DominzyLoaded Tech : Computers & PC DominzyLoaded Tech : Computers & PC
Showing posts with label Computers & PC. Show all posts
Showing posts with label Computers & PC. Show all posts

What You Should Really Consider When Getting a PC


A laptop with a text on its screen

When getting a new PC, do not get too excited or engrossed on the Processor series of that PC, for instance Intel Core i5, intel Core i7 etc.


Most users will like to go for the processor series with highest number attached to the core as long as they can afford it, not knowing there are other significant details you need to look out for first.


We all know Intel's Core i7 or Core i9 processors are excellent for gaming and demanding tasks, while Core i5 or Core i3 processors are more budget-friendly for everyday use.
Intel core i7 microprocessor chips



An average computer user will always go for core i7 over core i5 without having to check for other specifics attached to corei7/core i5, other specifics such as the Generation of the processor and the clock speed.

The Generation of the processor plays a very important role in the selection of a PC. 

How do we identify the generation of an Intel core from just it's name?


For instance, Intel Core i5 is not actually the complete name of the processor, there are other numbers attached to it, which you can see when you look it up on the information page of the processor in your PC.

You should see something like "Intel Core i5-11600K" or "Intel Core i5-8600K".  
Intel core i5


The first digit or digits in the model number indicates the generation of that processor. Using the two core i5 above as example, the "11" represents the 11th Generation, while the "8" in the other core i5 represents the 8th generation.

The latter the generation, the better the processor. This means instead of going for a "Core i5-8700k" which is an 8th Gen Processor, you should go for a "Core i3-10600X" which is a 10th Gen Processor.

I hope you take this knowledge into consideration when getting your next PC.

Subscribe to our blog for more Tech Tips like this.

If you are on Telegram, kindly subscribe to our Channel Here for real time updates on tech tips and tricks.

If you have any questions or contributions concerning the above post, do well to use the comment section.
Thanks.

How To Record Your Computer Screen and Take Screenshots in Windows 10

 How To Record Your Computer Screen and Take Screenshots in Windows 10 


windows 10 laptop computer about to record screen

Speed up your actions by learning how to record your screen in Windows 10

screen recording helps you capture your screen and record a video that you’ll be able to use later. But what is screen recording used for? You can record your conference, business meeting and create a detailed video with the help of a robust screen recording app or a dedicated program. You can also record the entire desktop and then share your videos with the intended audience on YouTube or other video-sharing platforms.

Most windows 10 users don't know that Windows 10 has a screen recording utility called the Xbox Game Bar. Using this, you can record a video of your actions in just about any Windows app on your laptop, whether you want to capture gameplay or create a tutorial for someone on Microsoft Office, Corel draw or Photoshop. 

To make it easier for you, we've listed out a few simple steps on how to record your computer screen in Windows 10.

The screen recording tool is part of the Xbox app that comes installed by default in Windows 10. Xbox Game Bar received some major updates to make it more useful, so you can now take screenshots and even make memes.

ALSO READ: 

How to record your computer screen in Windows 10

1. Open the app you want to record. Note that, the screen recorder tool can't capture some programs such as File Manager, or the entire desktop , but it does work in regular desktop apps (and those from the Windows Store).

2. Press the Windows key + G at the same time to open the Game Bar dialog.

3. Check the "Yes, this is a game" checkbox to load the Game Bar. This is the procedure whether you are screen recording a game or another kind of app.
Open Xbox game bar

4. Click on the Start Recording button (or Win + Alt + R) to begin capturing video.

Xbox game bar recording

5. Stop the recording by clicking on the red recording bar that will be on the top right of the program window. 


That's all!
You'll find your recorded videos, which are MP4 files, under the Videos folder in a subfolder called Captures. You'll also find them in the Xbox app under the Game DVR menu, where you can trim a video and share it on Xbox live (if it's a game).

How to take screenshots on your computer in windows 10


1. Open the app or file you want to capture

2. Press the Windows key + G at the same time to open the Game Bar dialog.

3. Check the "Yes, this is a game" checkbox to load the Game Bar. (It doesn't matter even if what you want to capture is not a game).

4. Click the camera icon on the Game Bar or Win + Alt + PrtScn and it will automatically take screenshots of the current screen.

That's how to do it. You can find all your screenshots in the Picture folder.

Join us on telegram by subscribing to our Tech channel for free to receive faster updates. Free softwares, apps and games are also posted there.

150+ Best Windows CMD Commands You Need To Know

 150+ Best Windows CMD Commands You Need To Know

150+ Best Windows CMD Commands You Need To Know

What is CMD?

