Latest Movie :
Recent Movies


LG GD510 is a good handy,less expensive touch screen mobile. This mobile plays video formats like 3GP and MP4. One of the main issue of this good  lovely phone is the full screen video play. Full screen video play is available with this phone yet we can't watch video in full screen by all  means.

Your full screen video will be placed in the middle leaving both ends  a blank(this is the default full screen effect). This is because the phone doesn't alter the video resolution to the full screen resolution of the LG GD510. Most of the 3gp and mp4 video resolution are 320*240. But the LG GD510 mobile has full screen resolution of 400*240. In order to watch videos in full screen you need to change video resolution.

The best method is to convert the video using a very good video converter which supports customized video resolution. Here i will suggest a very good video converter which  will be helpful for the LG GD510  mobile phone users. The converter is "ANY VIDEO CONVERTER" ; this is freeware and it will complete all your needs regarding full screen video play in LG GD510 mobile phone.

To download this freeware click here
Download any video converter into your computer and run the application. Open the application and Dragg the video into converter . Select Option  CUSTOMIZED MP4 MOVIE(*.MP4) from the drop down list.
There are many video formats are available. But for us select above said option. This is a good software which also crop the video as a video cutter. Now make some change in video option in AVC. Do settings as shown

After this give settings for AUDIO as shown  below
After this press CONVERT button. The video will be converted to your hard disk compatible with the resolution of your LG GD510 mobile phone. Now copy the video to your mobile phone and  see videos in full screen. I think you are happy now . If you like this post please comment.


 You may got sleep if you are watching a boring movie throughout night and you left computer power on, this cause waste of electricity; though  your monitor move to power save mode. There are many Automatic Power Off software available in market. Some of these software you have to buy and some are illegal(cracked). This is a simple tip that you need not to buy any above said  Automatic Power Off software. Do the followings

STEP 1 : open RUN from START button.

STEP 2 : type at 02:15 shutdown -s
 This will  shut down your computer at 02:15 am.
 In order to shout down your computer at specific time you need to type the code as above.

To abort this shutdown type the following code in RUN

shutdown -a 
 with this your already made auto shutdown will aborted.

Nice tip right. do it and play it with your friends


An internet is made up of a combination of physical networks (LANs or WANs) connected by ROUTERS. When a host communicates with another host, the packets may travel from one physical network to another using these routers. From this it is clear that communication at network layer also needs global identification system. A host must be identified uniquely and globally at this layer also. In addition, for efficient and optimum routing, each router must also be identified uniquely and globally at this layer.

The identifier that is used in the IP layer of the TCP/IP Protocol is called IP ADDRESS or INTERNET ADDRESS. It is a 32 bit binary address, implemented in software that uniquely and globally defines a host or a Router on the internet.

The IP address unique in sense that each address defines one, and only one,deice on the internet. Two devices on the internet can never have the same address. A device may have more than one Ip address if it is connected to more than physical network.

Each Ip address 32 bit binary digits ie; 4 blocks of 8bits(1 byte).
IP address has two parts:
  2. HOST ID
  Few bits of  NETWORK ID determine the class of  the address.

5 types  Ip address classification
  1. CLASS A : One (1)byte allotted to Network ID and remaining 3 for  Host ID
  2. CLASS B : First 2 byte for Network ID and remaining 2 byte for  Host ID
  3. CLASS C : First 3 byte for Network ID and remaining 1 byte for  Host ID
  4. CLASS D : No Network ID and Host ID. Known as Multicast Address
  5. CLASS E : No Network ID and Host ID. Reserved for internet special use
Visit next post  for  details of classification of IP address


 In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the internet  so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of gateway server that separates the enterprise network from the outside network and  a firewall server that protects the enterprise network from outside intrusion.

A proxy server receives a request for an internet service from a user. If it passes filtering requirements, the proxy server, assuming it also a cache server, looks  in its local cache of  previously downloaded web pages. I f it finds the page, it returns it to the user without needing to forward the request to the internet. If the page is not in the cache,proxy server act as a client on behalf of user, uses one of its own IP addresses to request the page from server out on the internet. When the page is returned, the proxy server relates it to the original request and forward it on to the user. To the user, the Proxy server is invisible; all Internet requests and returned responses appear  to be directly with the addressed Internet server.


It is sometime we are irritated with the  system notification area in order to hide the system notification area do the following steps.

click on START button select RUN and type    ''gpedit.msc ''

Group policy edit window appears

 There are two options computer configuration and user configuration.

Computer configuration is used by administrators to change group policies that are applied to computers regardless who is log on to it.

User configuration is is used to set policies applied to user regardless the computer ie it is specified for users.

Select  User configuration.


On the right pane list of settings will be displayed 


Select  HIDE THE NOTIFICATION AREA  and right click/double click PROPERTIES  (if right click).
A description regarding the  setting will be shown. It has mainly three options.

Not configured / Disable will show the notification area

ENABLE  will hide the notification are including notification icons (hidden also). The Taskbar contain only Start button,Taskbar buttons and System clock.

Important: After setting has been done do RESTART Computer


This will help you to know some networking commands useful for troubleshooting the networks.

                                IPCONFIG is a DOS utility, which can be used from MS-DOS to display the network settings currently assigned and given by network. This command can be utilized to verify a network connection as well as to verify your network settings.

                              Display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table,IPV4 statistics(for the IP,ICMP,TCP and UDP protocols), and IPv6 statistics(for the IPv6,ICMPv6, TCP over IPv6 and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.

                             The TRACERT command is used to visually see a network packet being sent and received  and the  amount of hops   required for that packet to get its destination. Users with Microsoft Windows 2000 and windows Xp who need additional information network latency and network loss should also consider the PATHPING command.

  • PING
                            This command helps in determining TCP/IP Networks IP address as well as determine issues with the network and assists in resolving them.

                           It provides information about network loss at intermediate hops between a source and destination. Pathping  sends multiple Echo Request messages to each router between a source and destination aver a period of time and then computer results based on packets returned  from each router.

                         TELNET is software that allows user to remotely access another computer such as server, network device, or other computer. With TELNET users can connect to a device or computer, manage a network device, setup a device, transfer files.

  • FTP 
                     FTP is short for File Transfer Protocol, this page contains additional information about  the FTP command and help using that command in Unix and in MS-DOS
                      This command helps to find how many computers are online in a network.
                     This command is used for messaging between computers. 
Type net send 'computer name/ ip address ' hello
  • ROUTE 
                       It is used for configure manually the routes in the routing table
 Displays information that you can use to diagnose Domain Name System(DNS)  infrastructure. Before using this tool, you should be familiar with how DNS works. The Nslookup command-line  tool is available only if you have installed the TCP/IP protocol.
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. computer hardware and networking - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger