Thursday, October 22, 2009

Top 5 Hackers of all time

The Black Hat Hackers - Criminals

These hackers are the ones that you've seen in shackles arrested for cybercrimes when they were just getting out of puberty. Some have done it for financial gain others just for fun.

1. Kevin Mitnick.


Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.

Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.

Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.

Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.

2. Adrian Lamo

Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.

Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.

Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.

3. Jonathan James


At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.

James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.

High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.

4. Robert Tappan Morris

Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.

Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.

5. Kevin Poulsen

Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.

The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.

Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 *** offenders with Myspace profiles.

Sunday, July 26, 2009

10 Minute Email for temporary use

Lets say you want to sign up for a site which requires that you provide an e-mail address to send a validation e-mail to. And maybe you don’t want to give up your real e-mail address and end up on a bunch of spam lists. What do you do ? Head over to this link : 10 Minute Email

This is a real nice and disposable online tool to cater to temporary needs of an email . And it’s free !!

All you have to do is clink on the link provided on the site and voila you have your email address which will be valid for 10 minutes.

www.10minutemail.com






You can also reset the timer if you need more time with the Email address. Once you receive mails, you can either forward it to your original inbox or reply to the mail.




So go ahead and try out this really awsome tool.

Wednesday, July 22, 2009

How To Find Serial Numbers On Google

if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


I hope this trick help you finding your ccd keys easily

Enjoy :)

Solution to ‘You may be a victim of software counterfeiting’ Problem


Solution to ‘You may be a victim of software counterfeiting’ Problem


Microsoft has started bugging the users of non genuine copies of Windows. If you are also running a non genuine or pirated copy of Windows then there is a full chance of you getting this notification one day or the other.






The problem was reported by one of our viewers that when she updated her copy of Windows with Windows Update then her system started showing this notification that reads “You may be a victim of software counterfeiting” and “This copy of windows does not pass genuine Windows validation”.





These notifications start coming back again after some time and do not feel good. Though I never encourage piracy but here is how you can remove this problem:

1. Before doing anything serious try restoring your system. If the problem is occurring after the Windows Update then System Restore will surely help.

2. But if it does not then do try this, launch Windows Task Manager.

3. Locate the process “wgatray.exe” and end it.

4. Log in into the Safe Mode and delete the file WgaTray.exe from c:\Windows\System32

5. Also delete the WgaTray.exe from c:\Windows\System32\dllcache

6. Type regedit in Run to open Registry Editor, navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify key.

7. Delete the folder WgaLogon and all of its contents.

8. Restart the PC normally.

Monday, July 13, 2009

Google Chrome Operating System

Direct From GOOGLE :-

It's been an exciting nine months since we launched the Google Chrome browser. Already, over 30 million people use it regularly. We designed Google Chrome for people who live on the web — searching for information, checking email, catching up on the news, shopping or just staying in touch with friends. However, the operating systems that browsers run on were designed in an era where there was no web. So today, we're announcing a new project that's a natural extension of Google Chrome — the Google Chrome Operating System. It's our attempt to re-think what operating systems should be.

Google Chrome OS is an open source, lightweight operating system that will initially be targeted at netbooks. Later this year we will open-source its code, and netbooks running Google Chrome OS will be available for consumers in the second half of 2010. Because we're already talking to partners about the project, and we'll soon be working with the open source community, we wanted to share our vision now so everyone understands what we are trying to achieve.

Speed, simplicity and security are the key aspects of Google Chrome OS. We're designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates. It should just work.

Google Chrome OS will run on both x86 as well as ARM chips and we are working with multiple OEMs to bring a number of netbooks to market next year. The software architecture is simple — Google Chrome running within a new windowing system on top of a Linux kernel. For application developers, the web is the platform. All web-based applications will automatically work and new applications can be written using your favorite web technologies. And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform.

Google Chrome OS is a new project, separate from Android. Android was designed from the beginning to work across a variety of devices from phones to set-top boxes to netbooks. Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from small netbooks to full-size desktop systems. While there are areas where Google Chrome OS and Android overlap, we believe choice will drive innovation for the benefit of everyone, including Google.

