Friday, November 23, 2012

Diamond-z4 CZ: Scam or no scam



  • Diamond-z4™ Ring
  • Diamond-z4™ Band
    OPTIONAL — Just pay separate fee
  • Certificate of Authenticity
    Confirming the appraised value at $95
  • 2¾ Carat Center Stone
    Flawless Princess Cut
  • 1¼ T.C.W. Baguettes
    2 Round and 2 Tapered
  • Sterling Silver Plate
    Polished and Finished

THE STERLINGTON COLLECTION PROUDLY PRESENTS "A TRUE MASTERPIECE"

Now is your chance to own one of the most famous ring designs in the world - complete with a stunning princess cut stone hand set in finished sterling silver plate.

Even jewelers have a difficult time distinguishing the Diamond-z4 CZ from a mined diamond because of its similarity. Now for the first time ever, the fire and brilliance of flawless diamonds are captured in this beautiful ring! Each perfectly complemented by a brilliant setting of Sterling Silver Plate and offered at an unprecedented price! The Sterling Collection proudly presents a true masterpiece! This exquisite ring features a flawless two-and-three-quarter carat center CZ stone surrounded by over one-and-a-quarter carats of round and tapered clear Diamond-z4 CZ baguettes. Its style, luster, color, and cut are unsurpassed.
Other similar rings can sell for thousands of dollars, but we're able to offer this amazing piece to the public for a VERY limited time for only $20 plus just $6.99 shipping and handling. EachDiamond-z4 CZ Ring is accompanied by a certificate of authenticity and comes complete with a hinged decorative velveteen box that will be shipped securely to your home. As part of our *SPECIAL OFFER, you'll also have the opportunity to receive the matching 1.9 total carat Diamond-z4 band for a separate fee of $6.99! This Sterlington Collection offer is not available in stores. Due to the limited time offer restriction, there is a strict limit of just one order per household. We urge you to reserve yours now.
El scam mas grande de los 2013-2014
,Esta compañía genera ingresos en el cambia cambia,y envió no ordenado,teniendo tu tarjeta de crédito ya en sus registro te doble cargan,cobrándote anticipado una mercancía no deseada,.En el proceso devolutivo que por cierto tardan demasiado en acreditarse ,pierdes la noción de lo que te han cobrado y lo que te re-fundaron,pero no te devuelven el cobro de envió,que creo que es ahí donde suceden sus verdaderas ganancias,es como una renta de sus mercancía por asi decirlo

Abajo podrás leer algunas experiencia con esta fraudulenta compañía,ademas de agregar la tuya si ya fuiste mordido por ellos
The biggest scam of 2013-2014
, This business you generate income on the switch changes, and sent unordered, having your credit card already in your record you double charged, charging you advance unwanted merchandise. At the devolution process which incidentally take too long to be accredited, you lose notion of what you have paid and what you re-founded, but do not return the collection sent, I think that's where their real profits happen, it's like a rent of their merchandise so to speak

Below read some experience with this fraudulent company, plus add yours if you were bitten by them and

Order your-z4 ™ Diamond Ring now.

Order your Diamond-z4™ Ring now.


Below read some experience with this fraudulent company, plus add yours if you were bitten by them and

Order your-z4 ™ Diamond Ring now.

OFFER DETAILS:
When ordering today, you will receive the Diamond-z4 Ring for only $20 +$6.99 S&H, and as a special offer, you can add the matching 1.9 total carat Diamond-z4 Band with your order for a separate $6.99 fee.
*State tax will be added to orders for: CA and NJ.
**An additional $10 S&H is added for items sent to Canada, Guam, Puerto Rico, Hawaii, US Virgin Islands and Alaska.
30-DAY MONEY BACK GUARANTEE (minus S&H).
Please allow 2-6 weeks for delivery.



