Facebook versus Google Plus

With more and more users turning to the internet each day, social networking sites have become highly popular. No site has surpassed Facebook in popularity, but recently a new contender has stepped up to the challenge: Google Plus. There are many features which mimic those of Facebook, but it also has some new ones that many consider vast improvements. Below we will compare and contrast the pros and cons of each social networking site to find out which one is superior.


Google Plus


  1. Google Plus Circles offer a unique way to group your friends and contacts.
  2. Google Plus games are not obnoxious and are not pushed by everyone, making it easy to go about your business without being interrupted.
  3. Posts can be edited on Google Plus, making it easy and convenient
  4. Better security/privacy features but apparently you cannot use an ‘alternate’ or made up name or your account will be deleted.
  5. Here the chat box can be resized to fit your needs.
  6. No apps here…..yet!


  1. Facebook doesn’t have anything similar to circles, people are your friends or aren’t your friends.
  2. Facebook has a wide variety of addicting games but the notifications/invites and spam can be really annoying when you aren’t interested in the games.
  3. Your post is concrete here, forcing you to delete it and repost if you’ve made a simply typo
  4. Here you can have whatever name you want without fear of being banned, however the other privacy features are still lacking and often abused by malicious internet users.
  5. The chat box here cannot be resized, only minimized.
  6. Facebook apps are often spammed and obnoxious.


As you can see by the corresponding features there are quite a few elements that are pulling towards Google Plus, but will it be enough to draw die hard Facebook users towards their social networking site? Google Plus is still new and doesn’t have the ‘big name’ that Facebook does, and doesn’t have near enough users yet. While the features for Google Plus are unique, new, and surprisingly fresh, Facebook will surely counter their new threat with upgrades and new features of their own.

Google Plus’s arrival into the social networking site was bold, but only time will tell if Google Plus will make Facebook the next MySpace or will it die off as other contenders have.

Connect Two Computers with LAN

How to Connect Two Computers with LAN?

These days, we have to connect computers with each other for several reasons. You might want to set up a Local Area connection inside your office using either your desktops or laptops. If you are a student, you can also interconnect more than two computers to play games.

There are numerous solutions to accomplish this task. Generally, this procedure could be divided into two parts, wireless and wired LAN. Here, you will find out how to connect two computers.

For connecting two computers through wired LAN, there must Ethernet card installed on every computer. These days almost all the manufacturers provide pre installed LAN card on their motherboards. In case there is no LAN card installed on your computer, you can get one done easily. These cards are similar to the video cards and you can install them effortlessly on the slot provided in the motherboard.

After installing the LAN cards on your computer, the next step is to connect the LAN cable with the computers. For these kinds of connection, crossover cable is needed.

Now you have to set up your computer to connect to each other. Let us assume that the computers are working on Windows XP. Now follow these steps

Click Start > Right Click on My Computer > then Click on Properties


Then, from the top menu click on tab named as “Computer Name”


Now, click on “Change” button just below the “Network ID” and a new window will pop up.

You will then find a “Computer Name” field. Remember to give a name, which you gave while installing window XP, otherwise it will give a default name. Therefore, it will be better to assign names as system_one, system_two and so on.

There you will find “Member of” field, in which you will find “Workgroup” option. It will have a default name “MSHOME”, you can assign all other subscribers with this group and press “OK”

Your one computer is configured now and you’ll need to repeat the same procedure for the second one. Make it sure to keep the same workgroup with other computers, names can be different.

After configuring both computers, you’ll need to physically connect them.  Plug crossover cable in LAN port of both computers.

Now from the “Start Menu” open “Control Panel” > Click > “Network and Internet Connections”

From the “”Pick a Control Panel icon” > Click > “Network Setup Wizard”

Later, you will find “Welcome to the Network Setup Wizard” page, go to the bottom and right Click > “Next” bottom.

Click Next button again. On doing so, you’ll get the window with three options in it, select the radio button with “This computer connects directly to the internet. The other computers on my network connect to internet through this computer” and Click > Next.