We hear a lot from our users and their message is clear — computers need to get better. People want to get to their email instantly, without wasting time waiting for their computers to boot and browsers to start up. They want their computers to always run as fast as when they first bought them. They want their data to be accessible to them wherever they are and not have to worry about losing their computer or forgetting to back up files. Even more importantly, they don't want to spend hours configuring their computers to work with every new piece of hardware, or have to worry about constant software updates. And any time our users have a better computing experience, Google benefits as well by having happier users who are more likely to spend time on the Internet.

We have a lot of work to do, and we're definitely going to need a lot of help from the open source community to accomplish this vision. We're excited for what's to come and we hope you are too. Stay tuned for more updates in the fall and have a great summer.

Sunday, July 12, 2009

What is full form of RSVP written on invitation cards

The full form is repondez s'il vous plait. It's French for reply (if you) please.

However, it is never written out in full on invitations in English-speaking countries, and the full version might leave some people puzzled, whereas RSVP is understood.
(Incidentally, the French use a slightly different version: Répondre SVP).

In INDIA Its Like ,, Respond To An Invitation ,, Very Urgent ,, Please Reply ..

Friday, May 01, 2009

Who Is Orkut????~~Read on~~

Who Is Orkut ??





Who Is
Orkut????

A guy lost his girlfriend in a train accident.... but
the gal's name nowhere appeared in the dead list. This guy grew up n
became IT technical architect in his late 20's, achievement in itself!!


He hired developers from the whole globe and plan to make a software where he could search for his gf through the web.. 

Things went as planned... 

n he found her, after losing millions of dollars and 3 long years!! 

It was time to shut down the search operation, when the CEO of Google had a 
word with this guy n took over this application, 

This Software made a whopping 1 billion dollars profit in its first year, 

which we today know as ORKUT. 


The guy's name is Orkut Büyükkökten Yes
it's named after him only. Today he is paid a hefty sum by Google for
the things we do like scrapping. He is expected to b the richest person by 2009.. 

Orkut Büyükkökten today has 13 assistants to monitor his scrapbook & 8 to 

monitor his friends-list. He gets around 20,000 friend-requests a day & about 85,000 scraps!!! 

Some other Cool Facts about this guy: 

* He gets $12 from Google when every person registers to this website. 

* He also gets $10 when you add somebody as a friend. 

* He gets $8 when your friend's friend adds you as a friend & gets $6 if 

anybody adds you as friend in the resulting chain. 

* He gets $5 when you scrap somebody & $4 when somebody scraps you. 

* He also gets $200 for each photograph you upload on Orkut. 

* He gets $2.5 when you add your friend in the crush-list or in the hot-list. 

* He gets $2 when you become somebody's fan. 

* He gets $1.5 when somebody else becomes your fan. 

* He even gets $1 every time you logout of Orkut. 

* He gets $0.5 every time you just change your profile-photograph. 

* He also gets $0.5 every time you read your friend's scrap-book & $0.5 every time you view your friend's friend-list

Fastest Internet Connection...60dvd/sec...breaking all records..

Fastest Internet Connection...60dvd/sec...breaking all records..


Scientists have set a new world record for data transmission by transferring a data rate of 2.56 Terabit per second over a glass fibre link of 160 km length.

2,560,000,000,000 bits are equivalent to the contents of 60 DVDs.

By comparison, the fastest high-speed links currently carry data at a maximum 40 Gbit/s, or around 50 times slower.

The research was carried out at Fraunhofer Institute which also developed computers with Emotion sense.

Sunday, March 29, 2009




Many of my friends and readers adamantly refused to make the switch to Windows Vista when it came out. Some who bought new machines with Vista installed immediately “downgraded” the OS. A few proclaimed that they would give up XP only when you pried it from their cold, dead hands. But even in the last category, many of them are impressed with what they’ve seen in the Windows 7 beta.

While some tech pundits are saying 7 isn’t really all that different from Vista — and indeed, one of the attractions for Vista users is that 7 can generally use the same drivers and run the same apps as Vista — the consensus among anti-Vista folks I know who’ve tried the 7 beta seems to be that the new operating system is “Vista done right.”

Here’s why I think you’ll see many of the XP diehards happily embracing Windows 7 when it’s released.


