Monday, November 23, 2009

Windows XP Professional Compare to UNIX and Linux

Windows XP's kernel, like Windows 2000's, has its roots in UNIX. UNIX is a very popular multitasking operating system developed at Bell Labs in the early 1970s. It was designed by programmers for programmers. In fact, the language C was developed just to write UNIX. Even though UNIX has become a friendlier operating system with the addition of Windows-like interfaces such as MOTIF, it's still relatively user-unfriendly, requiring cryptic commands much like DOS.

UNIX

Because it is written in C, UNIX can run on any computer that has a C compiler, making it quite portable. AT&T gave away the UNIX source code to universities and licensed it to several companies during its early years. AT&T no longer owns UNIX; the UNIX trademark is now owned by OpenGroup, though the source code is claimed to be owned by the Santa Cruz Operation (SCO), though this is now in debate.

Unfortunately, to avoid even the licensing fees to AT&T, UNIX lookalikes sprung up over the years. Without the proper license, these versions could not call themselves UNIX, only UNIX-like. And as these clones proliferated, cross-compatibility became an issue. More than a handful of versions (dialects) of UNIX have appeared, the primary contenders being AT&T's own, known as System V, and another developed at the University of California at Berkeley, known as BSD4.x, x being a number from 1 to 3. Other popular brands of UNIX these days are HP-UX from HP, AIX from IBM, Solaris from Sun, and SCO's version, UnixWare.

In 1984, industry experts were brought together to create guidelines and standards for UNIX clones, in hopes of creating a more coherent market. The result was a single UNIX specification, which includes a requirement for POSIX (Portable Operating System Interface for UNIX) compliance. Accepted by the IEEE and ISO, POSIX is a standard that makes porting applications and other code between variants of UNIX as simple as recompiling the source code.

NOTE

Another popular version of UNIX that runs on the PC platform is called FreeBSD. Briefly, FreeBSD 4.x is a UNIX-like operating system based on U.C. Berkeley's 4.4BSD-lite release for the Intel 386 platform. It is also based indirectly on William Jolitz's port of U.C. Berkeley's Net/2 to the Intel 386, known as 386BSD, though very little of the 386BSD code remains. You can find a fuller description of what FreeBSD is and how it can work for you at www.freebsd.com.

UNIX has been the predominant operating system for workstations connected to servers, mostly because of its multiuser capabilities and its rock-solid performance. Windows NT and its successors, Windows 2000 and Windows XP, have been making inroads due to the extensive number of development tools and applications for the Windows platform. However, the low-cost UNIX variant called Linux is revitalizing UNIX across all platforms.

Linux

Linux is a UNIX lookalike. Linux isn't a port of a preexisting operating system, but rather it was written from the ground up by Linus Torvalds, a Finnish-born computer scientist who wanted to develop a UNIX-like operating system for computer students to run on low-cost Intel computers. Torvalds wrote the kernel with the help of a handful of computer programmers. Like all variants of UNIX, Linux has many of the features of NT/Windows 2000/Windows XP, such as true multitasking, virtual memory, shared libraries, intelligent memory management, and TCP/IP networking.

Linux is an open system, and programmers worldwide are invited to participate in its building and refinement. Unlike other flavors of UNIX that were based on licensed source code, Linux is based on Minix, which mimics UNIX in a way that does not infringe on the UNIX license. That's why Linux distributions are practically free.

NOTE

Actually, the term Linux pertains only to the kernel. What people have come to refer to as Linux is actually a collection of separate pieces of code, the majority of which are GNU. It was not until Linux came together with GNU that the full power of the Linux OS (what GNU enthusiasts would called GNU Linux) crystallized.

The several popularly distributed Linux versions are differentiated mostly by the selection of tools and utilities bundled with them. The most popular package at this point is Red Hat Linux. If you want to go it alone, you can acquire Linux for free, but buying some commercially bundled packages makes the job of installation and support easier because you get support. Technically, the distribution of the software must be free, in accordance with the GNU General Public License (GPL) agreement governing the distribution of Linux and the collected modules that accompany it.

