Sunday, October 20, 2013
Saturday, October 19, 2013
How to hack WIFI WEP for free?
Requirements:-
1: A Computer.
2: A Wireless Card capable of packet injection.
3:A Live installation of BackTrack either on a CD or USB stick.
BackTrack Can be found here ---
http://www.backtrack-linux.org/downloads/
Create a Live USB Install here
http://unetbootin.sourceforge.net/
Steps:
1. Boot into BackTrack
2. Click on the Backtrack applications menu -> Backtrack -> Exploitation tools -> Wireless exploitation -> WLAN Exploitation -> gerix-wifi-cracker-ng (This will open up the GUI interface seen in the picture).
3. Go to the configuration menu and select the wireless interface wlan0
-Click on Enable/Disable Monitor Mode (this will put the wireless card into monitor mode)
-Select the newly created mon0 interface.
4. Now click on the WEP tab at the top of the window. -Click on "Start sniffing and logging" and leave the terminal open. -Once the wireless network you want to crack* shows up (it has to be WEP encryption of course) select the WEP Attacks (with clients). *note that the PWR has to be high enough to work so the closer you can get, the better. -There you click on “Associate with AP using fake auth”, wait a few seconds and click on “ARP request replay”.
5. Once the Data number reaches over 10,000 you are ready to try (if the data is coming fast wait until 20 or 30,000 to be safe) and crack the key, but don't close any windows yet. -Go to the cracking tab and click on “Aircrack-ng – Decrypt WEP password” under Wep Cracking.
Within a few minutes password will be cracked.
.
Enjoy:D
Requirements:-
1: A Computer.
2: A Wireless Card capable of packet injection.
3:A Live installation of BackTrack either on a CD or USB stick.
BackTrack Can be found here ---
http://www.backtrack-linux.org/downloads/
Create a Live USB Install here
http://unetbootin.sourceforge.net/
Steps:
1. Boot into BackTrack
2. Click on the Backtrack applications menu -> Backtrack -> Exploitation tools -> Wireless exploitation -> WLAN Exploitation -> gerix-wifi-cracker-ng (This will open up the GUI interface seen in the picture).
3. Go to the configuration menu and select the wireless interface wlan0
-Click on Enable/Disable Monitor Mode (this will put the wireless card into monitor mode)
-Select the newly created mon0 interface.
4. Now click on the WEP tab at the top of the window. -Click on "Start sniffing and logging" and leave the terminal open. -Once the wireless network you want to crack* shows up (it has to be WEP encryption of course) select the WEP Attacks (with clients). *note that the PWR has to be high enough to work so the closer you can get, the better. -There you click on “Associate with AP using fake auth”, wait a few seconds and click on “ARP request replay”.
5. Once the Data number reaches over 10,000 you are ready to try (if the data is coming fast wait until 20 or 30,000 to be safe) and crack the key, but don't close any windows yet. -Go to the cracking tab and click on “Aircrack-ng – Decrypt WEP password” under Wep Cracking.
Within a few minutes password will be cracked.
.
Enjoy:D
Top 25 People who changed Internet forever...
1. Sir Tim Berners-Lee – World Wide Web
2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.
4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape
1. Sir Tim Berners-Lee – World Wide Web
2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.
4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape
Thursday, October 17, 2013
HOW TO BECOME AN ETHICAL HACKER ??
1.Dedication : Dedication is the main key to become an ethical hacker. Don't plan to become pentester because of money. If you really have interest, then go ahead.
2.Reading : Be a bookworm. Try to read books related to computer and its architecture. Buy books related to Security and Ethical hacking.
3.Know how hackers hack into: You can not solve the problem until you know what is behind the problem. So you have to learn method of hackers.
4.Programming and Scripting: Learn Some programming or scripting languages because most of time you will need to write a code to break into a system. Also, you have to know the coding for understanding how a system works,then only you can penetrate into. Ok, which language?! My suggestion is C. I Love C programming. It is one of best,powerful language and easy to learn. Some peoples prefer python. As far as i am concerned, once you learned one language, it is easy for you to learn any other languages. There are are plenty of online programming tutorial sites are out there.