1: UAC has mellowed out

User Account Control in Vista is like living with an overprotective mother — when you’re 30. It’s constantly popping up to warn you of impending danger, even when you’re just trying to take a look at Device Manager or perform some other innocent task. It hovers over you and nags you constantly: “Are you sure you want to do that?” Like Mom, UAC has our best interests in mind, but it can drive you nuts in the name of “security” — especially when you consider that it doesn’t really define a security boundary. (For more on that, see Mark Russinovich’s TechNet Magazine article “Inside Windows Vista User Account Control.”

Windows 7 doesn’t do away with UAC, but it does give users options regarding its behavior. By reducing the number of unnecessary and redundant UAC dialogs, making the prompts more informative, and providing users with more control over UAC, Windows 7 maintains many of the benefits of the feature without intruding on users’ computing lives so much that they turn the whole thing off in frustration.

2: Explorer is no longer a pane in the behind

In a misguided attempt to alleviate the need for horizontal scrolling, Vista made the left navigation pane in Windows Explorer a constantly moving target. As you move your mouse, it will automatically scroll back and forth. My husband calls this auto-scrolling feature the “whack a mole” phenomenon because of the way the contents of the pane seem to dodge back and forth.

You can avoid the auto-scrolling by dragging the pane to make it wide enough to accommodate the entire tree, but that isn’t a good option on a small screen, such as the one on my compact VAIO notebook.

In Windows 7, the navigation pane stays still, so you no longer risk getting seasick from all the swaying back and forth.

3: Graphics cards coexist peacefully once more

In XP, we could use pretty much whatever graphics cards we wanted for multiple monitors. I had a machine with three cards installed: an NVidia, an ATI, and a Matrox. XP would stretch my desktop across all three monitors attached to those cards. When I upgraded that machine to Vista, I found that I no longer had multiple monitors. Some research revealed that to use multiple graphics cards, they would have to all use the same driver. That meant I couldn’t use cards from different vendors together. I had to shell out a few bucks to get more ATI cards before I could use all my monitors again.

According to reports, Windows 7 has added support for multiple heterogeneous graphics cards from different vendors. Now this probably doesn’t mean you can combine ATI and NVIDIA cards in an SLI-configuration, but it sounds as if we can have our multi-vendor multi-monitor setups back.

4: Clutter and bloat are reduced

Vista was perhaps the culmination of Microsoft’s efforts to be all things to all users. Along with the built-in applications we got with XP, Vista added a contacts program, a calendaring program, a photo editing program, and so forth. While some users appreciate all these free applications, many others have been annoyed by the “extras” they don’t need or use. If you’re planning to install Office with Outlook, there’s no need for Contacts and Calendar. And if you have your own favorite and more powerful graphics applications, such as PhotoShop, there’s no need for Photo Gallery. The extras just clutter up your Programs menu and take up space on the hard disk.

With Windows 7, Microsoft has removed a number of the extra programs and now offers them as free downloads from the Windows Live Web site. This way, those who want them can have them, and those who don’t won’t have to deal with removing them.

5: Boot performance is better

Another common complaint about Vista has been the inordinate amount of time it can take to boot up. This might not be an issue for those who leave their systems on all the time, but if you turn off your computer every night, waiting around forever for it to get started in the morning can turn into a major annoyance.

A Microsoft spokesperson indicated that the company’s goal for Windows 7 is a 15-second boot time, whereas three quarters of Vista users report boot times of more than 30 seconds. Although the beta of Win7 may not have achieved that 15-second mark yet for most users, the majority of beta testers I’m hearing from say it’s substantially quicker than Vista on the same hardware. That’s been my personal experience, as well. Since it is still a beta, it’s not unrealistic to hope that continued tweaking will get that time down further before the final release.

6: Notifications can be fine-tuned

In XP and Vista, you can disable the balloon notifications in the system tray, but what if you’d like to continue to get notifications from some applications but not from others? Windows 7 allows you to customize the behavior by simply clicking the little arrow next to the tray and selecting Customize. In the dialog box, choose which icons you want to appear in the tray. For each application, you can select whether you want to display notifications or hide them, as shown in Figure A.

Figure A

Windows 7 gives you much more control over those notifications in the system tray.