WARNING WARNIG WARNING:



Fraudulent Charges


Alexander
12/08/2012
Miami,USA
I have bought it and it took 20-30 days more or less,I was worried about scam online and this forum 
that I have searched on my looking for a answer, finally when my wife received the call for them,
it is true that they want to send you a "free ear ring . but we were prepared for this ,so we
answer no Sr,we don't want nothing else that what we bought online,after a confirmation 7-10 days
 later my ring was delivery and I gave to my wife
my experience was ok,no lost of money ,no double charged so far but i will keeping an eye on my bank
for a while

2/12/2013
That company play sending items that you never ordered or wanted,so they get back those items in return ,but the
midtime They have already charged on your credit card for that new item that never was wanted
so my experienced two months later ,This is a big SPAM,never buy something that look so cheap and nice

Complaint


Kim m
Country: United States
I ordered the Diamond Z4 ring for $20 and $6.99 s&h.  It has been about a month and I still have not received the ring.  Over the last two weeks, I have received two calls from their sales people to send me free earrings and a necklace for a 14 day free trial. If I chose to keep the necklace, I would be charged $53.96. I was not interested and told them so before they could even finish their speech.  I was charged TWICE for $53.96 on the same day!  I called my credit card company and told them the charges were fraudulent and they removed the charges. It's amazing to me that they think they can get away with ripping people off. This company is BOGUS!!!
!

Comments

  • 0
    Candy
    I ordered the diamond ring and over $200 was removed from my account....I hadnt received the merchadise...After calling the company the customer service rep  continued to offer me different discounts...because she didnt do as I had asked I cancelled the entire order...I then asked to speak with a supervisor she asked me why..she almost felt my raft..currently still on the phone with them...THIS COMPANY IS A FRAUD....DO NOT BUY FROM THEM
    • 0
      pin replies to Candy
      I ordered this ring on April 27. I was called and told there was a problem wirh my card, so I reordered and waited another month. Next thing I know,my card was charged twice. I called them back and offered me the second ring for 5$ less. I refused. Told them to cancel the second order. It has now been over a month,my card was charged ...still no ring. So I called and tokd them to,ship,me the ring or I would notify fbi. As of today, according to them the ring was shipped yesterday. We will see. not worth the stress. There is a great company called stauer. I ordered from them receivrd the,merchandise within 5 days. They are great and the rings are amazingly beautiful at an amazing price. Stay away from.telebrands


      TO READ MORE CLICK THE LINK
      http://complaintwire.org/complaint/PQlY272SngU/tel-diamond-z4
      • 0

Thursday, November 22, 2012

Teclas rápidas o atajos en Yahoo! Mail


Descripción
En este artículo se proporciona una lista de teclas rápidas que puedes usar en la interfaz de Yahoo! Mail.

Resolución
El nuevo Yahoo! Mail lleva integradas unas teclas rápidas que pueden ahorrarte tiempo. Para utilizar una secuencia de teclas múltiple, como Ctrl+Mayús+E, pulsa las teclas en el orden indicado y no las sueltes.

Comandos generales
AcciónTeclas rápidas
Ver correo (salta a la bandeja de entrada, si no estás en ella)M
Ver todo el correo (incluidas las cuentas POP)Mayús+M
Redactar un nuevo mensajeN
Comenzar un nuevo mensaje instantáneo (Mens.)I
Comenzar un nuevo mensaje SMS (texto)T
Ir a la pestaña anteriorPC: Ctrl+[
Mac: Cmd+[
Ir a la pestaña siguientePC: Ctrl+]
Mac: Cmd+]
Cerrar la pestaña actualPC: Ctrl+\ o Esc
Mac: Cmd+\ o Esc
BuscarS
Ampliar ventana a su altura máximaF11
Nota: No disponible en Safari.
Mostrar teclas rápidas?
Redactar un mensaje electrónico
AcciónTecla rápida
Adjuntar archivos (de uno en uno)PC: Ctrl+Mayús+U
PC: Ctrl+Mayús+U
Mac: Cmd+Mayús+U
Nota: No disponible en Internet Explorer.
Seleccionar el archivo adjunto siguiente o anteriorTeclas de flecha arriba, abajo, izquierda, derecha
Eliminar un archivo adjuntoSuprimir
Mover el cursor a las herramientas de formato o a la lista de archivos adjuntos (desde el campo de mensaje)Mayús+Tab
Mover el cursor a la pestaña Redactar mensaje anterior o siguienteFlecha izquierda o derecha
Mostrar el cuadro de diálogo Selecciona los contactos (en el campo Para, CC o CCO)Flecha derecha y luego Intro
Mostrar el campo CCO (desde el campo CC)Flecha derecha, flecha derecha y luego Intro
Alternar entre modo de texto con y sin formatoPC: Ctrl+Mayús+Y
Mac: Cmd+Mayús+Y
Guardar como borradorPC: Ctrl+S
Mac: Cmd+S
Enviar mensajePC: Ctrl+Intro
Mac: Cmd+Retorno
Tareas con mensajes
AcciónTecla rápida
Responder a un mensajeR
Responder a todos en un mensajeA
Reenviar un mensajeF
Marcar como leídoK
Marcar como no leídoMayús+K
Marcar un mensajeL
Quitar marcaMayús+L
Buscar una palabra o frase en un mensajePC: Ctrl+F
Mac: Cmd+F
Imprimir mensajePC: Ctrl+P o P
Mac: Cmd+P o P
Eliminar mensajeSuprimir
Añadir destinatario a contactosMayús+A
Abrir menú MoverD

