Blog Archives

How to Fix Boot Problem in Windows 7

We have often faced such booting problem in windows 7.To fix this problem we make partition with xp and then install windows 7.There is a simple way to fix this problem and it will save your time too.We can fix this problem by repairing the Boot loader files in windows 7. Following steps will help you to understand in detail.
Step 1
Power on the PC press F2 or Del key to enter into BIOS setting,change the first boot device to CD_ROM and press F10 to save settings.
Step 2
Now restart your system and insert the windows 7 DVD, it will ask to Press any key to boot from cd or dvd.
Step 3
Just press any key ,then the repairing process will starts.
Step 4
 System will load files and the below screen appears

Step 5
Click on “Repair Your Computer” as shown.
Step 6

Again some windows component will load and then the below screen appears

 Step 7 
Click on “Command Prompt” and enter the following command to fix boot issue.
                                          bootsect /nt60 c:

Step 8
Now restart the system, it will boot correctly and windows will work fine.

| T h i n k A n y t i m e |

25 More Tech Tips and Tricks

As a result, everybody, even experts, winds up with knowledge holes—things everybody thinks everybody else knows about the basics of consumer electronics.

When I started writing down the ones I figured everybody should know, my column was twice as long as it’s supposed to be. But hey—on the Web, nobody can hear you exceed your word count. I lopped out half of them and saved them for this e-newsletter.

Think of it as “Today’s Pogue Column (Cont’d).”

Screenshots
*Especially if you’re a beginner (or an expert), it’s frequently useful to capture the image of what’s on the screen — an error message or diagram, for example.

*In Windows, PrintScreen key copies the whole screen image, as a graphic, onto your invisible Clipboard, so you can paste into an e-mail message or any other program (“This is what I’m seeing! What do I do now?!”). If you add the Alt key, you copy only the front window.

*On the Mac, press Command-Shift-3. (Command is the key with the propeller on it, next to the Space bar.) You hear a snapshot sound, and you get a graphics file on your desktop—a picture of the entire screen image.

*If you press Command-Shift-4 instead, you get a crosshair cursor; you can draw across just one portion of the screen. Or, if you now tap the Space bar, you turn the cursor into a little camera icon. You can now click on just one window or toolbar that you want to copy.

*In both cases, you can hold down the Control key to copy the image to the Clipboard instead of leaving a file on the hard drive.

E-mail
* If you get a message from your bank or eBay about a problem with your account, it’s probably a “phishing” scam. It’s a fake, designed to lure you into typing your name and password so the bad guys can have it. Delete it. If you’re concerned, visit the institution’s Web site in your browser by typing in its address (like Citibank.com) — not by clicking the link in e-mail.

* Before you pass on any amazing item you get by e-mail—Obama’s a Muslim, the bubble boy wants greeting cards, the Nieman-Marcus $400 cookie recipe — first check it out at Snopes.com, the world clearinghouse for Internet scams and rumors.

* If a blue underlined link shows up in an e-mail message, you can mouse over it without clicking to see what Web site it plans to open.

* If you get a message from someone you know that relates a horror story about being mugged in England (and needing you to wire money immediately), delete it. It’s a popular scam — even if it’s the correct e-mail address of someone you know.

* File too big to send by e-mail? Then use yousendit.com or transferbigfiles.com. You can transmit huge files, using the site as a free intermediary parking space.

Editing Text
* On your keyboard, there’s a difference between the Backspace and Del keys. Press Backspace to delete the typed character to the left of the blinking insertion-point cursor, as usual. Pressing Del, however, removes the character to its right.

* In Microsoft Word, when you paste in text from another document—say, a Web site — you may not want all the boldface, colors, fonts and other formatting from the original source. Instead of using the regular Paste command, in that case, open the Edit menu and click Paste Special. Click Unformatted Text. You’ll get just the text, without the fanciness.

iPhone
* You can magnify the iPhone’s screen, for ease in reading tiny type, by double-tapping with three fingers. Then pan around by dragging with three fingers.

Of course, you first have to turn this feature on. Do that by tapping Settings, then General, then Accessibility. (On the same screen, you’ll find an option to make the text bigger in the built-in iPhone programs, which is handy in its own way.)

* Has your iPhone screen image suddenly become mysteriously enlarged? There’s nothing quite as alarming as seeing jumbo text and graphics, and nothing restores the phone to the way it’s supposed to be.

