Touch with us for Information Technology Solutions. Email us for your Query on Technical.gaurav@gmail.com.
Propellerads

05/10/2015

10 things you should have to consider when buying a new laptop .

10 things you should have to consider when buying a new laptop .



These days purchasing a new laptop is too difficult , what to get like ( Processor , Ram , how much Hard disk  Etc )

For this we should have to first written down our requirement , our needs , our usages , main thing our budget.
However, we do give people a checklist that they should consider before splurging on a new device.  


1. Size: If portability is your main concern, then you need to consider a notebook that has a small-ish screen and a light weight. Any laptop marketed as an Ultrabook should fit your bill here, as they are designed to be slim and light. More to the point, though, look for a laptop with a screen that’s 12.5-13.3 inches in size, and a weight that is from 1-1.5kg.

2. Screen quality: You’ll be staring at your laptop for many hours every day, so you want to make sure you get a screen that is comfortable to look at. Many laptops these days also have touchscreens, which means they are glossy. Glossy screens lead to reflections, so consider a laptop that doesn’t have a touchscreen.
Next, look at the resolution. A 1920x1080-pixel resolution (aka Full HD) should be considered if you want plenty of space to line up windows and keep things in view. Finally, the viewing angles are extremely important. A laptop screen that touts IPS (in-plane switching) technology offers the widest viewing angles and the best user comfort.
Try not to buy blind. If possible, go into a store and see the screen for yourself. Otherwise, rely on multiple reviews to get a good overview of the product.
3. Keyboard quality: For long typing sessions, you must get a laptop that has a comfortable keyboard. You don’t want to get a keyboard that packs in every key under the sun (think keyboards that have squished in number pads) because that can translate to a poor overall user experience when hunting for keys like the arrows.

4. CPU: It’s hard to go past any of Intel’s Core-based CPUs when buying a new laptop. Think Core i3, Core i5, and Core i7. These CPUs offer the best performance when it comes to multitasking and multimedia tasks. Core i3-based notebooks are generally found in entry-level systems, while Core i5 makes up the majority of mainstream computers.
Core i7-based systems are for those of you who want the best performance from your laptop. However, note that with a Core i7-based system, heat coming through the base of the laptop can be cause for concern, especially if you plan to actually use the laptop on your lap a lot of the time.
5. RAM: You need 4GB of RAM or more to get the best out of your system. More RAM allows for more applications to be run at the same time, and for more data to be quickly accessible by the system at any one time, which comes in handy for tasks such as editing photos.

6. Storage: Hard drives used to be all the rage, but these days they are mostly out of favour, especially for thin and light laptops. This is because they can be slow, somewhat bulky, and produce noticeable heat and noise. A solid state drive (SSD), on the other hand, offers a lot more speed than a hard drive, runs silently, and can be installed in a form factor that doesn’t add too much to the weight and bulk of a laptop.
The only problem is that SSDs don’t offer as much capacity. You’ll be stuck with a drive that’s either 128GB or 256GB in size, and even then, laptops with 256GB SSDs are pretty expensive. Stick to a 128GB SSD for your new laptop, though, and you’ll love the speed with which it can load programs, access your data, and also how quickly it can boot up your system (it takes under 7 seconds for some Windows 8 systems).
7. Battery life: Manufacturer-quoted battery life is often not indicative of what a laptop can do, and this is based on the many variables that affect battery life. These are the screen brightness, the screen resolution, and the tasks that you run. If you run programs that need lots of processing, or if you stream lots of online video, or if you transfer lots of files over your wireless network, then your battery will drain a lot sooner than what the vendor has quoted.
Look at the rating of the battery in Watt-hours (Wh) or milliamp-hours (mAh). The larger these figures are, the longer the battery can last. For a 13.3in Ultrabook, for example, a battery with a rating from 44Wh to 50Wh will give you the best results.
8. Wireless networking and Bluetooth: This is something that can be often overlooked when buying a laptop, but considering that most laptops rely on an Internet connection for the majority of their tasks, it’s an extremely important feature. At the very least, you need a laptop that has a dual-band Wi-Fi adapter. This will allow you to use the laptop with a dual-band router’s 5GHz network, allowing it to work quicker and perhaps segregating it from other devices on your network that use the 2.4GHz network.
For those of you who want the fastest networking, get a laptop with an 802.11ac wireless adapter (some laptops come with an Intel Wireless-AC 7260), which can work with the latest range of 802.11ac routers that have hit the market recently. Using 802.11ac, your file transfer rates will be able to hit speeds over 30 megabytes per second (MBps), and in some cases even approach 40MBs. This is beneficial when you want to transfer video files to your laptop before going on a trip, for example.
Also look for Bluetooth 4.0. Bluetooth isn’t only handy for connecting to wireless mice and keyboards, it’s also awesome for connecting to a Hi-Fi system wirelessly. We use Bluetooth all the time to play music through a stereo system from our laptop. This is music that’s either stored locally or streamed from Google Play Music or online radio stations while we work.
9. Full-sized SD card: Why would you want a full-sized SD card? Well, if you’re a photographer and you quickly want to get photos off the camera and onto your laptop, the SD card slot is the best way to do so. Many modern cameras come with Wi-Fi to facilitate transfers from the camera, but that’s still a fiddly process. Some SD card slots are better than others, too. Look for one in which the card can sit all the way in, rather than a slot that makes the card stick halfway out.
10. USB 3.0: You shouldn’t get a laptop without a USB 3.0 port, and you should look for a laptop that has at least a couple of these ports. This is for obvious reasons such as plugging in an external hard drive to back up your laptop’s data, or for when you want to plug in a conventional mouse or a fancy keyboard.