After finishing the wizard from the control panel open “Network and Internet Connection” and Click >Network Connections”

Double click on “Local Area Connections” and Click on “Properties”

Now from the “This connection uses the following items” scroll the bar down and Double Click on > “Internet Protocol (TCP/IP)”

You will observe that the default option is selected as “Obtain an IP address automatically”, check on the “Use the following IP address” option and change it to IP address of your own choice such as Remember to use different IP address for different computers. The next tab will be of “Subnet Mask” and use “” which will automatically comes after entering IP address. Both computers should have same “subnet mask.” IP configuration window will be as follows.

Then, click on “OK” button.

Our Conclusion


  • Plug Crossover cable into the LAN port of both computers
  • Click Start > Control Panel > Network and Internet > Network and Sharing Center
  • Click the Unidentified Network from the Network Map
  • Then Click > Turn on network discovery and file sharing.
  • From > Network discovery and file sharing select
  • No, make the network that I am connected to a private network
    • OR
  • Yes, turn on network discovery and file sharing for all public networks

Use Remote Access Console Or From The DOS Prompt To Add New Route

Adding New Route To TCP/IP Routing Table By Using Remote Access Console Or From The DOS Prompt

Every windows box that is connected to a network, either it is wide area network or local area network has an IP routing table. This table contains rules that define where and how all data packets must be sent.

Generally, it is very normal process to connect your computer with the internet. However, some time the computers that are connected to complex network will require advanced network topology, and they’ll also need additional requirements of routing the paths.

In simple word Sometimes network interface routers requires more relevant information and optimization paths to connect computer to the remote servers of Internet service provider. In such circumstances, you can resolve this problem by adding manual routes in routing tables through command prompt.

How to add IP route rules in to routing tables in DOS command prompt with route command prompt-

1. Click start and open command prompt.

2. Below is the syntax of route command to add routing table:

route ADD [destination IP address or subnet] MASK [subnet mask] [gateway IP address] [metric] IF [interface] 

Every part of this syntax is not mandatory. There are also some optional parts in this syntax such as network interface and metric.

For example, the command to add route to subnet network through gateway router: route ADD MASK

To make route persistent across boots of the system, use -p flag in addition to route add command. Else, route will not be preserved once the system reboots.

For example: route –p ADD MASK

3. Press enter to start the rote command

4. Now check that your route settings are added correctly by viewing routing table

If you face any difficulties, then you must scan the route commands again. If any information is incorrectly entered, then you have to delete that route and enter the new rout commands all over again.

5. Add new rout table using routing and remote access console:

  • Go to start > Administrative tools>Routing and remote access?

  • If your computer is already configured, then you can skip to step 5 directly. However, if your computer is not configured, then you have to configure it. Right click on action menu and select configure routing and remote access.

  •  During this process you select custom configuration option to enable routing access


Following these steps you can easily configure optimized network connection. These two methods are useful to get connected with your computer.

Google Chrome Now With Real Player

Google Chrome Now With Real Player

Google chrome is lagging way behind in the world of browsers quite some time. Only for the enhancing their market share, they are tying up with the Real Player Network to provide them with installation bundle.

The market share goes like this:

  • Mozilla Firefox – 45.5%
  • Internet Explorer 7 – 25.7%
  • Internet Explorer 6 – 18.5%
  • Google Chrome – 3.9%
  • Safari – 3.0%
  • Opera – 2.3%
  • Internet Explorer 8 – 0.6% 

When you are going to install any product of Real Network, you will be asked to install Google Chrome. It is not at all compulsory to click on Yes, as you may also choose to take on No. It is entirely at your discretion, and it will not affect your installation in any way.


This idea is already been adopted by Yahoo in the past. You may have noticed that on installing any specific third party software, you are prompted to install a Yahoo toolbar or something. It has been a great success for Yahoo. Let’s see how Google gets benefited with this.