Linux is now running on a wide variety of systems, including Sun JavaStations, the IBM RS/6000, and the Alpha chip originally developed by DEC and later sold by Compaq, MIPS, SPARC, Open VMS, Digital UNIX, and other platforms.
Continue reading...

Differences Between Windows XP Home Edition, Windows XP Professional, 64-Bit, and Server Versions of Windows XP

Windows XP comes in two distinct varieties for 32-bit processors:
• Home Edition
• Professional
Although both versions contain the same integrated applications and multimedia features, Windows XP Professional also includes corporate network support, backup, and security features similar to those found in Windows 2000 Professional.
The now-available 64-bit CPUs such as Intel Itanium and AMD's Athlon 64 and Opteron can run advanced versions of XP designed to take advantage of their speed and other enhancements. Windows XP 64-bit Edition is the Intel-based workstation version. It supports up to 16GB of physical RAM and up to 16 terabytes (16TB) of virtual memory, and takes full advantage of the superior floating-point performance of the Itanium processor. One or two Itanium processors can be used. Windows XP 64-bit Edition runs 32-bit Windows programs in a subsystem. The user interface is very similar to Windows XP Professional but the features will vary. Another 64-bit version has been developed for the AMD Athlon 64 and Opteron chips, dubbed "Windows XP 64-Bit Edition for 64-Bit Extended Systems."
Both 64-bit versions use an emulation layer called WOW64 to run Win32-based applications. When running on the Intel 64-bit processor, complaints are that the 32-bit programs run a bit too slowly. Early testing indicates that the AMDs run 32-bit applications considerably faster than the Itaniums do. 64-bit versions are supplied preinstalled on computer hardware.
Both 64-bit versions use an emulation layer called WOW64 to run Win32-based applications, although for best performance, Microsoft recommends using 32-bit software on 32-bit Windows systems. The emulation feature allows organizations to use their Itanium-based systems with existing Windows applications until 64-bit versions are created internally or purchased from software vendors.
What about 32-bit server versions of Windows XP? Microsoft has multiple server editions of Windows XP, generally dubbed Microsoft Windows 2003 Server. The editions differ based on variations in the total amount of memory used by each version, the number of processors supported, and the number of domains that can be controlled. As of this writing, I counted 16 specialized servers for areas such as storage servers, SQL servers, speech servers, commerce servers, and so on.
Table 1 Compares Windows XP Home Edition and Windows XP Professional to other versions of Windows.
Table 1 Various Capabilities of Windows XP Home Edition as Compared to Earlier Versions of Windows


Fig. 1: Differences between windows XP

Continue reading...

Security-relevant Standards Organizations

Organization Description

ABA


The American Bankers Association develops computer standards for financial and banking areas. The ABA is the Secretariat for X9, ANSI's Accredited Standards Committee for Financial Services. Standards developed by this committee focus on encryption and message authentication for financial institutions. The ABA also develops standards for personal identification numbers (PINs) and key management.

ANSI


The American National Standards Institute is the officially designated national standards organization in the United States and is the formal U.S. representative to ISO. ANSI does not develop its own standards, but is the clearinghouse for U.S. and international standards-for example, ASCII code, languages (e.g., C and FORTRAN), and communications protocols. ANSI committee are working on such security concerns as encryption and message authentication.

CBEMA


The Computer and Business Equipment Manufacturers Association develops standards in a variety of areas, including languages, graphics, and database technologies, and submits these standards to ANSI for approval as ANSI standards. CBEMA is the Secretariat for X3, ANSI's Accredited Standards Committee for Information Processing.

CCITT


The Comité Consultatif Internationale Telegraphique et Telephonique (International Telegraph and Telephone Consultative Committee) was established under the United Nations. It is responsible for the X.25 (packet-switched networks) and X.400 (electronic mail) standards and for other international communications standards. CCITT works with ISO on international standards for security.

ECMA


The European Computer Manufacturers Association is an association of approximately 50 European computer manufacturers. Its security groups are involved in developing standards for security in such areas as distributed interactive processing, distributed office applications, and open systems.