Meet your needs and budget

Of course, you need to balance these features with your budget and your needs, and you might have to make some compromises. Rarely does a laptop come along that ticks all the boxes, especially when it comes to price. Let us know in the comments below if you consider other aspects of a laptop to be more important (maybe you want better gaming performance or a rugged build, maybe you want a laptop that can turn into a tablet), and especially let us know if you’ve already found the perfect laptop for your needs.
Thank you .

How to install .EXE format software on mac without using Parallel desktop / Virtual Desktop .

How to install .EXE format software on mac without using Parallel desktop / Virtual Desktop or installing windows .




Being a Mac user, I can proudly say it is one of the most powerful machine ever built for the Developers. When I switched to Mac from Windows, for 2-3 days I found it very difficult to operate Mac. But now, I can’t think of switching back considering the User-friendly GUI and my love for UNIX. Though everything is just amazing, but there’s always room for improvement and Mac is no exception to it. 
Most of the people don’t even realise that many of the apps that they used to run on Windows are not available for Mac until they hit the roadblocks. Some of them end up paying the hefty amount for Parallel Desktop and other install Windows via BootCamp. In case you don’t need complete Windows experience and just want to run some apps or programs, we have a better solution for you. Today, at itbullexperts, we are with How To Run exe Files On Mac Without Installing Windows :-

Before We Begin, You Need:

  1. Mac running on OS X 10.6  or above.
  2. WineBottler and Wine app installed on your Mac. Both the app comes in a single package, just drag both the apps to Application folder.
[Download WineBottler Package]



How To Run exe Files On Mac Without Installing Windows

Step 1: Done with installing WineBottler and Wine app? 
Step 2: Keep your .exe file that you want to run on your Mac handy.
Step 3: Now head over to the file and double click on it.I have tally.exe file .
Step 4: It’ll ask you if you want to run the .exe file directly or want to convert it to Mc bundle first, the choice is totally yours. ( Run Directly ).

Step 5: A window will pop up. Keep the settings same, but the particular settings highlighted in the screenshot totally depends upon your choice. Select any one of them according to your needs, it’ll not be a problem.
Step 6: Press the Install button, sit back and relax as Wine will do rest of the work for you. Finally, you’ll be gifted with the Mac bundled application of your favorite windows .exe file.
Thank you .


Schedule your Windows OS for shut down When you want .

How to schedule Shut down process in Windows OS .


Computer dealer panipat


Sometimes we felt the need to shut down Windows after a specified time in case of an emergency or due to some other reason, but couldn’t find a way to do so.

For this i will tute you how to schedule shutdown command :

Follow the steps :- 


  • Go to your Desktop .
  •  Right Click and click on new short cut :- this will open a new windows asking  for location .

  • Now, you need to recall your primary math concepts.

  • We have,
1 minute = 60 seconds
1 hour = 60 minutes*60 = 3600 seconds
  • After you’ve successfully recalled the conversion of minutes to seconds. Type, shutdown –s –t 60 in the text field below ‘Type the location of this item’.
Computer dealer panipat

  • The number 60 written in the above command stands for seconds, so type the number of seconds after which you want to schedule a shutdown. For example, we tested it to shut down after 1 minute (60), and it worked successfully.




Computer dealer panipat

  •  Click Next, when you’re done typing the command.

  • In the next step, name the file Shutdown.exe. You can name it whatever you like, but don’t forget to add ‘.exe’ at the end of the file name.

Computer dealer panipat


  • Click Finish and you’re done.

