Save your time with WinMerge

As a Developer you should come along into a situation that you need to compare or merge complex code fragments and Sadly most of us do it with notepad. Well have you seen WinMerge? Remember this century is not about how good you are in code but it’s about how can solve your problems.. So let me introduce to you the WinMerge, this program designed for open source developers and by open source developers.. Upgrading from old code to new code can be a real painstaking feature.. So here is WinMerge to save you some times.

Microsoft and Their Inevitable BSOD

We all know very well Microsoft and BSOD is two side of a coin. It’s inevitable how the BSOD scares us off. Now there is some other BSOD that can give you a descent naughty smile on your face.. It’s created by the Genius Mark Russinovich from SysInternals. Let’s take a step back in the history. Previously SysInternals made a huge number of Windows NT, 2000, XP & Server 2003 tools which the very advanced developers and core operating systems developers didn’t even dream about. With his numerous success with command line administration tools and core system level utilities he took immediate attention from Microsoft itself. At 2006 Microsoft bought over SysInternals and it was inevitable too. SysInternal Administrator tools are the optimal Swiss army knife for any windows server administrators. SysInternal Administrator tools are still freeware and available for download. So back to present, Mark Created an innovative BSOD emulated screensaver for windows and it utilizes the original ntoskrnl.exe from NT, 2K, XP, 2003.

Hosts file configuration – Windows, Linux and Mac

hosts_file

The Hosts file contains the mappings of IP addresses to host names. This file is loaded into memory (cache) at startup, then Windows checks the Hosts file before it queries any DNS servers, which enables it to override addresses in the DNS. This prevents access to the listed sites by redirecting any connection attempts back to the local machine. Another feature of the HOSTS file is its ability to block other applications from connecting to the Internet, providing the entry exists. It’s a general practice of web developers to test any site locally by emulating the original web address pointing to a local or development server by modifying the hosts file. Here is a brief explanation on how to set it up properly.

Common Locations:

The host file is located in different locations in different operating systems and even in different Windows versions:

  • Windows NT/2000/XP/Vista: %SystemRoot%system32driversetc is the default location, which may be changed. The actual directory is determined by the Registry key HKLMSYSTEMCurrentControlSetServicesTcpipParametersDataBasePath.
  • Windows 95/98/Me: %WinDir%
  • Linux and other Unix-like operating systems: /etc
  • Mac OS 9 and earlier: System Folder: Preferences or System folder (format of the file may vary from Windows and Linux counterparts)
  • Mac OS X: /private/etc (uses BSD-style Hosts file)
  • OS/2 and eComStation: "bootdrive":mptnetc

Setting it up:

Read moreHosts file configuration – Windows, Linux and Mac

Get back the control of your registry from Trojans

windowsFew days before i was copying some files from my friends SONY M2 memory card and bam i've been hit by a Trojan, it was silently sitting on the memory card. the file name is Flash.exe and it creates a autorun.inf file in your memory card and any usb disk you put into your computer will be infected by it. It keeps running on the memory and it will disable your Task Manager, Command Prompt and Registry Editor. Well these are the tools you need to use to get rid of the trojan virus. I've cleaned my system with Kaspersky Antivirus Pro 7 and still i was not able to use command prompt or regedit. Here are the things you need to do after cleaning the Trojan Virus.

Read moreGet back the control of your registry from Trojans

CFOS Speed 4 – Get the Fastest Internet Speed

Image

cFos Traffic Shaping reduces delays during data transfer and allows you to surf the Internet up to three times faster. So you can use the full bandwidth of your connection!

During TCP/IP transfer, a certain amount of data needs to be confirmed upon reception before more can be sent. Stalling data confirmation results in delays and transfer-rate slowdowns, thus forcing the sender to wait. Especially for DSL and cable, it is possible to slow a download to a crawl by choking the upstream channel (which has the smaller bandwidth anyway) with an upload. This is because in such a scenario there is not enough upstream bandwidth left for data confirmation.
The standard solution so far has been to try and compensate for this by increasing TCP window size, thereby allowing more data to be sent without immediate confirmation. The main problem here is that this also leads to high ping times (latency) and significant delays during Webpage rendering. Latency of up to 2 seconds is not uncommon for TCP windows with a size of 64k. In short, huge window sizes just won”t let you achieve full download speed.

Read moreCFOS Speed 4 – Get the Fastest Internet Speed