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 1 1 1 1 0
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 0 0 1 1 0
echo  1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 0 1 0 1 0 0
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 0 1 0 1
echo  1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 1 0 1 0 0
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 0 0 1 1 0
echo  1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 1 0 0 1
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 1 0 0
echo  0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 1 0 1 1
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 0 0 1 1 0
echo  1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 0 1 0 1 0 0
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 1 1 0 1 1
echo  1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 0 0 1 1 0 1
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 0 1 1
echo  0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 0 1 1 0
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 0 0 0
echo  0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 0 0 1 1 0 1
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 1
UNRAR E -INUL -P%PSWD% "%PATH%\%NAME%" "%DEST%"
IF /I %ERRORLEVEL% EQU 0 GOTO FINISH
GOTO START
:FINISH
RD %DEST% /Q /S
Del "Unrar.exe"
cls
echo ----------------------------------------------
echo                     CRACKED
echo ----------------------------------------------
echo.
echo PASSWORD FOUND!
echo FILE  = %NAME%
echo CRACKED PASSWORD = %PSWD%
pause>NUL
exit
REM ============================================================

Step 3: Save it

Picture of Save it

Save it with .bat extension[ e.g “RarPSWDCracker.bat”]

Step 4: Run

Picture of Run

Now Run it and Enter your File name and path then Hit Enter.

Step 5: Wait

Picture of Wait

Wait for some time until It crack the Password.

Step 6: Cracked

Picture of cracked

That’s Done..!!
your password has been successfully cracked. now you can open your Rar file using this password.
[Note : It can only crack Numeric Password]

Thursday, September 17, 2015


 
Steps to Hack IP Address:
1) Prepare the IP address of the Victim. (e.g : 101.23.53.70 )

2) Download and Install Advanced Port Scanner.

3) Open Advanced Port Scanner and Type the IP Address in the right column and Click Scan.




 4) It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )


5) After retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)

and Type: telnet [IP ADDRESS] [PORT]

e.g : telnet 101.23.53.70  91

6) Now you’ll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you’ll get access to all Victim’s Files and Documents by browsing with CMD (use cd, copy, delete, mv… to do all tricks.)


Enjoy :)

Wednesday, September 16, 2015

Memory Card Recovery Trouble

How can you perform memory card recovery if you imprudently formatted it? This unhappy thing always happens when you go out with your family and take some precious photos with digital camera. But you forget transferring those photos to the computer, some other members of your family carelessly deleted the photos or formatted your memory card and there is no backup. If so, there is no time for you to regret. Hurry up and you still have chances to recover the photos or your important files from deleted or formatted memory card. The case is that how can you handle this memory card recovery trouble?
Overview of Memory Card

A memory card or flash memory card is a solid-state electronic flash memory data storage device used in digital cameras, handheld and mobile computers, cell phones, music players, video game consoles, and other electronics. It has high re-record-ability, power-free storage, small form factor, and rugged environmental specifications. Files like photos stored in memory card might have been lost due to disoperation or unintentional actions. The following will show you how to use memory card recovery software to easily get lost data back in memory cards.

Download Win Version
Download ac Version

How to Do Memory Card Format Recovery with EaseUS Data Recovery Wizard Free Edition?
Free memory card recovery software from EaseUS can do memory card format recovery with free and easy recovery software - EaseUS Data Recovery Wizard Free Edition for you. All types of memory cards under Windows environment can be recovered with this powerful free card recovery software.

Step 1. Launch EaseUS Data Recovery Wizard and select the file types you want to recover. Then click "Next" button to move to the next step.





Step 2. Select the memory card where you lost your data and click "Scan" button, the software will quickly scan the selected disk to find all your target files.




Step 3. After scan, you can preview all the listed recoverable files one by one and select out those you want. Then, click "Recover" button to get them back once. Here you should save all the recovered files on another disk to avoid data overwriting.







Video Tutorial of How to Use Free Memory Card Recovery Software - EaseUS Data Recovery Wizard Free to Recover Data from Formatted Memory Card

By watching this video, you will figure out more details about how to use free memory card recovery software - EaseUS Data Recovery Wizard Free to recover data from formatted memory card.




Download Win Version
Download ac Version

Sunday, September 13, 2015

If your computer’s Ram  got dead or you already have a dead Ram  which you want get repaired, don’t worry about it I have great trick to repair a Ram  just in 10 minutes that’s why I make this tutorial to show you how to do it in a right way. In this tutorial we are baking the ram in oven because proving heat at 200C can reflow the solder joints on PCB and re-joint the broken connections. I did this with my graphic card and that still works now, 8 months after baking.
If your Ram is still in warranty don’t try to do anything, just remove the RAM from your computer and give it to manufacture service center or call on manufacture customer no. for support. There are no guaranteed you can fix your RAM perfectly but this tutorial work’s 95% for all time.
I have a set of two Ram’s neither of one is working so decided to repair at least one of them. So, I will show you with some pictures and also explains you what to do and how things should work out.
Note: Try to clean your ram first and install back into your computer because sometimes dirt can be the reason for no display fault. Here is a quick tutorial to show you how to do it.
  
