Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - israt.cse

Pages: [1]
1
Common Forum/Request/Suggestions / New in Here
« on: April 23, 2015, 06:29:23 PM »
Sooo many interesting things to learn at one site!!!! Why not joined before  :( :( :(

2
Science and Information / Function Keys of Keyboard
« on: April 23, 2015, 06:24:22 PM »
Function keys-what are these and what are the uses of these? Mainly in the keyboard, the top line contains twelve keys (F1-F12). These are defined as the function keys and as the name indicates, it uses for different control function of the system. Here is details:

http://www.guidingtech.com/10678/best-uses-of-function-keys-f1-f2-f12-windows/

http://www.computerhope.com/issues/ch000306.htm

3
Science and Information / Use of Keyboard instead of Mouse
« on: April 23, 2015, 06:14:10 PM »
How many of us can use our computer without a mouse. But, keyboard is the most basic part of computer while mouse is used as an temporary device. The below link contains some rare use of keyboard that we may not know before.

http://windows.microsoft.com/en-us/windows/using-keyboard#using-keyboard=windows-7

4
Science and Information / How to search effectively in Google
« on: April 23, 2015, 05:59:25 PM »
Searching in google is an art. It is said that if you are able to search effectively, most of your research based work is done. There are some link below that describe how to search effectively in google, the biggest search engine of world.

http://goo.gl/p52QsT

http://goo.gl/CWUoXI

5
How to add url in the post. I was trying using hyperlink but could not succeed.

6
Common Forum / Re: Teaching Performance Appraisal
« on: April 23, 2015, 01:28:09 PM »
If the teacher get the Teaching Performance Appraisal on regular basis, then they will be also be benefited and can get a chance to increase their quality.

7
Common Forum / Ethical Hacking- Hot topic on network security
« on: April 23, 2015, 01:24:56 PM »
We all think that hacking is always done by bad people. But we all know, every action has an opposite reaction :). Similarly, hacking can be used to secure one's system on the perspective of hackers. We can use penetration testing, hack a system to find the vulnerability of the system which can be used by the really bad people. Before them, we just find it and patched the system to fix this. This process is called Ethical hacking. And formally defined as Penetration testing.

A debian linux distribution called "Kali Linux" is an excellent platform for this purpose.
www.kali.org


Pages: [1]