Mover el mensaje o los mensajes a una de tus primeras 9 carpetas
D, luego 1-9 (por ejemplo, escribe "2" para la segunda carpeta)
Crear una carpeta nuevaPC: Ctrl+Mayús+E
Mac: CMD+Mayús+E
Mover el mensaje o los mensajes a una carpeta nuevaPC: D, luego Ctrl+Mayús+E
Mac: D, luego Cmd+Mayús+E
Ver mensaje anteriorCtrl+, (coma)
Ver mensaje siguienteCtrl+. (punto)
Tareas con conversaciones de mensajería instantánea
AcciónTecla rápida
Responder por MIMayús+I
Responder por SMSMayús+T
Tareas con listas de mensajes
AcciónTecla rápida
Resaltar el mensaje anterior o siguienteFlechas arriba y abajo
Abrir un mensajePC: Intro
Mac: Retorno

Seleccionar todos los mensajes
PC: Ctrl+A
Mac: Cmd+A
Seleccionar mensajes en un intervaloHaz clic para marcar la casilla del primer mensaje y luego haz clic junto con la tecla Mayús sobre la casilla del último mensaje
Activar o desactivar el panel de vista previa (al ver mensajes en una lista de desplazamiento)V
Tareas con listas de mensajes (al ver mensajes página por página)
AcciónTecla rápida

Activar o desactivar la casilla de un mensaje
Barra espaciadora
Mover el cursor arriba o abajo en la lista (preservando la selección)PC: Ctrl+flecha arriba, Ctrl+flecha abajo
Mac: Cmd+flecha arriba, Cmd+flecha abajo
Mover el cursor al encabezado de la columna (desde la primera fila)PC: Ctrl+flecha arriba
Mac: Cmd+flecha arriba
Mover el cursor al encabezado de la columna siguiente a la izquierda o a la derecha (cuando el cursor está en un encabezado de columna)Flechas derecha e izquierda
Ordenar por columna (con el foco en la columna)Barra espaciadora
Navegación por el teclado y selección
AcciónTecla rápida
Mover el cursor a la región siguiente o anterior de la pantallaTab, Mayús+Tab
Mover el cursor al botón siguiente o anterior de la barra de herramientasFlechas izquierda o derecha
Mover el cursor al elemento siguiente o anterior de la listaFlechas arriba y abajo
Seleccionar el elemento enfocadoIntro
Vaciar la papelera o la carpeta de spam (con el ratón o el cursor en la carpeta)E
Ampliar o contraer la lista de carpetas (con el ratón o el cursor en la parte superior de la lista de carpetas)Intro
Cambiar el nombre de una carpeta (con el ratón o el cursor en la carpeta)C

The history and evolution of 4G


Takeaway: Scott Reeves looks at the two main contenders for 4G and where they differ from the current 3G systems in operation.
The original use of mobile phones has been transformed over the last 10 to 15 years. The advent of different types of higher data rate technologies (like GPRS) began a shift in revenue from voice to data for telecommunication companies. The growing demand to be able to use the Internet anywhere, anytime, led to the development of higher bandwidth technologies, such as W-CDMA and WiMAX.

History

The first generation of mobile communications started with the Advanced Mobile Phone Systems (AMPS), which was an analogue system. AMPS can be thought of as 1G. From there, we progressed to GSM and CDMA-one (pretty much regarded as 2G) and then to UMTS and EV-DO, which are 3G technologies. The latest technologies that are regarded as candidates for 4G are LTE (from the 3GPP group) and 802.16m (from the IEEE). In the case of 802.16m, the candidate for 4G is also known as WirelessMAN Advanced, or WiMAX2. LTE progresses through versions known as releases. The latest release that qualifies as being 4G is release 10, often called LTE-Advanced.