EIA


The Electronic Industries Association is a trade organization that has developed standards such as the RS-232 standard for terminals and computer connections.

IEEE


The Institute of Electrical and Electronic Engineers is a professional organization that develops standards and submits them for ANSI approval.
The IEEE 1003.1 standard, announced in 1988, is the official POSIX (Portable Operating System Interface for Computer Environments) standard for application portability in open systems. Along with many other POSIX standards efforts, it was developed in cooperation with the ISO (described below). Although the POSIX interface standard (also known as POSIX-1) is based on the UNIX system model, POSIX specifies how an interface must perform, not how it is implemented, so UNIX need not be the base operating system. POSIX.1 evolved in 1981 from /usr/group, the forerunner of UniForum, the Association of UNIX System Users. The /usr/group standard was an early attempt to specify a standard for a portable mechanism.
The IEEE 1003.1 standard has also been published by NIST (described below) as FIPS PUB 151 and by ISO (also described below) as ISO/IEC 9945-1.

IEEE has a number of committees, some of them security-related. The IEEE 1003.6 Security Extensions Committee grew out of UniForum's Technical Committee's Security Subcommittee. This committee is dedicated to developing standards for making a POSIX-compliant system a trusted system. Security subgroups are at work on security issues such as discretionary access control, mandatory access control, privileges, and audit trails, and standards are expected within the next few years.

IFIP The International Federation of Information Processing is a multinational federation of professional and technical organizations involved with computer and information processing. It was originally established under the auspices of UNESCO. IFIP has a number of committees. The Technical Committee 11 (TC-11) on Security and Protection in Information Systems does extensive work in proliferating security information internationally and in developing standards.

ISO The International Standards Organization (Organisation Internationale de Normalisation) founded in 1946, is an international organization composed of a number of national standards organizations. ISO's Open Systems Interconnection (OSI) basic reference model is a standard conceptual model for discussing data communications. ISO and other organizations are working on extending the OSI model to define security-related architectural elements.
Several groups within ISO are developing standards using cryptography as a mechanism for network security. Such standards will provide for data confidentiality, data integrity, peer entity authentication, access control, key distribution, and digital signatures.

MAP/TOP


The Manufacturing Automation Protocol/Technical Office Protocol is a consortium of factory automation users. Sponsored by General Motors (MAP) and Boeing (TOP), MAP/TOP has worked on pieces of ISO standards.

NCSC


The National Computer Security Center publishes the Rainbow Series of computer security standards for trusted systems, chief among them the Orange Book.
The NCSC sponsors the Trusted UNIX Organization, which consists of a group of vendors, including AT&T, involved in developing trusted UNIX systems. Security standards developed by TRUSIX will be POSIX-compliant.

NIST


The National Institute of Standards and Technology (formerly the National Bureau of Standards) specifies standards for many government-related products and procedures.
FIPS PUBs (Federation of Information Processing Standards publications) are written by NIST's National Computer Systems Laboratory (NCSL). FIPS PUBs are required standards for the acquisition of equipment and the processing of information by government agencies and contractors.

GOSIP (the Government Open Systems Interconnect Profile program) is sponsored by NIST with participation by a number of other government agencies. GOSIP specifies a set of data communications protocols based on the OSI model. All government agencies that buy networks must now comply with the GOSIP/OSI standard. In 1988, Version 1 of the GOSIP standard for networks and services was published as FIPS PUB 146. The standard is being revised to address security concerns and other issues.
Continue reading...

Computer Security

With computer systems increasingly under attack, it's no wonder that people are starting to take computer security more seriously. But despite this increased interest, many computer users still don't really understand what computer security is-and why it should be important to them. The headlines about the Internet worm, KGB agents, and million-dollar funds transfer frauds tell only part of the story, and it's a part most of us can't identify with as a day-to-day concern.

Computer security protects your computer and everything associated with it-your building, your terminals and printers, your cabling, and your disks and tapes. Most importantly, computer security protects the information you've stored in your system. That's why computer security is often called information security.