I can’t tell you how many people trek off to the Apple Store to get their “broken” iPhones fixed. Of course, the real problem is that you’ve accidentally turned on screen zooming (described in the previous tip). Double-tap with three fingers to restore the screen magnification.

Other Cellphones
* When your phone starts ringing, you can silence it quickly by pressing any key on the sides. (It’s still ringing — you can either answer it or let it go to voicemail — but at least you’ve cut the sound.) That’s good to remember when you’re someplace where phone silence is golden: for example, at a concert, in surgery or in church.

Web
*Don’t reach for the mouse to go back to the previous Web page. Just tap the Backspace key. (Alt+left-arrow key also works for Back, and Alt+right-arrow for Forward. In this article, if you have a Mac, substitute the Option key for Alt.)

* After you type a word or phrase into a Search box, don’t click the Search button. Just press the Enter key.

(The Enter key also works to click “Go” after you’ve typed an address, or the highlighted button, like “O.K.” or “Print,” in most dialog boxes. Yes, there are people who don’t realize that.)

* On brand-name Web sites (eBay, Facebook, Amazon and so on), click the upper-left logo to return to the site’s home page.

* At translate.google.com, you can choose languages you want to translate from and to. Then you paste in some copied text (or the address of a Web site). In a flash, the text is translated — roughly, to be sure, but at no charge.

* Who needs a dictionary? In the Google search box, type “define schadenfreude” (or whatever the word is). Press Enter.

Computers
* The Esc key (top left of the keyboard) means, “close this” or “cancel this.” It can close a menu or a dialog box, for example.

* You can duplicate a file icon (instead of moving it) if you press the Alt key as you drag it out of its window.

* You can switch among open programs by pressing Alt+Tab (or Command-Tab on the Mac). On the Mac, the much less known Command-tilde (the ~ key, upper left corner) switches among windows in a single program.

Mac Specials
* Anything you can print, you can turn into a PDF document — an amazingly convenient feature. Choose the Print command — but instead of choosing Print, click the PDF pop-up menu and choose Save as PDF.

* It’s often very useful to have a document, Web page or e-mail message read aloud to you — to “proof-listen” to it, for example, or just to listen to an article while you’re getting dressed in the morning. In the Speech pane of System Preferences, turn on “Speak selected text.” Click Set Key to choose a key combination. Pressing it makes the Mac read anything on the screen, at the rate, and in the character voice, that you’ve specified.

How to Improve Your PC’s Speed for Free in Seven Easy Steps

Does your computer start up slowly? Do applications run slowly and hang all the time? Do you want to get rid of these problems for free? These steps here will probably help you resolve your problems.1. When you turn on your computer, ensure that there are no media (discs) in the ROM drive or any attached USB devices. Having any of these causes the computer to start slowly as it tries to read them for possible boot options.2. Disable startup programs such as Windows Sidebar and any programs which are installed that run at startup. These programs cause your computer to boot slowly as it has to load them before you can begin to use your computer. To do this, run Windows Defender. Click on Tools and select Software Explorer. Click on the category button to display Startup Programs. Click once on the displayed programs to see which are available for disabling and disable them. You can also disable programs that run at startup by running them, and ensuring that the “Run At Startup” option is not checked or allowed.

3. Click on the battery icon on the taskbar in the lower right-hand corner of your screen. This displays the power options menu. If “High Performance” is not selected as the power plan, select it. This power plan maximizes system performance.

4. End application processes which are not in use at a particular time. These processes compete with the programs you are running for available computer memory and speed. Such processes include Bluetooth, dictionaries, search bars etc (you can always restart them when you need them by running the applications again). To end processes, open the Task Manager. There are several ways to do this:

a. Press Ctrl + Shift + Esc. This is the quickest way.

b. Right-click on the taskbar and choose Task Manager from the menu.

c. Press Ctrl + Alt + Delete and choose Start Task Manager from the options that appear.
In the Task Manager, click on the Processes tab to display currently running processes and right-click on the process you want to end. Select End Process or End Process Tree to end that particular process. If you are not sure what process it is, read the descriptions that accompany each process.

5. Disable the Windows Aero color scheme (this is the functionality that gives your computer interface a transparent, glassy look). Windows Aero consumes computer memory and it is advisable to switch to another color scheme which uses less computer memory if your computer is running slow. To do this, right- click on an empty position on your desktop window and select Personalization from the menu that appears. You can also open Personalization by clicking on the Start button and selecting Control Panel and then clicking on Personalization. Under Personalization, select Windows Color and Appearance and choose another option such as Windows Vista Basic or Windows Classic.