5.Linux: Ok, it is time to switch from Windows to Linux. Learn to work with Linux.
6.BackTrack Linux Distribution: Backtrack Linux is one of the famous Penetration Testing Linux distribution. This backtrack is funded by Offensive Security. It has almost all penetration testing tools required for security professionals.
7.Get Certification for Ethical Hackers: Some organization recruits based on security certification. You can learn and get ethical certification from your nearest center. Search in google for these keywords "CEH","OSCP","security certifications". Anyway, if you have dedication and confidence, you don't need a certificate and get into a firm easily.
8.Forums: Participate in any Security or ethical Hacking related forums.
1.Dedication : Dedication is the main key to become an ethical hacker. Don't plan to become pentester because of money. If you really have interest, then go ahead.
2.Reading : Be a bookworm. Try to read books related to computer and its architecture. Buy books related to Security and Ethical hacking.
3.Know how hackers hack into: You can not solve the problem until you know what is behind the problem. So you have to learn method of hackers.
4.Programming and Scripting: Learn Some programming or scripting languages because most of time you will need to write a code to break into a system. Also, you have to know the coding for understanding how a system works,then only you can penetrate into. Ok, which language?! My suggestion is C. I Love C programming. It is one of best,powerful language and easy to learn. Some peoples prefer python. As far as i am concerned, once you learned one language, it is easy for you to learn any other languages. There are are plenty of online programming tutorial sites are out there.
5.Linux: Ok, it is time to switch from Windows to Linux. Learn to work with Linux.
6.BackTrack Linux Distribution: Backtrack Linux is one of the famous Penetration Testing Linux distribution. This backtrack is funded by Offensive Security. It has almost all penetration testing tools required for security professionals.
7.Get Certification for Ethical Hackers: Some organization recruits based on security certification. You can learn and get ethical certification from your nearest center. Search in google for these keywords "CEH","OSCP","security certifications". Anyway, if you have dedication and confidence, you don't need a certificate and get into a firm easily.
8.Forums: Participate in any Security or ethical Hacking related forums.
Monday, October 14, 2013
How to Hack facebook Account
Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one.

Here is a tutorial about phishing.>>
Step 1)
First you must sign for a free webhosting service like www.byethost.com or www.t35.com or www.000webhost.com And register your subdomain.
after signing you will have a subdomain like www.yourname.byethost.com
Step 2)
Now
login to your account go to "control panel" then in site management
option go to "online file manager" and open the folder "htdocs".
Step 3)
Now Click Here to DOWNLOAD THIS FILE to your computer add extract the file. Inside the folder you will find three files index.php and hello.php and login_again.htm.
Step 4)
Now
replace the index.php file in the "htdocs" of the "online file
manager" with the file index.php of the phisher folder in your
computer and also upload hello.php and login_again.htm files in "htdocs" thats it! you are done.
Step 5)
Now
your homepage www.yourname.byethost.com has become a phisher. open
it, you will see that your page www.yourname.byethost.com has become
the login page of the site you want to hack.now all you have to do is
send this link to the person whose account you want to hack.when he
tries to login through it you will receive a file password.html in your
"htdocs" folder of your phpnet.us account which contains the username
and password of your victim.
Step 6)
Go to http://www.yourname.byethost.com/lol.htm for see the stored passwords !
Personal Note:- The attacker must have a very good convincing power to hack the facebook password with this method. Please try this method carefully as now it is widely known and the target may soon guess the attacker's intentions. The target may report the fake site and you may get in trouble.