7: Security messages are consolidated

In Vista, you have several security-related icons in the system tray, and you might have notifications popping up from each one. To make changes to security settings, you may have to open several applications. In Windows 7, all the security messages have been consolidated into one icon. When you click it, you’ll see all messages related to firewall, Windows Defender, Windows Update settings, and so forth, as shown in Figure B.

Figure B

Windows 7 consolidates all security-related messages in one system tray icon.

By clicking the Open Action Center link in the message box, you can make the changes that are recommended or (for example, in the case where you have an antivirus program installed but Windows doesn’t recognize it), you can select the option to turn off messages regarding that application, as shown in Figure C.

Figure C

You can make changes or turn off particular security notifications in the Action Center.

8: Side-by-side windows auto-size

Most of the monitors sold today come in a wide aspect ratio that’s better for watching movies, which is also handy for displaying two documents side by side on the screen. With Vista, though, you have to manually size those docs. Windows 7 has a cool new feature by which you can drag windows to each side of the screen and they will automatically size themselves to each take up half the screen when you let go of the cursor.

Even better, if you drag the window back away from the edge, it goes back to the size it was before. How cool is that?

9: Home networking gets simple

For home users without a lot technical know-how, networking has been made simpler in Windows 7. A new feature called HomeGroup allows all Windows 7 computers on a network to share files, printers, and other resources more easily. Thanks to Libraries (collections of certain types of files, such as music, photos, or documents), you can access files anywhere on the HomeGroup network as if they were stored locally, and you can search across the whole HomeGroup.

Windows Media Player in Windows 7 can stream the music and videos on one PC in the network to another, and even play back songs from iTunes libraries on other computers.

Connecting to a wireless network is also easier; now you can click the wi-fi icon in the system tray and select a network from the list, instead of opening up a separate dialog box to make the connection.

10: Taskbar preview really works

In Vista, you can hover over a taskbar button — for Internet Explorer, for example — and see that three instances of IE are open. You see the open pages stacked as shown in Figure D, but they’re so small that it’s difficult to really tell which page is which.

Figure D

The Vista taskbar preview gives you an idea of what your running application windows contain.

In Windows 7, the preview feature has been enhanced so that it becomes an extremely useful function. Now when you hover over a taskbar icon, you get actual previews that are placed side by side and are large enough for you to identify (Figure E).

Figure E

In Windows 7, you can actually tell what’s in each of those preview windows.

And that’s not all. If you’re playing a video in one of the windows, that video plays in the preview window, too. And if you right-click the IE icon in the taskbar, you get a list of your IE history files, as shown in Figure F. You can just click any of those and go immediately to that page.

Figure F

Right-clicking the taskbar icon gives you more options; in the case of IE, you can select from the history files, open a new instance of the browser, unpin the program, or close the window.
TIMER FOR WINDOWS SHUTDOWN AND RESTART


FOLLOW THESE STEPS FOR WINDOWS TIMER SHUTDOWN AND RESTART :


This may be help to you if have the habit of listening to songs and sleeping or if you are planning to download some thing.

1. open notepad and type “shutdown -s -t


2. Save the file as “.bat” and a batch file is created for shutting down.

This works for me…i sleep with a wait for 10 mins during which songs play…after that pc shuts down automatically…no tension of shutdown

3. To restart the pc command is “shutdown -r -t


Type shutdown /help in cmd for more options on this shutdown command

You can do this without batch file also

   1. Go to Start>run>
   2. Type cmd
   3. Then type shutdown -s -t XXXX (XXXX is time in seconds)

Display your own legal notice or custom message on startup


Display your own legal notice or custom message on start up




Wanna tell your friends about the do’s and do nots in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up. Follow these simple steps:

1. Click on start>run(win key+r)

2. Then tpye “regedit” there, this opens up the registry editor, now goto

HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>policies>system

3. Now when you high light system, on the right you can find :

    * “legalnoticecaption”
    * “legalnoticetext”

Right click in them to add you own notice or custom message :

“legalnoticecaption”=”enter your notice caption”
“legalnoticetext”=”enter your legal notice text”

Play With Your Friends By Removing Shutdown Option From Their Computer


Wanna play with your friends by removing the shutdown option from start menu in their computer.
Just hack it down !!!