6. Defragment your hard disk regularly. As data is added, changed and deleted from your hard disk, it creates non-contiguous portions of data (spaces usually occur where data has been deleted and changes made to data are saved in locations different from the original files). This is known as fragmentation and causes your computer to work harder to find a particular piece of data. This tends to slow a computer down. Defragmenting your hard disk rearranges the data so that it works more efficiently. Defragmentation usually runs on a schedule but you can run the disk defragmenter manually. To do this, click on the Start button and select Computer. Right-click on your primary hard disk (or any other hard disk partitions you would like to defragment) and choose Properties. Click on the Tools tab and select Defragment Now. When the application opens, click on Defragment now.

7. Run Disk Clean Up. This option deletes unnecessary files from your hard disk and frees up space which enables your computer to run faster. To do this, click on the Start button and select Computer. Right-click on your primary hard disk (or any other hard disk partitions you would like to clean) and choose Properties. Click on the General tab and select Disk Cleanup. Select the files you would like to delete, click OK and then click Delete Files to confirm.

Follow these steps and there will be a noticeable improvement in your computer’s speed and performance.

10 Reasons Why PCs Crash you must Know

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1. Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is http://www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.).

4. Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5. Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.

6. Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( http://www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( http://www.symantec.com).

7. Printers

The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.

8. Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from http://www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message “Starting Windows” press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.

9. Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from http://www.computernerd.com or http://www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10. Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Top Five Tips To Keep Your Computer Secure

If your house was like your computer, it wouldn’t come with locks and you could be burgled from thousands of miles away. Obviously, you’d secure your castle before moving in – so why don’t we do the same for computers? Here are our top five computer security tips that’ll help keep the invaders out.

Passwords

Most people know the password to Ali Baba’s cave was, “Open Sesame”, but such predictability is also true with computer users. “123456″ is the most used password, while “12345″, “123456789″, “Password”, “iloveyou”, “princess” and “rockyou” are all in the top-ten. Pick something unique!

It’s also good practice to use different passwords for different websites. This is because if your password is stolen from one website, the hacker might try to use it to access your accounts elsewhere.

Updates

Everyone hates updates – they’re intrusive, irritating and almost constant. Aside from annoying us, however, they’re vital to fix potential security holes.

Your web browser, Windows, OSX, Java and Flash are the most-targeted culprits, so make sure you always accept these updates as soon as they are available. I know, it’s annoying, so here’s a message to developers: stop making us restart our computer to apply an update – we’ll be more likely to do it!

Also, make sure your antivirus software is up-to-date. That includes if your free trial has run-out. No virus protection at all? Shame on you! Norman provides a comprehensive security package (Norman Security Suite PRO), but even if you’re with someone else, remember to update!

WEP Wifi

If you’ve bought a new router in the last three years, feel free to ignore this section. Otherwise, you should check the security settings on your wifi.  Hopefully, you’ll be on WPA or WPA2 – these are up-to-date security formats and you’ll be okay (although WPA2 is much better than WPA).

If it says WEP, however, it’s time to upgrade. WEP is an ancient technology that can be hacked in around 30 seconds. Oh dear. You might be able to change to WPA on the router, but most likely we’re talking about a trip to the shops.

Internet Cafes and Public Wifi

Some people need caffeine to help them through the day, others need the internet. Luckily, internet cafes provide both. Unluckily, each time you log-in to one with your own computer, you’re putting it on a strange network that’s accessible by people you don’t know.

Your non-HTTPS data is particularly at risk from snooping, which means people could read your Facebook communications. For Facebook, you can add HTTPS in your account settings, but other traffic may be less secure. Remember: don’t bank in public.

Backups

Should the worst happen, backups are the only way of getting your computer back to exactly how it was. You can do this useful by transferring files onto an external harddrive, or use an off-the-shelf solution like Norman’s (Norman Online Backup) to do all the fiddly-bits for you.