CMD is an acronym for Command. Command prompt or CMD is the command line interpreter of Windows operating systems. It is similar to Command.com used in DOS and Windows 9x systems where it is called as “MS-DOS Prompt”. It is analogous to Unix Shells used on Unix like system. The command prompt is a native application of the Windows operating system and gives the user an option to perform operations using commands.

Command prompt makes use of the command line interface to interact with the User. In the Windows operating system, this command prompt interface is implemented through the Win32 console. User can open the interface by via the CMD run command or by going to its original location C:\Windows\system32\cmd.exe.

How Does CMD Works?

With the command shell, you can have direct interaction with the operating system. Think command prompt as an interpreter which accepts the commands or the inputs from the User and translate it into machine language. These commands are predefined and perform a specific task. These commands can be clubbed together as well to perform a series of task. Also, these commands need not be entered manually and can be written in a batch file to automate some of the manual tasks like taking a scheduled server backup, deleting junk files and so on. These commands are very handy at the time of network troubleshooting or for a day to day work. These commands can be called from many programming languages such as Java which allows the programmer to perform task directly via the command prompt which otherwise would take several lines of code to be written essentially to perform the same task.

How To Use CMD Commands?

To Open CMD, you need to search for CMD in the Search box or you can simply press Windows Key + R that will eventually open the Run window, where you need to type CMD and hit enter. Below are list of very useful CMD Commands for your windows system.

1. Comparing two files – fc
 2. Accessibility Wizard – accwiz
 3. Add Hardware Wizard – hdwwiz.cpl
 4. Add/Remove Programs – appwiz.cpl
 5. Administrative Tools – control admintools
 6. Automatic Updates – wuaucpl.cpl
 7. Bluetooth Transfer Wizard – fsquirt
 8. Calculator – calc
 9. Certificate Manager – certmgr.msc
 11. Check Disk Utility – chkdsk
 12. Clipboard Viewer – clipbrd
 14. Component Services – dcomcnfg
 15. Computer Management – compmgmt.msc
 16. Control Panel – control
 17. Date and Time Properties – timedate.cpl
 18. DDE Shares – ddeshare
 19. Device Manager – devmgmt.msc
 20. Direct X Troubleshooter – dxdiag
 21. Disk Cleanup Utility – cleanmgr
 22. Disk Defragment – dfrg.msc
 23. Disk Management – diskmgmt.msc
 24. Disk Partition Manager – diskpart
 25. Display Properties – control desktop
 26. Display Properties – desk.cpl
 27. Dr. Watson System Troubleshooting Utility – drwtsn32
 28. Driver Verifier Utility – verifier
 29. Event Viewer – eventvwr.msc
 30. Files and Settings Transfer Tool – migwiz
 31. File Signature Verification Tool – sigverif
 32. Findfast – findfast.cpl
 33. Firefox – firefox
 35. Fonts – control fonts
 37. Free Cell Card Game – freecell
 38. Game Controllers – joy.cpl
 39. Group Policy Editor (for xp professional) – gpedit.msc
 40. Hearts Card Game – mshearts
 41. Help and Support – helpctr
 42. HyperTerminal – hypertrm
 43. Iexpress Wizard – iexpress
 44. Indexing Service – ciadv.msc
 45. Internet Connection Wizard – icwconn1
 47. Internet Properties – inetcpl.cpl
 49. Local Security Settings – secpol.msc
 50. Local Users and Groups – lusrmgr.msc
 51. Logs You Out Of Windows – logoff
 52. Malicious Software Removal Tool – mrt 53. Microsoft Chat – winchat
 54. Microsoft Movie Maker – moviemk
 55. Microsoft Paint – mspaint
 56. Microsoft Syncronization Tool – mobsync
 57. Minesweeper Game – winmine
 59. Mouse Properties – main.cpl
 60. Netmeeting – conf
 61. Network Connections – control netconnections
 62. Network Connections – ncpa.cpl
 63. Network Setup Wizard – netsetup.cpl
 64. Notepad – notepad
 65. Object Packager – packager
 66. ODBC Data Source Administrator – odbccp32.cpl
 68. Outlook Express – msimn
 69. Paint – pbrush
 71. Performance Monitor – perfmon.msc
 72. Performance Monitor – perfmon
 74. Phone Dialer – dialer
 75. Pinball Game – pinball
 76. Power Configuration – powercfg.cpl