The facebook not allow to share your fake facebooksite on facebook. You can use Domain hiding system to share your fake facebook site. (Eg: http://www.dot.tk/)
=> Top 5 Ways to Protect Your Privacy Before Facebook Gets Hacked
Nowadays the only social networking site that has become popular among the younger generations is FACEBOOK. Almost 7% of the world’s population is on facebook. Along with numerous benefits it has it’s disadvantages too. The most common threat that an facebook user gets is his facebook account getting hacked by someone. We often get certain messages while we login to our facebook account that your account was being opened by an unauthorised person from an unknown place but we don’t take it seriously. Due to this small mistake you will pay a larger cost later in the future. it is very clear that this happens because due to our mistake that our privacy has been leaked to someone. So in order to protect your privacy of the facebook account here are some steps you should properly follow.1. Change your name:
Don’t provide your real name while creating your Facebook account for the instance just use your nickname because if unfortunately your Facebook account gets hacked in future you would be in a situation to create a new account. Don’t be of the opinion that making a number of account is a crime because according to John Sileo the privacy expert of Facebook 80% of the people on Facebook have multiple Facebook accounts.2. Stop geo-tagging your photos.
First let me tell you what is geo-tagging, it provides the information like the latitudes and longitudes of the photo taken and uploaded on the Facebook i.e. home ,school etc. if you are an iPhone user then just glance over for a second to your “settings”, go to “privacy” and turn off the location services for all the applications in the phone or just for an individual application like camera.3. Lie about your age.
Girls might be pretty aware of this cause they never tell their exact age anywhere in this world. But seriously always steal your birth identity if not just try to change the year. I know it feels very happy to get birthday posts on your wall but believe me it’s for your safer side only.4. Don’t store your credit card information on the site.
In the advanced versions of Facebook there are many games, applications etc, that require your credit information about your credit card number, it’s validity etc. But for your well being try not to provide them with certain information because they can use these things in other wrong processes.5. Have some boundaries.
Have certain limits in life and in everything that you do in your life. Anything in excess is very dangerous. Have fun with Facebook but enjoy responsibly. Try to say “no” to the things that are wrong. When Facebook asks you questions about the photo that you have uploaded like who is in this photo, where the photo was taken ? Skip these questions. Do not upload address of your new house because for a thief it would just be a welcome invitation letterSunday, October 13, 2013
Earn money from Pollbuzzer :
Earn money from Pollbuzzer :
Pollbuzzer.com is like other paid survey sites where you can get paid to answer questions. The difference is, instead of you answering a bunch of questions (which are sometimes boring, right?), you just need to answer one question and that's it. How much are you gonna earn from that? A whopping $1!
Payment Proof :
http://goo.gl/sg0cTc
Join Now :
http://goo.gl/gx1nzL
Pollbuzzer.com is like other paid survey sites where you can get paid to answer questions. The difference is, instead of you answering a bunch of questions (which are sometimes boring, right?), you just need to answer one question and that's it. How much are you gonna earn from that? A whopping $1!
Payment Proof :
http://goo.gl/sg0cTc
Join Now :
http://goo.gl/gx1nzL
Facebook Zero Day Account Reset Hijack Exploit
Facebook Zero Day Account Reset Hijack Exploit
Facebook Account Reset Hijack Exploit
Full title Facebook Account Reset Hijack
Date add 2013-10-02
Category Web applicationRisk HighDescription ### #[ ]
Title : Hack Any Facebook Account Without User Name And Password
interested buyers may contact us at mindbendersorg@gmail.com
Wednesday, June 5, 2013
Chat with Friends through MS DOS Command Prompt
It might sound weird, but it’s really
fun to do. If you get bored with the social networking chats try this simple
command prompt trick and chat with your friends. Below are some simple tricks
on how to chat with friends through ms dos command prompt.
- All you need is your friend's IP Address and your Command Prompt
- Open Notepad and write this code as it is
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
- Now save this as "Messenger.Bat"
- Open Command Prompt
- Drag this file (.bat file) over to Command Prompt and press Enter
- Now, type the IP Address of the computer you want to contact and press enter
- Now all you need to do is type your message and press
- Enter and Start Chatting
Monday, April 29, 2013
Tips to create shortcut key for WebPages
It is easy to create a shortcut key for your favorite web
pages. Once the shortcut has been created, you can enter to your favorite web
pages from your desktop itself. This will help you to avoid typing the URL
every time. In this article I have given the tricks on how to make a shortcut key
for favorite webpage.
Step 1: Open your favorite webpage in your browser.