The (somewhat dramatic, I admit) question I ask is – if your house burnt down, and you could restore it with a couple of mouseclicks – would you do it?

 | DIGITAL LIFE • http://www.cubesquare.co.cc

Keyboard Shortcuts For Computer System

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + “web address” = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows
ALT, Space, X = Maximize window
CTRL + Shift + Esc = Task Manager
Windows key + Break = System properties
Windows key + F = Search
Windows key + D = Hide/Display all windows
CTRL + C = copy
CTRL + X = cut
CTRL + V = paste

Also don’t forget about the “Right-click” key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you’ve opened up any program.

Keyboard Shortcuts
[Alt] and [Esc] Switch between running applications
[Alt] and letter Select menu item by underlined letter
[Ctrl] and [Esc] Open Program Menu
[Ctrl] and [F4] Close active document or group windows (does not work with some applications)
[Alt] and [F4] Quit active application or close current window
[Alt] and [-] Open Control menu for active document
Ctrl] Lft., Rt. arrow Move cursor forward or back one word
Ctrl] Up, Down arrow Move cursor forward or back one paragraph
[F1] Open Help for active application
Windows+M Minimize all open windows
Shift+Windows+M Undo minimize all open windows
Windows+F1 Open Windows Help
Windows+Tab Cycle through the Taskbar buttons
Windows+Break Open the System Properties dialog box

acessability shortcuts
Right SHIFT for eight seconds…….. Switch FilterKeys on and off.
Left ALT +left SHIFT +PRINT SCREEN……. Switch High Contrast on and off.
Left ALT +left SHIFT +NUM LOCK……. Switch MouseKeys on and off.
SHIFT……. five times Switch StickyKeys on and off.
NUM LOCK…… for five seconds Switch ToggleKeys on and off.

explorer shortcuts
END……. Display the bottom of the active window.
HOME……. Display the top of the active window.
NUM LOCK+ASTERISK……. on numeric keypad (*) Display all subfolders under the selected folder.
NUM LOCK+PLUS SIGN……. on numeric keypad (+) Display the contents of the selected folder.
NUM LOCK+MINUS SIGN……. on numeric keypad (-) Collapse the selected folder.
LEFT ARROW…… Collapse current selection if it’s expanded, or select parent folder.
RIGHT ARROW……. Display current selection if it’s collapsed, or select firstsubfolder.

Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog

internetbrowser
type in u’re adress “google”, then press [Right CTRL] and [Enter]
add www. and .com to word and go to it

 

more at DJ Nykeh

7 Steps to Securing your Home Wireless Network

The benefits of home wireless network are amazing. From the ability to be out in the backyard working while the kids are swimming in the pool, to not having to run cables all throughout the house for your network connectivity; the list of benefits are outstanding. I wouldn’t go back to a wired home network unless I absolutely had to.

However, what many people may not realize is that a wireless network can be an open door to others having full reign on your personal data.

A few simple steps can be taken to provide the best method of security on your home wireless network.

Use this as a guide for building a new home wireless network, or as a way to take inventory of where your existing home wireless network stands.

1) Router/WAP Password

As soon as you get your Router / WAP (Wireless Access Point) immediately change the password. Most of the common Router/WAP products today will have default passwords assigned that are well known and publicized. Choose a strong password for this device.

Here are a few tips on choosing a good password:

  • It should be at least 6 characters long
  • It should have a mixture of upper and lower case characters
  • It should have a mixture of numbers, characters and/or punctuation marks
  • Try to use uncommon words for your password

2) Protect your Wireless Network with Encryption

Always use WPA-TKIP encryption. Wifi Protected Access (WPA) is the new security standard adopted by the Wife Alliance consortium. The older “WEP” encryption has many weaknesses. Using WEP is like closing the door but not locking it.

You will need to be sure that both your router/WAP support WPA-TKIP as well as all of the wireless network interfaces on all of the devices attaching to your wireless network (Desktop, laptop, printer, etc). Some of the older network cards may only support WEP. Do yourself a favor and upgrade to better card.

3) SSID Best Practices

The SSID can be thought of simply as the network name. You should be sure to change this name from the default name that came with your router/WAP. Making the name something that is not common is a good practice.

You will likely also have the option of either broadcasting or not broadcasting your SSID. The most secure method for a home network would be to NOT broadcast the SSID. It just makes it that much more difficult for a hacker to gain entrance to your network.

If you do not broadcast your SSID you will just need to manually configure the SSID properties on your client computers.

4) MAC Address Filtering

Some router/wops have the ability to set it such that only specific network hardware addresses can have access to utilize your home wireless network. This is done by specifying the exact “physical hardware address” (or, “MAC address”) of the Wireless Network Interface card on the machines you want to give access to.