The ITU specification

The group that designates technologies as 4G is the International Telecommunications Union (ITU). The ITU issued a press release on October 21, 2010, that qualified LTE-Advanced and WiMAX2 as meeting the requirements for 4G. The report produced by the ITU is “Report ITU-R M.2134.” It’s a fairly short report, but I’ll pick out the main points, as these give some indication as to what constitutes 4G.
The first point relates to mobility. Generally, low mobility is a person walking. High mobility is usually around 100km/h or about 60mph; a typical speed when traveling on a train or a car. Mobility also means that a person should be able to move between base stations without losing a connection, so there is a handover component to 4G.
The second part of the ITU report relates to throughput. There’s no mention of throughput specifically, as in “You’ll have 1GB/sec throughput on the downlink.”  What it does have is the spectral efficiency target for each speed and the likely throughput for this. The report does have some concrete examples, which give an indicative level of the throughput. For instance, with 100MHz of bandwidth, a low mobility user should have a peak data rate of 1.5GBits/sec in the downlink. Under the same conditions, the peak uplink speed should be 675Mbits/sec.
This is significantly higher than current 3G rates, both in the downlink and the uplink. This is where you can quite definitely state that a network is 4G rather than 3G.

Other aspects

One of the other parts of 4G that sets it apart from its predecessor is that it’s entirely packet switched. IP is used in the network layer to route packets. This sets 4G apart from earlier 3G technologies, which often use older circuit-switched networks for voice.
Wireless is more complicated in terms of transmission than a wired network. The inverse square law applies to wireless propagation; in fact, it’s often greater than the inverse square. The radio signals can also take different paths to the receiver and interfere at the receiver end.
Then there’s the limitation of spectrum. This can be very restrictive. The frequency bands currently available are quite small. To further complicate matters, many of the spectrum allocations around the world are in a somewhat fragmented state. Portions may be allocated to 2G, for example, and other parts to 3G — but these portions are often not in contiguous bands of the spectrum, leading to fragmentation.
A way around the problem of fragmentation of spectrum is Carrier Aggregation. This idea was probably meant more to increase potential throughput, but it has the side effect of also allowing operators to be able to use non-contiguous slices of spectrum. Carrier aggregation is a feature of both LTE-Advanced and WiMAX2 — it was not possible under earlier technologies.

Summary

At present, LTE-Advanced and WiMAX2 are still to be rolled out, although many of the technologies they’ll use — such as Carrier Aggregation and MIMO — are currently in use or are in an advanced stage of development. What are being rolled out are WiMAX and LTE networks that have the capability of being upgraded to WiMAX2 and LTE-Advanced respectively in the future.

Four Best WiFi Cracking Applications For your Iphone


Wifi Crack/2012 | Author Name: xaIn1 

1. Aircrack-ng for IPhone:

It is the simple command line with graphical interface software which is used to crack wifi networks . It sends packets to the wifi network and then cracks the password file of the network .It is used widely and can be downloaded from here.

2. IWep Lite:

It is an Iphone applications which let you crack wifi network in less than 30 minutes . It is easy in use and can be understood easily rather than Aircrack-ng . It is Graphical interface with best utility and dictionary . Apart from Aircrac-ng it uses dictionary and so it is less trustworthy than Aircrack and can not crack every key. It is used more widely than Aircrack but it uses dictionary that's why it is on 2nd number. It can be downloaded from here .

3. WepGen:

WepGen is just another application which cracks the Wifi network by sending packets and it is rather easy in use than Aircrack but though it is on 3rd number due to it's popularity. It can be downloaded from here.

4. IWifi Hack:

It works on the same scene as other cracking softwares except iweplite means it sends packets and break in the security of a wifi network . It is easy in use and can easily be used by anyone. It can be download from here.