 77. Printers and Faxes – control printers
 78. Printers Folder – printers
 79. Regional Settings – intl.cpl
 80. Registry Editor – regedit
 81. Registry Editor – regedit32
 83. Remote Desktop – mstsc
 84. Removable Storage – ntmsmgr.msc
 85. Removable Storage Operator Requests – ntmsoprq.msc
 86. Resultant Set of Policy (for xp professional) – rsop.msc
 87. Scanners and Cameras – sticpl.cpl
 88. Scheduled Tasks – control schedtasks
 90. Services – services.msc
 91. Shared Folders – fsmgmt.msc
 92. Shuts Down Windows – shutdown
 94. Spider Solitare Card Game – spider
 95. SQL Client Configuration – cliconfg
 96. System Configuration Editor – sysedit
 97. System Configuration Utility – msconfig
 98. System Information – msinfo32
 99. System Properties – sysdm.cpl
 101. TCP Tester – tcptest
 102. Telnet Client – telnet
 104. Utility Manager – utilman
 105. Windows Address Book – wab
 107. Windows Explorer – explorer.
 108. Managing the Boot Configuration Data – bcdedit
 109. Editing Boot Settings – bootcfg
 110. Encrypting or Decrypting Files/folders – cipher
 111. Clearing the screen – cls
 112. Managing stored usernames/passwords – cmdkey
 114. Compressing one or more files – compress
 116. Delete files – del
 117. Deleting User Profiles – delprof
 118. Displaying the list of files and folders – dir
 119. Displaying Message On Screen – echo
 121. Opening the windows Explorer – explorer
 122. Formatting a disk – format
 123. Knowing file extension – ftype
 124. Displaying the Mac Address – getmac
 126. Displaying the host name – hostname
 127. Editing disc label – label
 128. Log a user off – logoff
 129. Get a log time in a file – logtime
 131. Creating new folders- md
 132. Opening Windows Installer – msiexec
 133. Managing the network resources – net
 134. Knowing the permissions for a user – perms
 135. Testing a network connecting – ping
 136. Printing a text file – print
 138. Checking free disk space – freedisk
 139. Know the file and volume utilities – fsutil
 140. File transfer protocl – ftp
 142. Deleting a folder and all subfolders – deltree
 143. Importing or Exporting Active directory data – csvde
 144. Displaying the resultant set of Policy information – gpresult
 145. Updating the Group policy settings – gpupdate
 146. Replacing the files that are currently in use by the os – inuse
 147. Managing the domain – netdom
 148. Finding a text string in a file – find
 149. Finding for a strings in file – findstr
 150. Displaying the memory usage – mem
 151. Remote desktop protocol – mstsc

 So, these are the best cmd commands. I hope these cmd commands will help you a lot.

How To Remove Write Protection From SD Card

 How To Remove Write Protection From SD Card

How To Remove Write Protection From SD Card
Have you ever encountered write Protection warning that that pops up when you insert an SD card into devices such as computer, digital camera,etc, and could not find a solution to it?

In this post you will find out:

  •  why you cannot format the write-protected SD card
  •  methods on how to remove protection from a memory card
  •  how Disk Internals software can help you

What does it mean, if an SD card is write protected?


This may happen every time: you insert an SD card to the adapter in your computer/laptop, digital camera, etc and you can view and read all the files located on it, but this is all that you can do with this SD card.
You will find it impossible to add anything, and you cannot format a write-protected card. Below are the possible reasons and solutions to why an SD Card is write protected.

Reasons and Solutions:


1. SD card is write-protected for physical reasons
SD card is write protected because of switcher
How To Remove Write Protection From SD Card

Here, the switch that protects the SD card from being overwritten is active.

To fix it, disable the lock. On each SD card on one side, there is a switch, which needs to be shifted in the opposite direction and then the SD card can be reconnected to the computer.

Did this method for removing write protection from an SD card not help you? No worries since there are many other solutions to the situation.

2. SD card write-protected due to software
This situation may occur due to read-only attributes.

To fix it, delete them using the command line.

Press Win + X at the same time; you will see a cmd window where you need to type "diskpart" on the keyboard and confirm pressing Enter.
How To Remove Write Protection From SD Card

Then enter the command "list disk" and press Enter.

Then enter the command "list disk" and press Enter.

Disks connected to the system will appear in a new window. Select your SD card (you can find it by the appropriate disk size; for example, drive 0).


Next, in command Prompt, type: "select disk 0", then press Enter.

Then enter the command "list disk" and press Enter.

Next, enter the attributes. "disk clear read-only command" and press Enter.


These actions will remove the attributes and remove write protection from your micro SD card.

DL tech

4. Write protection is gone but so is the data
This is due to improper use of the diskpart utility. (Sometimes instead of removing the write protection, users format their SD cards). And, as you know, due to the formatting, all data is lost.