There's a longstanding view of computer security that its purpose is to protect against one particular danger-outside intruders who break into systems to steal money or secrets, or simply to prove they can do it. And although such intruders do exist, they aren't the only, or even the primary, danger to computer systems. There are many more immediate dangers, ranging from sharing your password with a friend, to failing to back up a disk, to spilling a soda on a terminal keyboard. These dangers aren't as newsworthy as flamboyantly named viruses, but
they're more likely to cause you problems on a daily basis. The following sections define computer security and outline the wide range of dangers to computer systems
Continue reading...

Increase your RAM and so system speed

1). Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.


3). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

4). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bar.
Continue reading...

Friday, November 20, 2009

Change the windows default identity

In windows XP, you can change the windows default identity (Computer Manufacturer Logo and other information's) and share your own private identity there. First you right click on My Computer then click on Properties, here may be you will see computer manufacture logo or empty area. So add your own logo there to make your computer more private.

Follow the given steps to change the system default Properties identity:
























First click on Start button and type notepad in Run option then press Enter.

Now type the following text in notepad.

[General]
Manufacturer="
www.ComputerFreeTips.com"
Model="
Computer Free Tips and Tricks!"
[Support Information]
Line1="We offer various help topics including A to Z Computer Free Tips and Help."
Line2="Visit daily for new tips
www.ComputerFreeTips.com"








There are some standard keywords, for example Manufacturer, Model, Line 1, Line 2; you can not change these keywords. Now save this notepad file in c:/windows/system32 folder with file name, OEMINFO.INI.
















Now choose your favorite picture to set as logo, using any picture editor resize the picture size approx. 150X150 pixels then save it in c:/windows/system32 folder with file name OEMLOGO.BMP.

Now close the all files and restart your computer after any changes to go into effect. To verify these changes, right click on My Computer and open Properties


















Under General tab, verify the system properties with new settings.



Continue reading...

How to log off, restart and shutdown, connected computer from one location?

Windows XP has a built-in feature (shutdown tools) that is used to shutdown any connected computers from any one computer. Using this feature, you can log off, restart and shutdown any computer in your network. This tip is very useful for you, if you are a Network Administrator at your company, because if you have experience to shutdown all connected computers daily in your local area network one by one, definitely that job is annoying responsibility for you.

Follow the given steps to configure shutdown tool on your computer:

To use this feature, you will need to be logged into your computer with administrative rights.

To perform this task, first make sure your both computers are directly connected or connected to network.

Click Start button then type shutdown -i in Run option then press Enter for next.

Continue reading...

Fax/Modem Troubleshooting Tips

My modem is a 56K, but I can connect to the Internet only at slower speed.
The current copper wired telephone lines are limited only to about 53K. If you are connected only to 33.6 or 28.8K, check the following first:
  • Is your modem compatible with the modem used at your ISP?
  • Is your modem set up to run at full speed?
  • What's the maximum speed your ISP allows?
  • How far away are you from your ISP?
  • Some modems need special initiation strings to get full speed.
  • Some conditions are out of your control, such as weather and conditions of the telephone lines in your community.
  • Problems may occur when you are dialing through a phone system such as one in a hotel.
Modem answers incoming calls and then returns to the on-hook condition, disconnecting the caller:
This occurs most often when connecting to a UNIX system. In most case, the host does not prefer to see any result or command echo codes. If this is the case, the codes can be disabled by adding E0 Q1 to the modem configuration string.

The modem dials and appears to complete the connection, but the communications software does not enter the correct mode. (The screen remains blank)
This is normally caused by an I/O address or IRQ conflict. Verify that the COM port is not in use by any other serial device and if necessary use another COM port or I/O address settting. Refer to your computer manual on how to determine what serial ports are installed.