Protect Your Computer, Network, and Wi-Fi From Hackers


wifi
Author Name: Wamiq Ali 
Main reason of hacking attempts is the fact, that the average internet user holds a belief that setting
up network security is a complex process, and hence chooses to ignore it altogether. However, as many experts have previously explained, protecting your computer and network from intrusion by hackers is quite an easy task to achieve. It is more or less a case of simple precautionary measures that can ensure your system from being compromised. Here are a few of such measures, that you can take to avoid being a target of a cyber attack :-
  1. Operating system manufacturers often release updates to address security concerns in their existing operating systems. You should make it a habit to keep your particular operating system updated.
  2. Stay aware of the fact that many system hacks are due to user passwords that are easy to guess. So try to make all your passwords as a combination of symbols, numerals and letters which makes it difficult to guess.
  3. Stay aware of the fact that many system hacks are due to user passwords that are easy to guess. So try to make all your passwords as a combination of symbols, numerals and letters which makes it difficult to guess.
  4. You should use routers for any type of internet connection. Routers use a method known as Network Address Translation commonly abbreviated as NAT, which is functionally similar to a firewall. NAT prevents the ports from being scanned. Apart from that, the router adds to security by using external IP address while the computer utilizes an internal IP address.
  5. Use good spyware and virus scanners and keep them updated regularly. This should prevent latest viruses from affecting your system.
  6. Use WPA2 encryption technique if you are on a wi-fi network. It is better and comparatively more secure to the WEP encryption technique.
  7. A good practice if you are into using wireless networks, is to change the network’s Service Set Identifier also known as SSID and setting it to invisible. The SSID acts as a unique identifier for your wi-fi network and is broadcasted by your router. This allows other devices which are trying to connect your network, to see your SSID. You can navigate to your router’s security settings and from there, you can change the network SSID from a manufacturer preset one to the one you desire. Then, you can also make it invisible so that your network will not be discoverable and your router will not broadcast the SSID information.
  8. Open access wi-fi hotspots are networks which allow users to connect to them without a password. Open wi-fi networks seem to be lucrative options for accessing web content at places like airports. This is where it could actually become a potentially dangerous option as an intruder might connect to the same network and steal your sensitive information. One simple precaution that you can follow is to limit the content you access on such networks and avoid websites that require you to enter user-sensitive data.
The user has to be aware of the threats that surround him, if he wishes to combat them. On a conclusive note, you can really help the cause of protecting yourself from hackers if you follow simple rules and precautions as the ones outlined above.

http://www.hackersthirst.com/2011/12/protect-your-computer-network-and-wi-fi.html

SMS Bombers- How most of them work


/2012 | Author Name: Wamiq Ali

smsbomb
A lot of people are getting annoyed by the amount of rubbish messages they are getting just because of this SMS bombing fact. In fact I have also edited some SMS bombers and have come to know certain facts about them. Mostly, researches may vary from them but you must be aware also from what I got to you today. Many internet users just pay for theseSMS bombers just to annoy someone since they have some bad intentions. Lets, see how these SMS bombers work:

Top Reasons on how these SMS bombers Work:

  1. Mostly Mobile Sites offer some subscription service from their websites and user just has to input his mobile number there, After that an automated confirmation message is sent to user’s cell phone. Any bad minded guy can easily exploit this easily by just tempering the page requests to the server and by understanding the mechanism on how it works to process the entered number.
  2. A paid SMS bomber can also use some online SMS sending service, there are a lot paid services available which can be used to send as many texts as you want. But such SMS bombers are never free ones, Such SMS bombers can also have spoofing feature.
Thus, An SMS bomber takes the mobile number of the victim as the input and then forwards that to specific website which then send automated message to the victim’s number.
SMS bomber makes this process to repeat at a rate of thousands of time. And victim mind just blows off and he turns off his mobile.

How to prevent such SMS bombers to be fully functional:

  • This part is for websites admin who offer sms services, It would be better to use somecaptcha as per security reasons. I know captcha can also be bypassed but still its better than nothing.
  • Not more than 10 messages should be sent by the website again and again to same number. Within 24 hours, Some filtering techniques should be implemented.
http://www.hackersthirst.com/2012/08/sms-bombers-how-most-of-them-work.html

10 fundamental differences between Linux and Windows


Before debating the relative merits and shortcomings of Linux and Windows, it helps to understand the real distinctions between them. Jack Wallen has distilled the key differences into one list.


I have been around the Linux community for more than 10 years now. From the very beginning, I have known that there are basic differences between Linux and Windows that will always set them apart. This is not, in the least, to say one is better than the other. It’s just to say that they are fundamentally different. Many people, looking from the view of one operating system or the other, don’t quite get the differences between these two powerhouses. So I decided it might serve the public well to list 10 of the primary differences between Linux and Windows.
Note: This information is also available as a PDF download.

#1: Full access vs. no access

Having access to the source code is probably the single most significant difference between Linux and Windows. The fact that Linux belongs to the GNU Public License ensures that users (of all sorts) can access (and alter) the code to the very kernel that serves as the foundation of the Linux operating system. You want to peer at the Windows code? Good luck. Unless you are a member of a very select (and elite, to many) group, you will never lay eyes on code making up the Windows operating system.
You can look at this from both sides of the fence. Some say giving the public access to the code opens the operating system (and the software that runs on top of it) to malicious developers who will take advantage of any weakness they find. Others say that having full access to the code helps bring about faster improvements and bug fixes to keep those malicious developers from being able to bring the system down. I have, on occasion, dipped into the code of one Linux application or another, and when all was said and done, was happy with the results. Could I have done that with a closed-source Windows application? No.

#2: Licensing freedom vs. licensing restrictions

Along with access comes the difference between the licenses. I’m sure that every IT professional could go on and on about licensing of PC software. But let’s just look at the key aspect of the licenses (without getting into legalese). With a Linux GPL-licensed operating system, you are free to modify that software and use and even republish or sell it (so long as you make the code available). Also, with the GPL, you can download a single copy of a Linux distribution (or application) and install it on as many machines as you like. With the Microsoft license, you can do none of the above. You are bound to the number of licenses you purchase, so if you purchase 10 licenses, you can legally install that operating system (or application) on only 10 machines.

#3: Online peer support vs. paid help-desk support

This is one issue where most companies turn their backs on Linux. But it’s really not necessary. With Linux, you have the support of a huge community via forums, online search, and plenty of dedicated Web sites. And of course, if you feel the need, you can purchase support contracts from some of the bigger Linux companies (Red Hat and Novell for instance).
However, when you use the peer support inherent in Linux, you do fall prey to time. You could have an issue with something, send out e-mail to a mailing list or post on a forum, and within 10 minutes be flooded with suggestions. Or these suggestions could take hours of days to come in. It seems all up to chance sometimes. Still, generally speaking, most problems with Linux have been encountered and documented. So chances are good you’ll find your solution fairly quickly.
On the other side of the coin is support for Windows. Yes, you can go the same route with Microsoft and depend upon your peers for solutions. There are just as many help sites/lists/forums for Windows as there are for Linux. And you can purchase support from Microsoft itself. Most corporate higher-ups easily fall victim to the safety net that having a support contract brings. But most higher-ups haven’t had to depend up on said support contract. Of the various people I know who have used either a Linux paid support contract or a Microsoft paid support contract, I can’t say one was more pleased than the other. This of course begs the question “Why do so many say that Microsoft support is superior to Linux paid support?”

#4: Full vs. partial hardware support

One issue that is slowly becoming nonexistent is hardware support. Years ago, if you wanted to install Linux on a machine you had to make sure you hand-picked each piece of hardware or your installation would not work 100 percent. I can remember, back in 1997-ish, trying to figure out why I couldn’t get Caldera Linux or Red Hat Linux to see my modem. After much looking around, I found I was the proud owner of a Winmodem. So I had to go out and purchase a US Robotics external modem because that was the one modem I knew would work. This is not so much the case now. You can grab a PC (or laptop) and most likely get one or more Linux distributions to install and work nearly 100 percent. But there are still some exceptions. For instance, hibernate/suspend remains a problem with many laptops, although it has come a long way.
With Windows, you know that most every piece of hardware will work with the operating system. Of course, there are times (and I have experienced this over and over) when you will wind up spending much of the day searching for the correct drivers for that piece of hardware you no longer have the install disk for. But you can go out and buy that 10-cent Ethernet card and know it’ll work on your machine (so long as you have, or can find, the drivers). You also can rest assured that when you purchase that insanely powerful graphics card, you will probably be able to take full advantage of its power.