While this might not make sense if you have a lot of people randomly coming over and wanting to connect to your Wireless network, it certainly gives you an added step in a tightly secured wireless network.

5) Static IP Addresses vs. Dynamically assigned IP Addresses (DHCP)

DHCP (Dynamic Host Control Protocol) is a tool that allows your router/WAP to assign you an IP address automatically. This does come in handy when you have multiple people on a network that may be constantly coming and going.

However, on a typical home network things are pretty static and there generally isn’t much of a need for DHCP. Turning DHCP off will provide a more secure wireless network environment. With DHCP on there is the possibility for a hacker to allow your router to assign them an IP address and gain access to your network.

When you turn off DHCP you will need to manually assign a static IP (one that does not change) address to all of the computers that will need to use your Wireless Network.

6) Utilize the Firewall Features of your Router/WAP

Most Router/WAP devices today come with a Firewall feature that can either be enabled or disabled. Be sure the Firewall Feature is enabled. It surprises me how many people miss this very basic step.

7) Do not connect to any other open Wireless networks

I know it can be tempting at times to search for other available wireless network and connect to them for internet connectivity. The truth is, unless you have been given specific rights to do this, it is illegal practice. Not only that, but when you join your computer on another wireless network you become a target for others on that network to hack into your computer.

Following the above 7 steps will do you a lot of good in a world where hackers strive to find weaknesses to exploit.

Window xp Decrease your Applications startup time

Image representing Windows as depicted in Crun...

By default, Microsoft includes the /prefetch:1 switch to speed up it’s Windows Media Player application start time. This switch can be used for other Windows applications and also many third party programs.

Example #1
You have AOL 8.0 installed on the computer. Complete the steps outlined bewlo to add the /prefetch:1 switch to AOL’s Target path.
1. Right click on the AOL shortcut and select properties from the menu.
2. In the Target: Field add the /prefetch:1 switch to the very end of the path, like this: “C:\Program Files\America Online 8.0\aol.exe” /prefetch:1 and then click ok.
Now start AOL. It would load at least 50 times faster than ever before.
Example #2
1, Go to the Start button/All Programs/Accessories/System Tools
2. Right click on System Restore and select properties from the menu that appears. Add the /prefetch:1 to the Target Path entry so it looks like this %ystemRoot%\System32\restore\rstrui.exe /prefetch:1 and click ok.
Now System Restore will start immediately when executed.
Note: This switch will only work with some programs. Others will return a message saying the program in the target box is invalid. Just remove the switch
 | DIGITAL LIFE – http://www.cubesquare.co.cc

Protecting Your Computer

Malware logo Crystal 128.

Protecting Your Computer

In a nutshell this is what you’ll need to keep your computer humming along:

  1. Have some kind of anti-malware protection on your computer and keep it current. While many new notebook computers and PCs come with trial anti-malware software, it is up to you to keep it current (for a price). There are, however, free alternatives.The foremost among them is Microsoft’s own Security Essentials. It doesn’t come with Windows, but can be easily downloaded and installed. Other free programs include the popular AVG; AVast, Avira and BitDefender (they have paid versions as well) while the usual suspects round up the paid products: MCAfee, Norton, Panda, Kaspersky and Trend Micro. This is not an exhaustive list by any means as there are many other free and paid programs that can be used.
  1. Keep your computer up to date.You can rely on automatic updates, but to be sure that nothing is being missed you may want to manually run updates from time to time – particularly on the Operating System and the Web Browser.For example, in Windows Vista and 7, click on Start button and in the search box type in Windows Update – the first program listed will be the Windows Update program. Click on this and check if you have any updates to run. In XP, go into the Control Panel and click on Windows Update there.With the browser, if you are running Windows Explorer, your Windows Update will update that. With other browsers, check their help files for how to update them. Besides that, also be sure that you have your firewall up and running.
  1. Don’t fall for bogus phishing scams, fake anti-virus scans, software from “nowhere.” Because of increased protection, malware programmers are hitting the most vulnerable target in the chain – you. If they can get you to install the program from a fake anti-virus scan that pops up while you’re surfing,a bogus link in your e-mail, in your messenger or on a website then they get by all those protections that have been carefully laid in place. Just don’t do it.

OK – you got “something” – Now what?