Protecting The Wi-Fi Network From WPA Hack

Protecting The Wi-Fi Network From WPA Hack

The WEP encryption standard has been broken by the researcher Erik Tews after a year. He had recommended a switch to the WPA which is extra safe Protection for the Wi-Fi Network. He and his colleague Martin Back have discovered the method for cracking the WPA encryption standard in parts which is nothing but the Temporary Key Integrity Protocol (TKIP). The TKIP is mainly used to save the data safely on lots of wireless networks.

They are able to carry out their activities it within a time period of just 12 to 15 minutes.  Nevertheless, they have failed to learn about how to obtain access to the information that transmits in between the router and computer. Thus the WPA at present is quite safe to utilize as the typical Wi-Fi security.

However, it has been strongly recommended you to care for your router to protect it from WPA hack. You can keep it away from WPA hack in many different ways. One of the ways is to log in to router and then turn off the TKIP as an encryption type, and next only select to utilize Advanced Encryption System (AES), or the much tougher WPA2.

You can cut down the timing of the Temporary Key Integrity Protocol within the routers, with the intention that keys get refreshed in every two minutes or less. The quick revive creates it harder, although not completely unattainable for hackers to gain access.

How Would You Receive Emails Without Having To Reveal Your E-Mail ID To Others

How Would You Receive Emails Without Having To Reveal Your E-Mail ID To Others

If you are running a marketing campaign or recruiting people, you wouldn’t want to display your e-mail address on the net, in order to avoid thousands of spam mails reaching your inbox.

If you have a website of your own, you could definitely develop an online form page with PHP programming for receiving the emails, which is without having to reveal your e-mail address.

For example, if you want to recruit people for a particular project, and if you wish to publish that information to all your contacts on the social networking websites, you surely wouldn’t want to paste your e-mail address out there.

At the same time, if you are running at time sensitive recruitment project, and if you are unable to reach your web developer for any reason, how would you go about it?

People who do not have websites, or if they are not in a position to develop an online form for receiving e-mail, there is a free workaround for that problem. The answer for your problem is called as Whspr.

To start with, you will need to register for a free account on Whspr. After the registration process is completed, you will be provided with a short URL which would look something like www.whspr.com/Aa.

Now you can paste this particular link anywhere you like, and as many times as you like. When people click on your personal link provided by Whspr, they will be taken to an online form where they can enter their e-mail address, and compose an e-mail.

This is really a nice way to hide your e-mail address from the millions of spammers on the net. Your e-mail information will be safe only with Whspr.

Trick To Increase The Booting Time On Networking Computer Systems

Trick To Increase The Booting Time On Networking Computer Systems

Computer Systems take more starting time if they are connected on a “Shared Network”. Sharing a network means that your computer system is associated with a group of systems or it is an integral division of computer systems network.

These decreases the booting time severely and a computer system starts behaving strange on certain occasions. Sometimes it consumes more than two minutes of your time (General Statistics) to boot up, and once you are logged on, you’re logged account halts down for a couple of minutes.

Individuals might also sight blank window screen with no icons displayed for some indefinite time and all this occurs because a computer attempts to utilize all its inventories in establishing a connection with the networking computer systems.

This is mostly due to “Microsoft’s printer and file sharing program”. It utilizes many resources on computer, since it attempts to gain access to other computer files, drives and any connected hardware devices like printer etc.

It consumes around “65 seconds to 01 minute” of system booting time, hence individuals are made to hold back for a lengthier duration to gain entry to computer system.

This tiresome booting behavior on computer systems can be improved by disabling printer and file sharing option.

Steps required in disabling printer and file sharing option on networking computers are as follows:

  • Select windows start option and highlight “my network places” option and press a right mouse click and select the last option called as “properties”.
  • Now, highlight and press a right mouse click on “ethernet adepter connection” option and select the last option called as “properties”.
  • Now, in this window uncheck the option named as “printer and file sharing for Microsoft-Networks” and select the “OK” and “Apply” button to save the settings changes made.
  • Now Restart your computer system to get the changes made on computer system.

