25 March 2012

Run Commands that can be used in both “Windows Operating System:


Run Commands that can be used in both “Windows Operating System:



To open…

Run Commands…
MSN Messenger (If installed)
msnmsgr
Accessibility Options
control access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add or Remove Programs
appwiz.cpl
Add/Remove Programs with Add New Programs
Preselected
control appwiz.cpl,,1
Add/Remove Programs with Add Remove Windows
Components Preselected
control appwiz.cpl,,2
Add/Remove Programs with Set Program Access &
Defaults Preselected
control appwiz.cpl,,3
Administrative Tools
control admintools
Adobe ImageReady (if installed)
imageready
Adobe Photoshop (if installed)
photoshop
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
Control Panel
control
Date and Time Properties
timedate.cpl
Device Manager
devmgmt.msc
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties with Appearance Tab Preselected
control color
Driver Verifier Utility
verifier
DVD Player
dvdplay
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Files and Settings Transfer Tool
migwiz
Firefox (if installed)
firefox
Fonts Folder
fonts
Fonts options
control fonts
Game Controllers
joy.cpl
Iexpress (Self Extracting Package Creator)
iexpress
Iexpress Wizard
iexpress
Internet Explorer
iexplore
Internet Properties
inetcpl.cpl
Java Web Start
javaws
Keyboard Properties
control keyboard
Logs You Out Of Windows
logoff
Microsoft Access (if installed)
msaccess
Microsoft Excel (if installed)
excel
Microsoft Frontpage (if installed)
frontpg
Microsoft Malicious Software Removal Tool
mrt
Microsoft Movie Maker
moviemk
Microsoft Paint
mspaint
Microsoft Powerpoint (if installed)
powerpnt
Microsoft Word (if installed)
winword
Mouse Properties
main.cpl
Mouse Properties
control mouse
Nero (if installed)
nero
Network Connections
control netconnections
Network Connections
ncpa.cpl
Notepad
notepad
ODBC Data Source Administrator
odbcad32
On Screen Keyboard (interesting tool!)
osk
Outlook Express
msimn
Paint
pbrush
Phone and Modem Options
telephon.cpl
Phone Dialer
dialer
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Private Character Editor
eudcedit
Quicktime Player (if installed)
quicktimeplayer
Quicktime (If Installed)
QuickTime.cpl
Real Player (if installed)
realplay
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedt32
Reliability and Performance Monitor
perfmon.msc
Remote Access Phonebook
rasphone
Remote Desktop
mstsc
Scheduled Tasks
control schedtasks
Services
services.msc
Shared Creation Wizard
shrpubw
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio Properties
mmsys.cpl
SQL Client Configuration
cliconfg
Sync Center
mobsync
Syncronization Tool
mobsync
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System Information
msinfo32
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
Tweak UI (if installed)
tweakui
Utility Manager
utilman
Windows Address Book (Contacts)
wab
Windows Address Book Import Utility
wabmig
Windows exprorer(It shows me Documents)
explorer
Windows Firewall
firewall.cpl
Windows Magnifier (Try this out!)
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows Media Player
wmplayer
Windows Picture Import Wizard (require camera
connected)
wiaacmgr
Windows Security Center
wscui.cpl
Windows System Security Tool
syskey
Windows Version (About your Windows)
winver
Wordpad
write


Read more: http://www.computertipsfree.com/useful-run-commands-for-windows-vista-and-xp/#ixzz1q8ZDZK4R