To fix it, use DiskInternals Partition Recovery. This application recreates the file system on the SD card, so the files can be found and restored. It recovers any file: photos, music, videos, documents, etc. You can also not worry about large files: the application can handle even them. It has been designed to satisfy user's needs without fail:


There are three recovery wizards that will explain everything to you step by step, depending on your file system: Partition Recovery Wizard, NTFS Recovery Wizard, and FAT Recovery Wizard.
There are several scan modes (fast, full).
There is a free file preview for assurance.
There is a trial version at no cost; you only need to pay if you want to save the recovered files to any disk visible to the system and with unshakable technical support.

Download it HERE for Windows

Top 6 Operating System Hackers Use To Hack

 Top 6 Operating System Hackers Use To Hack

Top 6 Operating System Hackers Use To Hack

We do know that professional hackers have their own specially made operating system for hacking, which is not windows. There are operating system that hackers use to hack and I'll be mentioning the top 6 of them in this post.

They are:

 1. Kali Linux
 Kali Linux is an open source project that is maintained and funded by Offensive Security,a provider of world-class information security training and penetration testing services.
 In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.

 2. BackBox Linux
 BackBox is more than an operating system,
 it is a Free Open Source Community project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer.
 All this using exclusively Free Open Source Software by demonstrating the potential and power of the community.

 3. BackTrack Linux
 The evolution of BackTrack spans many years of development, penetration tests, and unprecedented help from the security community.
 BackTrack originally started with earlier versions of live Linux distributions called Whoppix, IWHAX, and Auditor.
 When BackTrack was developed, it was designed to be an all in one live hacking CD used on security audits and was specifically crafted to not leave any remnants of itself on the laptop.
 It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world.

 4. BlackArch Linux
 BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.
 The repository contains 1629 tools.
 You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs.
 For more information, see the installation instructions.


 5. Deft Linux
 DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics,
 with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc…)
 connected to the PC where the boot process takes place.
 it can run live (via DVDROM or USB pendrive), installed or run as a Virtual Appliance on VMware or Virtualbox.
 DEFT employs LXDE as desktop environment and WINE for executing Windows tools under Linux.
A hacker



6. NST 
NST is a bootable ISO live DVD/USB Flash Drive based on Fedora Linux.
 The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems.
 The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools.
 An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution.
 In the virtual world, NST can be used as a network security analysis validation and monitoring tool on enterprise virtual servers hosting virtual machines.

If you want daily hacking tutorial and want to learn ethical hacking then Join our telegram channel and also we are sharing free udemy courses, so don't forget to join. 

Avoid Common Mistakes When Buying A Router

 Avoid common mistakes when buying a router

Avoid common mistakes when buying a router


We all know how dependent we are on our home WiFi networks. It’s not always for work, a lot of young people’s lives are on hold if they are unable to access the internet. We all are dependent on the internet in some ways either for business or for education. To upload, download, watch movies, play games, and much more everything needs the internet.

So, it all shows how important our home WiFi networks are. If you are going to buy a WiFi router try to avoid these common mistakes. This will improve the reliability and performance of our home WiFi networks.

Want to know more about routers? You check them online if you want to read their specifications. In order to identify your ptcl speed test , visit it.

Make sure that WiFi signals pass through your walls:

Walls sometimes lower the strength of your WiFi signals. We just want RF signals from our router to pass through our walls. WiFi uses RF signals in specific bands. Lower frequencies travel far but with less bandwidth. High frequency has more bandwidth but they do not travel far. Wireless home networks use two bands which are 2.4GHz and 5GHz. 2.4GHz is better and will pass through your home more freely than 5GHz.

Select Dual-band router

Your router should be Dual-band because single-band routers are a thing of the past. It means that the router broadcasts the signals on two frequencies if it is dual-band or more. One of the frequencies is always 2.4GHz and its benefit is that it is appropriate with the old networking devices and it also has a wide coverage area. But it is slow especially in blocks of flats and buildings of office.

Lifespan of Router

Using the same router for a long period of time degrades its quality. Routers with high quality don’t require to change in a short time. It does not matter if a router is expensive, if its quality is high it will be worth investing money. Changing the router, again and again, can lead to more financial loss.

Don’t take the Router from your ISP

Mostly when you sign up for ISP you will get the connection as well as the router. But you should avoid purchasing it. It seems cool to have a free router but you’ll realize soon its quality. It’s good to buy a router by keeping in mind all your requirements.

And if you have bought a router from your provider and you are not satisfied with its speed, you can check it by using our tool and then you can compare both the speeds.