#5: Command line vs. no command line

No matter how far the Linux operating system has come and how amazing the desktop environment becomes, the command line will always be an invaluable tool for administration purposes. Nothing will ever replace my favorite text-based editor, ssh, and any given command-line tool. I can’t imagine administering a Linux machine without the command line. But for the end user — not so much. You could use a Linux machine for years and never touch the command line. Same with Windows. You can still use the command line with Windows, but not nearly to the extent as with Linux. And Microsoft tends to obfuscate the command prompt from users. Without going to Run and entering cmd (or command, or whichever it is these days), the user won’t even know the command-line tool exists. And if a user does get the Windows command line up and running, how useful is it really?

#6: Centralized vs. noncentralized application installation

The heading for this point might have thrown you for a loop. But let’s think about this for a second. With Linux you have (with nearly every distribution) a centralized location where you can search for, add, or remove software. I’m talking about package management systems, such as Synaptic. With Synaptic, you can open up one tool, search for an application (or group of applications), and install that application without having to do any Web searching (or purchasing).
Windows has nothing like this. With Windows, you must know where to find the software you want to install, download the software (or put the CD into your machine), and run setup.exe or install.exe with a simple double-click. For many years, it was thought that installing applications on Windows was far easier than on Linux. And for many years, that thought was right on target. Not so much now. Installation under Linux is simple, painless, and centralized.

#7: Flexibility vs. rigidity

I always compare Linux (especially the desktop) and Windows to a room where the floor and ceiling are either movable or not. With Linux, you have a room where the floor and ceiling can be raised or lowered, at will, as high or low as you want to make them. With Windows, that floor and ceiling are immovable. You can’t go further than Microsoft has deemed it necessary to go.
Take, for instance, the desktop. Unless you are willing to pay for and install a third-party application that can alter the desktop appearance, with Windows you are stuck with what Microsoft has declared is the ideal desktop for you. With Linux, you can pretty much make your desktop look and feel exactly how you want/need. You can have as much or as little on your desktop as you want. From simple flat Fluxbox to a full-blown 3D Compiz experience, the Linux desktop is as flexible an environment as there is on a computer.

#8: Fanboys vs. corporate types

I wanted to add this because even though Linux has reached well beyond its school-project roots, Linux users tend to be soapbox-dwelling fanatics who are quick to spout off about why you should be choosing Linux over Windows. I am guilty of this on a daily basis (I try hard to recruit new fanboys/girls), and it’s a badge I wear proudly. Of course, this is seen as less than professional by some. After all, why would something worthy of a corporate environment have or need cheerleaders? Shouldn’t the software sell itself? Because of the open source nature of Linux, it has to make do without the help of the marketing budgets and deep pockets of Microsoft. With that comes the need for fans to help spread the word. And word of mouth is the best friend of Linux.
Some see the fanaticism as the same college-level hoorah that keeps Linux in the basements for LUG meetings and science projects. But I beg to differ. Another company, thanks to the phenomenon of a simple music player and phone, has fallen into the same fanboy fanaticism, and yet that company’s image has not been besmirched because of that fanaticism. Windows does not have these same fans. Instead, Windows has a league of paper-certified administrators who believe the hype when they hear the misrepresented market share numbers reassuring them they will be employable until the end of time.

#9: Automated vs. nonautomated removable media

I remember the days of old when you had to mount your floppy to use it and unmount it to remove it. Well, those times are drawing to a close — but not completely. One issue that plagues new Linux users is how removable media is used. The idea of having to manually “mount” a CD drive to access the contents of a CD is completely foreign to new users. There is a reason this is the way it is. Because Linux has always been a multiuser platform, it was thought that forcing a user to mount a media to use it would keep the user’s files from being overwritten by another user. Think about it: On a multiuser system, if everyone had instant access to a disk that had been inserted, what would stop them from deleting or overwriting a file you had just added to the media? Things have now evolved to the point where Linux subsystems are set up so that you can use a removable device in the same way you use them in Windows. But it’s not the norm. And besides, who doesn’t want to manually edit the /etc/fstab fle?