Step 2: If your browser window is maximized then make it minimize.
Step 3: In the browser window click and drag the icon next
to the URL and drag it into your Desktop or other location you wish to create
the shortcut.
For example if you want to create the shortcut for Facebook,
then you would drag the icon near to www.facebook.com to your Desktop.
Step 4: Once the shortcut has been created locate the
shortcut and right-click it and click Properties. In the shortcut properties
window assign a new shortcut key and click OK.
Step 5: You are done. Now when the shortcut key is pressed
the web page will be automatically loaded.
Tuesday, April 2, 2013
How to make free calls from PC to mobile phones

You can make a free call from your personal computer (PC) to
mobile phones at any where in the world. To make a free call you need to have an
earphone with mike and internet connection with yahoo or Skype software
installed. Just follow the below instructions to make free calls and it is not
applicable for United States. If you don’t have Skype or Yahoo messenger then
download and install the latest version of it from Google.
Step 1: Sign into your yahoo messenger or Skype using yahoo
id and password and configure your earphone and headset if you have installed a
fresh yahoo or Skype software.
Step 2: Inside your Yahoo messenger dial +18003733411 and
press enter (As shown in the below figure)
Step 3: A pop-up window will appear.
Step 4: Now a recorded welcome message greets you along with
an advertisement. It will ask you to select one of the Free411 service. Just listen
to the options until the last one as “Free Call”. After hearing the last option
don’t press any number in key board. Then say “Free call” loudly on your
microphone connected to your PC.
Step 5: After this, they will run a short advertisement of
their sponsor and make sure you don’t press any number at this time.
Step 6: Wait until you here a beep sound after the following
message “Please dial the phone number country code first, don’t forget to dial
1 for North America”. After hearing message, dial the destination number of
your choice immediately along with the country code. (E.g. for North America
it’s 1 and for India it’s 91).
Step 7: Now your call will get connected and you can talk up
to 7 minutes for free. After 7 minutes the call will disconnect. Repeat the same
procedure to talk again.
There is no limit to make free calls. So enjoy this trick to
make free international and local calls. It even works to make free local
mobile calls in India.
Monday, April 1, 2013
Tips to prevent your computer from Hackers
Nowadays Computers are the most important thing of the
modern society. The use of internet has
become so convenient and common; some peoples neglect and forget the importance
of protecting our computers and files. So it is important to protect your
computer and data from Hacking. Now, big companies also fears from
Hackers. So In this article I have posted
on how to protect your computer from Hackers and viruses.
Just follow the below instructions:
1. Install Anti-virus software:
First thing is that you must install best antivirus software
in your pc and keep it up to date.
2. Up to date Operating system:
Keep your Operating system up to date with latest patches.
3. Install Anti-Spyware Software:
Use Anti-Spyware it protect from spyware, malware and Trojan
horses.
Download anti spyware from here
4. Install Firewall Software:
Install a personal Firewall and keep it up to date. In
internet world there are many free firewalls.
5. Scan Computer weekly:
Scan your computer Hard Disk weekly so that it will make
better performance of computer.
6. Don't open Spam E-mail:
Don't open unknown E-mail or spam mail.
7. Use strong password:
Use strong password and don’t use your birth date, nickname
or mobile number. Try to use alphabets, numbers and special symbols in your
password.
8. Secure your Wi-Fi:
Secure your Wi-Fi connection with strong password
9. Don't Use Cybercafé for Net banking:
If you using Net banking then you must always use only from your
computer and never use cybercafé.
10. Don't Use Dictionary word in password:
Try to avoid using Dictionary word in password.
Saturday, March 30, 2013
Tricks to block websites without any Software
Nowadays children are addicted to social networking sites such as Facebook,
Twitter, Youtube etc. Due to this they are affected by various health problems
and their studies are also affected. If you want your children not to open a
particular website, you can easily block that site. Here I have given a trick
on how to block websites without any software.