The modem dials and appears to complete the connection, but the communications software does not enter the correct mode. (The screen remains blank)
  • There may be an I/O conflict (see the solution for the previous problem).
  • The Result Codes may have been disabled by the software configuration set up. Check if Q1 is in the configuration or initialization string. If so, change it to Q0.
  • Your software may require numeric result codes rather than verbal result codes. Use either V0 for numeric result codes or V1 for verbal result codes in your initiazation or configuration string.
  • Some software require full extended result codes (i.e., CONNECT 33600 instead of CONNECT). This can be controlled by the Xn command. X0 sends a summarized code (CONNECT) and X4 sends a full extended code (CONNECT 33600)
The modem does not auto answer
The auto answer mode is determined by the S0 register. If S0 has been set to 0, the modem will not answer. Asign another value to S0 by entering the following command: S0=n, where n = the number of rings to occur before the call is answered (ATS0=2, the modem answers after two rings)

The modem always answers the phone.
Set the S0 register to 0. ATS0=0.

The communications software displays, "No Dialtone."
Make sure that your phone cable is working properly and that it is firmly seated to the phone socket at your phone jack and in the real panel of the modem.

A high pitched squeal is emitted from the external speakers
This phenomenon is "feedback" and occurs when the microphone is pointed at the external speaker or is close enough to pick up the speaker output. This may be remedied by using a unidirectional microphone, making sure that it is pointed away and as far from the speaker as functionally possible. Another option is to use a headset with an attached microphone.
Continue reading...

Troubleshooting Tips for a New Motherboard

Choose Motherboard | Motherboard Installation Guide |

More than 70% of all computer problems are related to cabling and connections. Ensure all cables are connected and connected firmly. IDE and floppy ribbon cables and power cables can often go loose. Ensure microprocessor, memory modules, and adapters such as video card are inserted correctly and didn't "pop-up" due to vibration.

System has no power at all. Power light does not illuminate, fan inside the power supply does not turn on, and indicator light on keyboard does not turn on.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Power cable is unplugged. Visually inspect power cable. Make sure power cable is securely plugged in.
Defective power cable. Visual inspection, try another cable. Replace cable.
Power supply failure. Power cable and wall socket are OK, but system is still dead. Contact technical support
Faulty wall outlet;circuit breaker or fuse blown. Plug device into socket know to work and test. Use different socket, repair outlet, reset circuit breaker or replace fuse.


System inoperative. Keyboard lights are on, power indicator lights are lit, and hard drive is spinning.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Expansion card is partially dislodged from expansion slot on the motherboard. Turn off computer. Take cover off system unit.
Check all expansion cards to ensure they are securely seated in slots.
Using even pressure on both ends of the expansion card, press down firmly on expansion card.
Defective floppy disk drive or tape drive. Turn system off.
Disconnect the cables from one of the floppy drives. Turn on the system, check to see if the keyboard operates normally. Repeat until you have located defective unit.
Contact Technical Support.
Defective expansion card. Turn computer off.
Remove an expansion card.
Make sure expansion card is secure in expansion socket.


System does not boot from hard disk drive, can be booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between hard drive and system board unplugged. When attempting to run the FDISK utility described in the HARD DISK section of the manual you get a message, INVALID DRIVE SPECIFICATION. Check cable running form disk to disk controller on the board. Make sure both ends are securely plugged in; check the drive type in the Standard CMOS Setup (in your motherboard manual).
Damaged Hard Disk or Disk Controller. Format hard disk; if unable to do so, the hard disk may be defective. Contact Technical Support.
Hard Disk directory or FAT is scrambled. Run the FDISK program, format the hard drive(See HARD DRIVE section of manual). Copy your backup data back onto hard drive. Backing up the hard drive is extremely important. All Hard Disks are capable of breaking down at any time.


System only boots from Floppy Disk. Hard Disk can be read and applications can be used, but booting from Hard Disk is impossible.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Hard Disk boot program has been destroyed. A number of causes could be behind this. Back up data and applications files.
Reformat the Hard Drive as described in the Hard Drive section of the manual. Re-install applications and data using backup disks.