Hereafter, individuals can experience significantly quicker booting time. If in case individuals are required to have printer and file sharing connection established in future, they can just follow the above illustrated steps and just check the option “printer and file sharing for Microsoft-Networks”. It will get enabled automatically on next computer system restart.

Workaround Or Trick To ‘Unpin’ System Folders From Windows7 Start-Menu

Workaround Or Trick To ‘Unpin’ System Folders From Windows7 Start-Menu

Computer programmers have found a new trick on Windows7 Operating System to support individuals in removing or unpin the standard Icons if user wishes to, like Control Panel, Recycle Bin, Computer and Network.

These are the major icons present on the desktop screen with other folder shortcuts or application programs. These cannot be removed or unpinned from Start-Menu in Win7 Operating System, once the user has pinned it to Start-Menu.

Removal of these Icons from the desktop screen is subjected to deletion of the registry key files named “.Favorites.” in “.Start Page.” Registry Key and there is no alternate command or option to remove the program from start listing.

To remove or unpin these programs few set of steps required are as follows:

  • First of all an individual needs to Run-Registry-Editor (‘Reg-Edit’), and then locate or navigate to the below registry key: (“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage”)
  • Now, on the right hand side’s pane, Select and delete the Favorites Registry Entry.
  • Then Reboot the computer for changes to take effect.
  • Hence, the start menu will be automatically reset to factory settings without any of the user’s pinned programs.
  • In lieu, simply make a back up of the registry files: (“reset_pin_to_start_menu.zip”) and (“run reset_pin_to_start_menu.reg”) as administrator for auto deletion of the registry values.

However, it is necessary for individuals to know that all pinned programs on Start-Menu can be unpinned or deleted. Individuals are required to Re-pin the programs which they want to view on their Start Menu for good.

Bit Blinder To Help Anonymous Downloading

Bit Blinder To Help Anonymous Downloading

Nowadays, browsing internet without precautions results in many complications. To protect we just tend to install antivirus. Yes, it is a good option but on huge network protecting the IP address is a huge concern too.

Most of the individuals have downloaded torrent files using various bit torrent clients to protect their IP address but still they are exposed to everyone.

Every single torrent client displays IP addresses as either peer or seeder. A new trick will conceal computer’s codes while downloading the torrent files and display them as anonymous.

Bit Blinder is open-source application which encodes IP addresses and links to the torrent-tracker. All the torrent packages are guided through a secure link with no other alternate option of exposing your computer codes from peer or seeder list.

Bit Blinder is a secure path provider that encodes every activity as unknown torrent downloading device “TOR-Networking” to commence file transfer process amid all the torrent groups.

This helps in downloading torrent files as an unknown IP, and a network browser gets permit to browse websites as an anonymous surfer.

An individual is required to get an account registered, and then move ahead to download Bit Blinder, and on sign up, Bit Blinder offers 9 Giga Byte free Download Limit.

Monitor Network Bandwidth Usage And Internet Traffic With iTraffic

Monitor Network Bandwidth Usage And Internet Traffic With iTraffic

Many of the internet plans for which users pay on a monthly basis impose a specific data limit depending on the plan chosen. In such cases, if you wish to utilize the limit to the maximum without hitting the peak threshold, you can make use of iTraffic, an excellent freeware that helps you monitor the internet traffic data flowing from/ to your PC along with the bandwidth usage.

The moment you install this software utility and run it, you need to choose the network interface that you wish to monitor. For Example, you can monitor standard LAN Gigabit Ethernet (GbE) port, VPN client packet or Bluetooth transmission and wireless transmission. Once you configure the utility, you can supervise network bandwidth in a graphical view.


To check the network bandwidth usage, you may just view the summary by clicking on the option “Reports” that appears in the right-click context menu. The summary will be displayed on daily, weekly and monthly basis offering an overall idea if your internet data plan is under-used.

Apart from this, you can also monitor the connectivity speed so as to keep track of any interruption in the connectivity, especially when you are in a process of downloading a massive file. This utility supports all Windows Operating Systems and can be downloaded free of charge.