- Browse C:\WINDOWS\system32\drivers\etc
- Find the file named "HOSTS"
- Open it in notepad
- Under "127.0.0.1 localhost" add 127.0.0.2 www.sitenameyouwantblocked.com
Enabling Windows GodMode
Microsoft Windows Vista (32-bit version) introduced a new hidden feature called GodMode that allows you to view and adjust all settings within Windows. To create a shortcut to the GodMode in Windows Vista (32-bit) or any version of Windows 7 follow the below steps.- Anywhere on your computer create a new folder.
- After the folder has been created, copy the below text, rename that folder, and paste the text as the file name.
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
Once the above steps have been completed a new shortcut entitled GodMode
will be visible. Opening this shortcut will display a Window similar to the
below example.Tips to set password to Microsoft office files
It is easy to set password to Microsoft Office files like .doc,
.ppt, etc. If you set password for each and every files then it becomes secure
and other peoples can’t open it. In this article I have given the tricks on how
to set password to Microsoft office files. Just follow the below instructions
to keep your files safe.
Step 1: Open Microsoft office's component such as Word, Powerpoint,
Excel etc.
Step 2: Click the Office button
Step 3: Click on Prepareà click on 'Encrypt document'
Step 4: Then one window will open.Enter the password in window and click Ok.
Step 5: Then another window appears asking for password confirmation.
Re-enter your password and click OK. Now the Password is set on the file.
Step 6: Whenever you open the
file it will ask for the password.
Solution to Remove Autorun.inf Virus
Step 1: First
Disable CD/DVD or USB Autorun in windows
Follow the
below steps and ensure your system safety:
- Click start à Run and type GPEDIT.MSC – this opens Group Policy editor window.
- On the left side à expand Computer Configuration à Administrative Templates à System.
- Locate the entry for turn auto play off on the right side.
- Double click it and select ‘Enabled’.
Step 2: Open
Winrar.exe (Start à All Programs à WinRar à WinRar.exe)
Step 3: Now
browse to any drive that is infected with Autorun.inf virus using winrar
explorer.
Step 4: Here
you will see all the hidden files under winrar for that particular drive.
Step 5: Look
for the file Autorun.inf and open it using notepad.
Step 6: In
that Autorun file, some .EXE file will be mentioned that will be executed along
with the autorun file. This exe file is the main culprit.
Step 7: Note
the exe file mentioned in the Autorun.inf file. Close this Autorun.inf file.
Step 8: Now
look for that .Exe file in the drive (Ex: c:/), Delete that .exe file along
with Autorun.inf
Step 9:
Restart your Operating System. Now your system is free with Autorun.inf Virus.
Thursday, March 28, 2013
How to change password without knowing old password
Step 1: Follow
the below steps to view all user accounts.
- StartàRunà Then type ‘CMD’.
- In the command prompt window, type ‘cmd net users’.This will show you the user account on that computer including the hidden accounts.
Step 2: Just
follow the below steps to change the account password
- Logged into the computer that has administrative rights. Then go to StartàRunàtype ‘CMD’.
- In the command prompt window type ‘net user’ space ‘the name of the account’ then * and press enter. Example: net user administrator * or net user "TRICKS GOD" *. (Put the name in quotes if it contains spaces)
- It asks you to enter the new password. Type the new password very carefully because command window won't display what you type.
- Reenter the same password once again to confirm it.
- Then you will get a success message.
You’re
done. Now you can access the user accounts.
Tuesday, March 26, 2013
Thursday, March 21, 2013
Tuesday, March 19, 2013
Friday, March 8, 2013
Friday, January 11, 2013
Main Differences between windows 7 and windows 8
1)boot time: win7 48 sec. win8 10 sec.
2)desktop : Microsoft has replaced the normal shortcut icons with dynamic tiles. You can change their size and place similar applications around each other- or anything else that my suit you.
3)mounting iso images: Windows 7 could only burn an ISO image to a DVD but Windows 8 actually betters this by offering you the option to
mount the image too. In Windows 7, you didn’t have the option to make virtual drives to use the ISO image’s content but Windows 8 allows you to
create a virtual drive to mount the ISO image so that you can easily use it just like a normal DVD.