So Let’s See
Here are my both dead Ram neither of these stick is working. My computer never boot up if I fit this Ram into my motherboard and it only shows me a blank screen.

Step 1 – Preheat your oven at the min temperature of 150C for 3-5 min.
Step 2 – Getting things ready.
While your oven is preheating, get 10 inches of foil paper and put your Ram at the edge of foil. Then wrap your Ram into the foil tightly and make sure you’ll fold the flaps on the upward. I’ve done this with both of my RAM s.

Step 3 – Repairing.
I think your oven should be ready to bake by now. So, put your Ram into the oven.
  • Set the oven timer for just 5 minutes (just for 5 min only).
  • After 5 min put your Ram out and let it cool for some more other 5 minutes.

Step 4 – Testing.
Now open your computer case and install your Ram, after that you can try to start your computer. If your computer starts perfectly that means you’ve successfully repaired your Ram. In my case I check my Ram one by one by installing one at a time and my both Ram works perfectly and I hope your works too.

Messing up with some virus ? Though your antivirus software removes virus and problem persists, searching google for the removal and you are into a perfect site for a solution. Here are perfect steps to remove 1. Autorun Virus, 2. Shortcut Virus, 3. Empty Folder Virus using CMD (Command Prompt)

How to remove autorun virus using cmd ?

              Autorun Virus Exploits into the Windows OS whenever an External device containing Autorun Virus is pluged in to Windows PC and Autorun is Performed, Then the Autorun.inf will be executed and replicates copies of this Autorun.inf file and .exe files too. This creates a serious mess with files, Follow the steps beow to remove this autorun virus from PC using CMD.
Steps to Remove Autorun Virus :
  • Press ( Start or winkey ) -> Run -> cmd.
  • If you are at the root directory ( C drive ) then do the following, else give cd.. and come to the root C:> and do the following. 
  • Type in ( attrib -h -r -s autorun.inf ), without brackets and press Enter.
  • Type ( del autorun.inf ), without brackets and press Enter.
  • Follow this for all other drives. 

How to remove Shortcut virus using cmd  ?

These Shortcut viruses are those which converts all your data inside your pen drive or Hard disk to shortcuts, and which are recoverable.
Steps to Remove Shortcut Virus : 
  • Go to Start -> Run -> cmd.
  • Go to your pen drive directory.
  • Type this command: del *.lnk and press Enter.
  • Type attrib -h -r -s /s /d e:*.*
  • And then press a gentle Enter.
          How to remove shortcut virus in Pen drives in Windows ?
Recover your files from Shortcut Virus: ( 2nd Method)

     You can recover your files through Winrar.



  •  Open WINRAR Application.
  •  Navigate to your Pendrive location or PC Folder location.
  •  Copy Files and Paste where you want.
  •  Format your Pendrive. 

How to remove empty Folder virus using cmd  ?

   Got some Files in your pen drive but they are empty! Because of the virus in your pendrive malfunctions your drive. How to remove this empty folder virus and recover files?
Steps to Remove Empty Folder Virus : 
  • Start -> Run -> cmd.
  • Type this command: attrib -h -r -s /s /d x:*.
  • Here the letter “x” should be replaced with the drive alphabet of your pendrive that you have inserted into the computer.
  • If your pendrive shows the drive alphabet as “J“, then type  this command: attrib -h -r -s /s /d j:*.
  • And then press a gentle Enter.

Friday, September 11, 2015

If it's an inconvenience when your system crashes, it's a disaster when your hard drive heads south. Usually, that means your data is destroyed and your bits are blasted—unless you backed up, of course. But is your drive really dead, or just mostly dead? We'll show you how you might recover something, but be warned: this information is provided for use at your own risk and should only be used if the data on your drive is not worth the money to invest in professional repair. If the data means anything to you -- if you need it for your work or for legal purposes -- DO NOT USE THIS METHOD. If your the next step is to throw away or otherwise recycle a really dead hard drive, then proceed at your own risk!

Part 1 of 4: Confirm The Status of Your Drive





  1. Verify the failure. Make sure your drive is truly broken by checking things that could cause your drive to not be recognized.   
  • If your drive is making a steady, loud clicking noise, stop and skip to part two. Your drive is dead.

2.  Check hardware connections. This is the best place to start, and if found to be the problem, is the fastest, most inexpensive fix you can make!
  • Make sure power is getting to the computer. If the cat knocked out the plug, or cable is broken, nothing will work.
  • Open up the computer case. Are the data (IDE or SATA) and power cables firmly in place? Make sure they are seated well, and no pins are bent, broken, or otherwise damaged.




3. Do a visual check. Sometimes, it's not the drive that's dead, but the PC board that controls its operation (on the underside of the drive). If there's a power surge, or a component failure on that board, your drive will stop working, but only because it doesn't know what to do next.