Click on start>run(win key+r)

Then tpye “regedit” there, this opens up the registry editor, now goto

HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Explorer

Then set “NoClose”=”DWORD:1″

Monday, March 23, 2009

Want to know more about?

What is Zero Hour?
----------------------

Zero hour is an informal device available to the members of the Parliament or assembly to raise matters without any prior notice. The zero hour start immediately after the question hour and lasts until the agenda for the day is taken up.



What is 4G technology?
---------------------------

4G is fourth generation of wireless communication system that operates on internet technology using various wired and wireless networks. It combines applications and technology like Wi-Fi and Wi-Max.

Friday, March 20, 2009

Computer Quiz 4 PSC Exams


1. Expansion of 'ODF' ?

2. Expansion of 'PDF' ? 

3. Who acquired the company 'double click'?

4. What is meta search engine?

5. What is page rank algorithm?

6. Expansion of 'PICS'?

7. What is 'Road Runner'?


THE ANSWERS ARE  :-

1. ODF : Open Document Format

2. PDF : Portable Document Format

3. Double Click acquired by Google


4. A meta-search engine is a search engine that sends user requests to several other search engines.

5. Page Rank Algorithm is the search algorithm used by Google search Engine.

6.Policy Information Capture System

7.ROAD RUNNER :- Super Computer Built by IBM, The worlds fastest computer

Some words about Google


Google's Chairman and Chief Executive Officer : Eric Schmidt.

Google Founded in 1998 by Stanford Ph.D. students Larry Page and Sergey Brin.

Computer Objective Questions

PSC Solved Paper.


1. _________ is a powder used in laser printers to form the images on a paper.


Toner

2. Worms and Trojan Horses are examples of:


Malware

3. ___________ Printers work by selectively heating regions of special heat-sensitive paper.


Thermal

4.The ISI mark is given by:


BIS

5. The laser printer was invented at:


Xerox

7. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:


Race condition

8. A 56k modem can transfer data at up to bits per second over the phone line.


56000

9. The original implementation of the C programming language was standardized by :


ANSI

10. ________Is a signaling method that handles a relatively wide range of frequencies.


Broadband

11. The port number used by SMTP is:


25

13. A packet filter is a type of


Firewall

15. Which among the following utilities can detect a bad sector?


CHKDSK and SCANDISK

16. In 100BASE-T, 'T' stands for:


Twisted pair

17. A head crash is said to occur when the read-write head of a hard disk drive:


Touches the magnetic media

18. Category 5 cable includes ---twisted pairs in a single cable jacket.


4

19. The port number used by the HTTP protocol is


80

20. In PowerPoint presentations, individual pages are called:


Slides

21. Power-on-self-test is built into the:


BIOS

22. PowerPoint can embed content from other applications through:


OLE

23. The latest release of Microsoft Windows is called:


Vista

24. GRUB is an:


Boot loader

25. __________Is a family of programmable interrupt controller chips.


8259

26.card allows television signals to be received by a computer.


TV tuner

27. ________Is an IEEE 1394 implementation.


Fire Wire

28 'Windows protection error' messages may result from:


Damage to the system registry

29 Sound Blaster line of audio cards were made by :


Creative Technology Ltd.

31 Indiscriminate sending of unsolicited bulk messages is known as :


Spamming

32 The 'blue screen of death' may occur due to:


All the above

33 FAT manages files in contiguous groups of sectors called:


Clusters

34 The utility which can be used to clean the windows registry is:


regedit

36. Ultra Wide SCSI had a throughput of: (A) 10 MB/s


40 MB/s

37. A dual-core processor has L1 cache.


2

40. Port 110 is used by _______


POP3

41. A file extension .ogg indicates an ______format


Audio codec

42. Kerberos ts a__________protocol.


Network authentication

43. Athlon series of processors are made by:


AMD

44. Which among the following is a real-time operating system?


QNX

45. The internet top level domain .cn refers to :


China

47. _____________ Is a protocol used by networked computers(clients) to obtain IP addresses and other parameters from a server.


DHCP

48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture.


Itanium

49. is an organization which develops internet standards through RFCs.


IETF

50. The ability to replace components of a computer, while it is operating, is called:


Hot swapping