4)Built-in Antivirus(bad news for hackers): Windows 8 has an antivirus present inside the kernel of the operating system. This means that
your system won’t boot if a corrupt USB device is plugged in. It sounds impressive though I don’t know whether it would pass the test of time…. and viruses! All in all, I do expect Windows 8 to be a serious upgrade on Windows 7 and with Microsoft working on the things that require some tweaking; I genuinely believe that Microsoft is finally ready to launch an OS which will take the world by storm
5)Multiple monitors support in Windows : Microsoft announced that customers can use more than one monitor to connect with Windows 8 operating system. Windows 8 PC management allows customers to use multiple monitors at same time. It means Windows 8 offers flexibility by allowing start screen at one monitor and desktop in another. Customer can also choose taskbar on both screens with different icons on each monitor. Moreover, you can play with background images as well by changing it separate on each monitor. Such support is not available with Windows 7 operating system.
6)Windows based apps store Windows 8 operating system introduces new app store in which different apps is implemented for various devices and settings on right of the screen. The settings section includes contextual apps like volume, brightness, restart and power options. You can share content, links, app reviews, contacts, metro apps, Facebook and twitter applications with your friends or colleagues. Windows 8 store offers both desktop apps and ecosystem for developers. On the other hand, Windows 7 OS is missing all these features.
7)Inbuilt Windows Touch features: The main difference between Windows 7 and Windows 8 comes with its metro style interface that provides live title of rectangle shape which has replaced the icon pattern in Windows
8. In Windows 7 operating system, software shortcuts are in the form of icons. As far as the touch interface is concerned then Windows
9) supports touch interface but not that much, what was expected. So, Windows 8 comes with true touch interface for Metro style apps. It is fast way of accessing data by using an improved on-screen keyboard and handwriting recognition —
1)boot time: win7 48 sec. win8 10 sec.
2)desktop : Microsoft has replaced the normal shortcut icons with dynamic tiles. You can change their size and place similar applications around each other- or anything else that my suit you.
3)mounting iso images: Windows 7 could only burn an ISO image to a DVD but Windows 8 actually betters this by offering you the option to
mount the image too. In Windows 7, you didn’t have the option to make virtual drives to use the ISO image’s content but Windows 8 allows you to
create a virtual drive to mount the ISO image so that you can easily use it just like a normal DVD.
4)Built-in Antivirus(bad news for hackers): Windows 8 has an antivirus present inside the kernel of the operating system. This means that
your system won’t boot if a corrupt USB device is plugged in. It sounds impressive though I don’t know whether it would pass the test of time…. and viruses! All in all, I do expect Windows 8 to be a serious upgrade on Windows 7 and with Microsoft working on the things that require some tweaking; I genuinely believe that Microsoft is finally ready to launch an OS which will take the world by storm
5)Multiple monitors support in Windows : Microsoft announced that customers can use more than one monitor to connect with Windows 8 operating system. Windows 8 PC management allows customers to use multiple monitors at same time. It means Windows 8 offers flexibility by allowing start screen at one monitor and desktop in another. Customer can also choose taskbar on both screens with different icons on each monitor. Moreover, you can play with background images as well by changing it separate on each monitor. Such support is not available with Windows 7 operating system.
6)Windows based apps store Windows 8 operating system introduces new app store in which different apps is implemented for various devices and settings on right of the screen. The settings section includes contextual apps like volume, brightness, restart and power options. You can share content, links, app reviews, contacts, metro apps, Facebook and twitter applications with your friends or colleagues. Windows 8 store offers both desktop apps and ecosystem for developers. On the other hand, Windows 7 OS is missing all these features.
7)Inbuilt Windows Touch features: The main difference between Windows 7 and Windows 8 comes with its metro style interface that provides live title of rectangle shape which has replaced the icon pattern in Windows
8. In Windows 7 operating system, software shortcuts are in the form of icons. As far as the touch interface is concerned then Windows
9) supports touch interface but not that much, what was expected. So, Windows 8 comes with true touch interface for Metro style apps. It is fast way of accessing data by using an improved on-screen keyboard and handwriting recognition —
Subscribe to:
Posts (Atom)