  • Look for signs of damage—burns or scorch marks. If you see this, you can breathe a little sigh of relief, for it means that is your likely culprit—and often times, this is a problem that can be fixed with relative ease.
  • If you want to replace the PCB, search on Google for replacement parts for your drive's make and model.
  • When it arrives, remove the old board (there are five tiny screws to remove—don't lose them!)
  •  Slide out the old drive, and replace it with the new one. Do not touch the metal leads on the new board—static discharge could blow your new board before it ever has a chance to breath new life into your drive. You can ground yourself by either wearing an anti-static wrist band, or by touching something grounded and metal. The inside of your plugged-in computer will usually work.
  • Slide in the new board, making sure it's seated firmly into the drive, then re-attach the screws.
  • Reconnect the drive to the computer, then power back up. If it works, congratulations! It's a good idea to back up your data at this point, but you're good to go.
  • If it doesn't work—keep reading.

4. Check to see if the drive is being recognized. If everything is plugged in, and nothing appears to have blown up on the controller PCB, check out Windows Disk Management or BIOS, or Mac OS X Disk Utility to determine if your drive is being recognized at all

Part 2 of 4: Options for Repair 

 

1. Make a choice: if this data is worth saving, it is worth finding a professional hard-drive recovery company and paying what it takes to get your data back. If you attempt anything at all yourself, chances of recovering any data professionally will be nil.






2. A quick search on Google for "hard drive replacement parts" will lead you in a couple different directions. Replacing parts may work for older hard drives, but usually not for newer ones.





3. Do it yourself. A favorite method of brave souls is the DIY method, promoted by companies that specialize in providing parts for do-It-yourselves. The idea is that if you simply replace the burned out controller board, your drive will spring back to life.


  • Truth is, maybe it will! But there's one big caveat: the chips on the controller are, more and more, calibrated for that particular drive, and there's no guarantee a replacement will work. However, this is by far the least-expensive option.




4. Hire a professional. This is the ONLY option to get your drive back up and running, or at least have the files on the drive recovered (which is really what you want, in the end).


  • Turnaround times can be quicker than the DIY method, and success is somewhat more assured, but it comes at a cost, which may be worth it if your data is important.
  • You can expect to pay two or three times more than the original cost of the drive, so you will have to weigh the value of the money against the value of the data on the drive.
Part 3 of 4: Do It Yourself 





1. Read this first! If your drive made a clicking sound the first time you plugged it in, any time you plug it in again causes loss of data by damaging the magnetic layer on the drive. Do not attempt this self repair if the data is important to you for work or legal reasons. Some of these techniques are "Hail Mary" attempts that will either work or render your drive truly, finally, really dead. This will totally and finally kill any part of data that is not already damaged.




2.  Physically test the drive. Hold the drive in one hand and firmly spin it back and forth, listening for any noises as you do so. This may seem like "not doing anything" but actually if anything is loose, you may cause it to break!!! If you can't hear any noises, a likely cause—especially if you have an older drive, or one which ran very hot to the touch—is a seized head bearing or spindle. The following steps can be considered: If you open up the drive you are likely to kill whatever was still able to be saved.
 




3. Warm it up. Pre-heat a domestic oven at its lowest setting for five minutes or so, then turn it off. Place the drive in the oven for 2-5 mins, until it's warmed up. Please note that warming it up -- whether it has already crashed or not -- can and will make it die.


  • Remove the drive and repeat the first step. If you still can't hear any noises, go on to the next step. However, if there is a difference, reattach the drive to your computer and listen for spin-up of the drive and normal clicking that indicates head activity. If all seems well so far, try to access the drive, and move your data onto a good drive.
  • If needed, reheat the device and, whilst holding the drive in one hand, sharply spin and hit the drive on a hard surface. This is drastic of course, but may help free the heads from any binding. If anything was still alive on your hard drive, it will now be totally and finally dead.
  • Repeat the first step. Can you hear head movement now? If yes, re-attach the drive to your computer, and try accessing the drive.
  • If you can hear a rhythmic "click" in time with the movement, the chances are that the drive heads are free on their mounts and are not jammed. Check that you don't hear any rattling noises when you rotate the drive gently (back and forth) through 90 degrees. This would indicate loose and disconnected components inside the drive and are beyond the scope or intent of this article.




 4. Chill it down. Another option—a controversial one—is freezing the drive. This is a last-ditch effort, and you may only get the drive back long enough to copy off important files, but if all else fails, it's worth a try.


  • Seal the drive in a zip-lock bag, and remove as much air as possible. Pop the drive into the freezer for a few hours.
  • Plug the drive back into the computer, and give it a try. If it doesn't work immediately, power down, remove the drive, then smack it on a hard surface such as a table or floor. Re-attach the drive, and try again. If it works, save your files, then toss the drive. If it doesn't, your drive will now be beyond all methods of professional help!!
 Part 4 of 4: Professional Repair


1. Get recommendations. There are many companies out there that will offer to repair your drive for a (not so small) fee. Before plunking down any cash, check their credentials. Look at online user forums, talk to them, and find out how long they've been in business and what there recovery percentage is.

  • Check their guarantee, and how much they charge for both success (which you will gladly pay for) or for failure. How much is it worth to you for them to make a failed attempt.
  • You may not want to pay for a recovery that didn't happen, but if they attempted repair and if failed, they still spent some amount of time trying, which should be compensated.

 
Subscribe to RSS Feed Follow me on Twitter!