  • Now, just double-click the Shutdown.exe file created on your desktop whenever you need to schedule a shutdown after a minute gap.
Through these process we manage shutdown timing as per our need .

Thank you .




Difference type of Viruses, Ransomware, Worms Trojans, Bots, Malware, Spyware etc & their means .

Difference type of Viruses, Ransomware, Worms  Trojans, Bots, Malware, Spyware etc & their means .



computer service center panipatComputer service center panipat


These days as all we knows that you laptop desktop and other it device are infected with virus .
You always think what the hell are these viruses , why i am struggling with my work .

What are these virus ?
What are the type of Viruses ?
What they means ?
How do we get rid Viruses ?


We have heard many type of virus likeViruses, Ransomware, Worms  Trojans, Bots, Malware, Spyware etc. No matter these all are viruses in one mean .These are meant to Harm , Spy , Stole of your data in different way .Basically we can say these are a designed program to hack and spy our system's , these are just a Malicious or we can say malware computer program .

Different types of malware :- 

Worms :-

These programs have the ability to replicate themselves. Their sole objective is to increase their population and transfer themselves to another computers via the internet or through storage media, all the work is done like a top secret mission hiding their movement from the user. They don’t cause any harm to the computer, their replicating nature consumes hard drive space, thus slow down the machine. Some of the notable worms are, SQL Blaster which slowed the internet for a small period of time, Code Red took down almost 359,000 websites.

Viruses: 

They also have the ability to replicate themselves, but they do damage files on the computer they attack. Their main weakness lies in the fact, they can get into action only if they have the support of a host program, otherwise they’re just like a defeated warrior. They stick themselves to songs, videos, and executable files and travel all over the internet. W32. Sfc.Sfc!mod, ABAP.Rivpas.A,Accept.3773 are some of the examples of Virus programs.

The Virus Gang:

File Viruses
Macro Viruses
Master Boot Record Viruses
Boot sector Viruses
Multi-Partite Viruses
Polymorphic Viruses
Stealth Viruses

Trojans:

 Basically, Trojans are no Viruses, and are not meant to damage or delete files on your system. Their sole task is to provide to a backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permission. JS.Debeski.Trojan is an example of Trojan.
They are named after the ‘Trojan Horse’ tale, in which Greeks entered the city of Troy with the help of a wooden horse which was meant to be a gift, but turned out to be a sweet poison, as depicted in the movie Troy.

The Trojan Gang:

Remote Access Trojans
Data Sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
Security Software Disabler Trojans
Denial-Of-Service Attack Trojans

Adware: 

Adware are used to display advertisements in the programs. They generally come attached with software programs that are free to use as they are the only source of revenue for the developers of those software programs. Adware can’t be completely called as Malware as they have no intention to harm your machine, they only track what advertisements you’re more interested in, so as to display the relevant advertisements on your screens.

Spyware: 

These programs also come attached with other freeware software, track your browsing and other personal details and send it to a remote user. They can also facilitate installation of unwanted software from the internet. Unlike Adware, they work as a standalone program and do their operations silently.

Spam: 

You get very irritated when you receive unwanted emails from unknown senders, these are called Spams or junk mails. And the process of flooding the internet with the same message is called Spamming, is done for the purpose of commercial advertising. These junk mails may sometimes contain Viruses or Trojans that enter your system as soon as you open the mail.

Bots: 

Bots or Robots are automated processes that are designed to interact over the internet without the need of human interaction. They can be used for good and bad intentions. An evil minded person can create a malicious Bot that is capable of infecting the host on its own. After transmitting itself to the host device, a Bot creates a connection with central servers which act as the command centers for the infected hosts attached to that network, called Botnet.
Their skills include stealing passwords, logging keystrokes, analyzing network traffic, relay spam, launch DoS (Denial of Service) attacks and open back doors on infected hosts. These Bots can be seen as the advanced form of Worms, their infection rate and tactic is more effective than those of Worms. These malicious Bots are created after a lot of hard work done by their malignant creators.

Ransomware: 

These type of malware alter the normal operation of your machine, thus barring you to use it properly. Thereafter, these programs display warning messages asking for money to get your device back to normal working condition.





Now how can you protect your Computer :

  • Keep your system up to date.
  • Use genuine software.
  • Install an antivirus software and update it regularly.
  • Set-up a firewall, may it be custom as provided by antivirus software. Windows has an in-built firewall option in case you don’t want to use a custom firewall.
  • Never open unknown emails that generally reside in your Spam folder.
  • Never open unknown links, use online website safety checker tools if you’re not sure to open a website.
By taking these simple measures, you can effectively keep your machine free from Malware and other potential threats.


Thank you .