Assertive Communication


Assertive Communication

Assertive communication is the ability to express positive and negative ideas and feelings in an open, honest and direct way. It recognises our rights whilst still respecting the rights of others. It allows us to take responsibility for ourselves and our actions without judging or blaming other people. And it allows us to constructively confront and find a mutually satisfying solution where conflict exists.
So why use assertive communication?
All of us use assertive behaviour at times... quite often when we feel vulnerable or unsure of ourselves we may resort to submissive, manipulative or aggressive behaviour.
Yet being trained in assertive communication actually increases the appropriate use of this sort of behaviour. It enables us to swap old behaviour patterns for a more positive approach to life. I've found that changing my response to others (be they work colleagues, clients or even my own family) can be exciting and stimulating.
The advantages of assertive communication
There are many advantages of assertive communication, most notably these:
  • It helps us feel good about ourselves and others
  • It leads to the development of mutual respect with others
  • It increases our self-esteem
  • It helps us achieve our goals
  • It minimises hurting and alienating other people
  • It reduces anxiety
  • It protects us from being taken advantage of by others
  • It enables us to make decisions and free choices in life
  • It enables us to express, both verbally and non-verbally, a wide range of feelings and thoughts, both positive and negative
There are, of course, disadvantages...
Disadvantages of assertive communication
Others may not approve of this style of communication, or may not approve of the views you express. Also, having a healthy regard for another person's rights means that you won't always get what YOU want. You may also find out that you were wrong about a viewpoint that you held. But most importantly, as mentioned earlier, it involves the risk that others may not understand and therefore not accept this style of communication.

Cloud computing - Defination and Explanation

Cloud computing - Defination and Explanation

According to a paper published by IEEE Internet Computing in 2008 "Cloud Computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients that include computers, laptops, handhelds, sensors, etc.

In Computer science, Cloud computing is a marketing term. In the case of electricity, users can simply use it. They do not need to worry where the electricity is from, how it is generated, or transported. At the end of the month, they will get a bill for the amount of electricity they consumed.

The idea behind cloud computing is similar: The user can simply use storage, computing power, or specially crafted development environments, without having to worry how these work internally. Cloud computing is a systems architecture model for Internet-based computing. It is the development and use of computer technology on the Internet. The cloud is a metaphor for the Internet based on how the internet is described in computer network diagrams; which means it is an abstraction hiding the complex infrastructure of the internet. It is a style of computing in which IT-related capabilities are provided “as a service”, allowing users to access technology-enabled services from the Internet ("in the cloud")without knowledge of, or control over the technologies behind these servers.

Cloud computing is a general concept that utilizes software as a service (SaaS), such as Web 2.0 and other technology trends, all of which depend on the Internet for satisfying users' needs. For example, Google Apps provides common business applications online that are accessed from a web browser, while the software and data are stored on the Internet servers.

Cloud computing is being driven by providers including Google, Amazon.com, and Yahoo! as well as traditional vendors including IBM, Intel, Microsoft and SAP.

Key characteristics

Capital expenditure minimized, therefore low barrier to entry as infrastructure is owned by the provider and does not need to be purchased for one-time or infrequent intensive computing tasks. Services are typically being available to or specifically targeting retail consumers and small businesses.

Device and location independence which enables users to access systems regardless of location or what device they are using (for example PC, mobile,... etc).

Multitenancy enabling sharing of resources (and costs) among a large pool of users, allowing for:
Centralization of infrastructure in areas with lower costs (eg real estate, electricity)

Peak-load capacity increases (users need not engineer for highest possible load levels)

Utilization and efficiency improvements for systems that are often only 10-20% utilised.

Performance is monitored and consistent but can be affected by insufficient bandwidth or high network load.

Reliability by way of multiple redundant sites, which makes it suitable for business continuity and disaster recovery, however IT and business managers are able to do little when an outage hits them.[32] Historical data on cloud outages is tracked in the Cloud Computing Incidents Database.

Scalability which meets changing user demands quickly, without having to engineer for peak loads. Massive scalability and large user bases are common but not an absolute requirement.

Security which typically improves due to centralization of data, increased security-focused resources, etc. but which raises concerns about loss of control over certain sensitive data. Accesses are typically logged but accessing the audit logs themselves can be difficult or impossible.

Sustainability through improved resource utilisation, more efficient systems and carbon neutrality.




18 March 2012

Difference between view state and a hidden field in asp.net

Difference between view state and a hidden field in asp.net

Both are used to store the value during the postback in asp.net , but

In View state -  not able to change the value by Client side code i.e java script.
Hidden field - possible to change value by Client side code.

In View state - You can store more than one value like Datatable ,Dataset,Collections and Object.
Hidden field - You can store only one value in hidden field





Implementing OAuth validation in a Web API

 I mplementing OAuth validation in a Web API Implementing OAuth validation in a Web API using C# typically involves several key steps to sec...