Error message reading "SECTOR NOT FOUND" or other error messages indication certain data is not allowed to be retrieved.
PROBABLE CAUSE DIAGNOSIS SOLUTION
A number of causes could be behind this. Use a file by file backup instead of an image backup to backup the Hard Disk. Back up any salvageable data. Then do a low level format, partition, and high level format of the hard drive( see Hard Disk section of your manual for instructions). Re-install all saved data when completed.


Disk formatted on IBM PS/2 will not operate with this system.
PROBABLE CAUSE DIAGNOSIS SOLUTION
The IBM PS/2 uses a different format than other computers. IBM PS/2 disk format will not work in an AT type computer. Format disk in the AT type computer insert disk into the IBM PS/2 and copy the files you wish.


After install an expansion card (network card, tape drive card, etc.) the system no longer works properly.
PROBABLE CAUSE DIAGNOSIS SOLUTION
No power to monitor. All or part of the system may be inoperable. The new card may work but a mouse or COM port may not work. Change the interrupt or RAM address on the new expansion card. See the documentation that came with the new card in order to change pin settings. many expansion devices come with proprietary software that will assist you in doing this.


Screen message says "Invalid Configuration" or "CMOS Failure."
PROBABLE CAUSE DIAGNOSIS SOLUTION
Incorrect information entered into the configuration (setup) program. Check the configuration program. Replace any incorrect information. Review system's equipment. Make sure correct information is in setup.


Screen is blank.
PROBABLE CAUSE DIAGNOSIS SOLUTION
No power to monitor. Power connectors may be loose or not plugged in. Check the power connectors to monitor and to system. Make sure monitor is connected to display card, change I/O address on network card if applicable.
Monitor not connected to computer.
See instructions above.
Network card I/O address conflict.
See instructions above.


System does not boot from hard disk drive, can be booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between hard drive and system board unplugged. When attempting to run the FDISK utility described in the HARD DISK section of the manual you get a message, INVALID DRIVE SPECIFICATION. Check cable running form disk to disk controller on the board. Make sure both ends are securely plugged in; check the drive type in the Standard CMOS Setup (in your


Problem
PROBABLE CAUSE DIAGNOSIS SOLUTION
Memory problem, display card jumpers not set correctly.
Reboot computer. Re-install memory, make sure that all memory modules are installed in correct sockets. Check jumper and switch settings on display card. See display card section for information of settings.
Computer virus.
Use anti-virus programs (McAfee/PC-cillin, E-port, etc) to detect and clean viruses.


Screen goes blank periodically.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Screen saver is enabled.
Disable screen saver.


Keyboard failure.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Keyboard is disconnected.
Reconnect keyboard. Check keys again, if no improvement, replace keyboard.


No color on screen.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Faulty Monitor.
If possible, connect monitor to another system. If no color, replace monitor.
CMOS incorrectly set up.
Call technical support.


Floppy drive lights stays on.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Floppy Drive cable not connected correctly.
Reconnect floppy cable making sure PIN1 on the Floppy Drive corresponds with PIN1 on floppy cable connector.


Error reading drive A:
PROBABLE CAUSE DIAGNOSIS SOLUTION
Bad floppy disk.
Try new floppy disk.
Floppy disk not formatted
Format floppy disk(type ENTER)


C: drive failure.
PROBABLE CAUSE DIAGNOSIS SOLUTION
SETUP program does not have correct information.
Boot from drive A: using DOS system disk. Input correct information to SETUP program.
Hard Drive cable not connected properly.
Check Hard drive cable.


Cannot boot system after installing second hard drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Master/Slave jumpers not set correctly.
Set master /Slave jumpers correctly.
Hard Drives not compatible / different manufacturers.
Run SETUP program and select correct drive types. Call drive manufactures for compatibility with other drives.


Missing operating system on hard drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
CMOS setup has been changed.
Run setup and select correct drive type.


Certain keys do not function.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Keys jammed or defective.
Replace keyboard.


Keyboard is locked, no keys function.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Keyboard is locked.
Unlock keyboard
Continue reading...
 

Friends

Followers

Fave This

Computer Technology Tips and Tricks for Devlopment Copyright © 2009 Magazine 3 Column is Designed by kamrul