#10: Multilayered run levels vs. a single-layered run level

I couldn’t figure out how best to title this point, so I went with a description. What I’m talking about is Linux’ inherent ability to stop at different run levels. With this, you can work from either the command line (run level 3) or the GUI (run level 5). This can really save your socks when X Windows is fubared and you need to figure out the problem. You can do this by booting into run level 3, logging in as root, and finding/fixing the problem.
With Windows, you’re lucky to get to a command line via safe mode — and then you may or may not have the tools you need to fix the problem. In Linux, even in run level 3, you can still get and install a tool to help you out (hello apt-get install APPLICATION via the command line). Having different run levels is helpful in another way. Say the machine in question is a Web or mail server. You want to give it all the memory you have, so you don’t want the machine to boot into run level 5. However, there are times when you do want the GUI for administrative purposes (even though you can fully administer a Linux server from the command line). Because you can run the startxcommand from the command line at run level 3, you can still start up X Windows and have your GUI as well. With Windows, you are stuck at the Graphical run level unless you hit a serious problem.

Your call…

Those are 10 fundamental differences between Linux and Windows. You can decide for yourself whether you think those differences give the advantage to one operating system or the other. Me? Well I think my reputation (and opinion) precedes me, so I probably don’t need to say I feel strongly that the advantage leans toward Linux.

Linux Vs Windows (Good and Bad aspects)


Linux Vs Windows-A comparison between the two!

Today, i am going to share a common comparsion between linux and windows. The purpose of this is to clear the basic concept of those who are using windows and think that linux is weird.First i should tell you what is linux:
"Linux (often pronounced LIH-nuhks with a short "i") is a Unix-like operating system that was designed to provide personal computer users a free or very low-cost operating system comparable to traditional and usually more expensive Unix systems. Linux has a reputation as a very efficient and fast-performing system. Linux's kernel (the central part of the operating system) was developed by Linus Torvalds at the University of Helsinki in Finland. To complete the operating system, Torvalds and other team members made use of system components developed by members of the Free Software Foundation for the GNU Project. "
Comparing with windows:
Price Ratio: 
Linux: The majority of Linux variants are available for free or at a much lower price than Microsoft Windows.
Windows: Microsoft Windows can run between $50.00 - $150.00 US dollars per each license copy.

Ease of access:
Linux: Although the majority Linux variants have improved dramatically in ease of use, Windows is still much easier to use for new computer users.
Windows: Microsoft has made several advancements and changes that have made it a much easier to use operating system, and although arguably it may not be the easiest operating system, it is still Easier than Linux.

Reliability:
Linux: The majority of Linux variants and versions are notoriously reliable and can often run for months and years without needing to be rebooted.
Windows: Although Microsoft Windows has made great improvements in reliability over the last few versions of Windows, it still cannot match the reliability of Linux.


Softwares:
Linux: Linux has a large variety of available software programs, utilities, and games. However, Windows has a much larger selection of available software.
Windows: Because of the large amount of Microsoft Windows users, there is a much larger selection of available software programs, utilities, and games for Windows.


Hardware:
Linux: Linux companies and hardware manufacturers have made great advancements in hardware support for Linux and today Linux will support most hardware devices. However, many companies still do not offer drivers or support for their hardware in Linux.
Windows: Because of the amount of Microsoft Windows users and the broader driver support, Windows has a much larger support for hardware devices and a good majority of hardware manufacturers will support their products in Microsoft Windows.

Open Source:
Linux: Many of the Linux variants and many Linux programs are open source and enable users to customize or modify the code however they wish to.
Windows: Microsoft Windows is not open source and the majority of Windows programs are not open source.

Security:
Linux: Linux is and has always been a very secure operating system. Although it still can be attacked when compared to Windows, it much more secure.
Windows: Although Microsoft has made great improvements over the years with security on their operating system, their operating system continues to be the most vulnerable to viruses and other attacks.

Support:
Linux: Although it may be more difficult to find users familiar with all Linux variants, there are vast amounts of available online documentation and help, available books, and support available for Linux.
Windows: Microsoft Windows includes its own help section, has vast amount of available online documentation and help, as well as books on each of the versions of Windows.

Main Linux disadvantage:
Understanding: Becoming familiar with the Linux operating system requires patience as well as a strong learning curve. You must have the desire to read and figure things out on your own, rather than having everything done for you.
http://www.techrepublic.com/blog/10things/10-fundamental-differences-between-linux-and-windows/406
http://www.hackersthirst.com/2011/02/linux-vs-windows-good-and-bad-aspects.html