No computer is perfect – even with all your protections in place, something may slip through. If something does, there are things that can be done to minimize damage and risk.

  1. If you have access to a second computer, download onto a flash drive some tools to scan and hopefully fix your PC. Typically you can grab one or two antivirus programs available (I’d recommend AVG or AVast mentioned earlier) and a good, free anti-spyware program (I highly recommend Malwarebytes). Install these on the infected computer and run a full scan on the computer. Depending on how bad the infection is, you may need to pull the computer off the Internet while running these scans.If you can get to the Internet, then be sure to get the latest updates for these programs. You may also look into running either Panda’s or Trend Micro’s online scanner programs. Be sure to scan ALL drives.
  1. If you have second computer or the infected computer has access to the Internet – then simply look up your computer’s symptoms online to see what other people are seeing and possible ways to fix it. There will be some dead ends, but often you can find out what is causing you the problems as well as how to fix it.
  1. After all the scans, run the more advanced tool, HijackThis from Trend Micro (a free tool) to see exactly what is running. HijackThis also gives you the ability to manually remove items as well.While you are at it, you can also run Trend Micro’s other free tools, RUBotted and RootkitBuster. If you cannot make heads or tails of the log files from HijackThis, there are many sites out there that will help you with it.
  1. If all else fails, you can always format and restore your PC back to the original configuration.

What about everyone else?

What about other Internet connected computers and devices that aren’t Windows based? Are they vulnerable to malware? You bet that they are!This includes Linux; FreeBSD; OSX and UNIX based computers; Android; BlackBerry; iOS; Microsoft and Symbian based SmartPhones/devices. Is there anything that you can do to protect yourself here?There is.

Besides making sure that you are up-to-date on all the latest software patches, just know what kind of software and apps you are loading. Many companies, such as Symantec and others, are now making security software for these other non-Windows based operating systems and devices.

While there hasn’t been widespread infections in the past – it doesn’t mean that they won’t be the target in the future – remember, there is no such thing as a perfect, invulnerable OS.Of course, it’s up to you if you to do this if you think you may need protection on these other items.

Wrapping it up

Keeping your PC safe isn’t rocket science. It involves keeping your security software, operating system and other software up-to-date; watching what gets installed on your computer and knowing what to do if something gets through. When it comes to security, no one tip can possibly cover everything. So, we open this up to you too – what do you use personally to keep your computer safe.

| DIGITAL LIFE – http://www.cubesquare.co.cc

Essentials to Carry in Your Laptop Bag.

For the Geek on the go, there are essentials that you need! Last year Tech Tips covered some of these essentials with “Must-Have Tech Gear To Maximize Productivity Outside The Office”. In this week’s Tech Tip, we are going to cover some of the essentials to carry in your laptop bag as well as offering some guidance for picking the right laptop bag for your life on the go.

The most basic essential

Laptop Bag EssentialsChoosing just the right laptop carrying case could be called getting the most basic essential accessory for your laptop. While there is a wide array to choose from, you can narrow down your search by thinking about how you’ll use your bag. If you are a student, then perhaps a laptop backpack would be your style. Is it essential to protect your laptop from unforeseen accidents, then maybe an aluminum notebook case would be your style. Do you just need your laptop lightly protected but easy to carry? Then look at one of the sleeve options. There is also the basic laptop bag – inexpensive, easy to carry and stow away, but that gives your laptop good protection. These come in a variety of materials, from simple nylon to nicely appointed leather. For the traveling set, there are upgraded luggage type bags – complete with wheels and travel handle as well as TSA approved bags for the jet setting Geek.

Laptop Bag Essentials

Whatever bag you get, be sure that it fits your needs. Is it large enough for your laptop (or perhaps too big?). Will it fit all the extra goodies that you want to bring along? If you have an eBook reader or tablet, does it have a special compartment that can easily accommodate and protect this device as well? Does it include accessories such as a shoulder strap, or it is lockable? All these need to be considered for getting “just the right bag.”

Some more obvious essentials

Some of the more obvious essentials to have include three mentioned in the Must-Have Tech Tip as well as a few others:

  1. Mouse with nano receiver.
  2. USB flash drive.
  3. Power strip.

In addition to those essentials, some others would be:

  1. Laptop Bag EssentialsPresentation pointer (some mice, such as HP Bluetooth credit card mouse, have a built in presenter).
  2. Mini Bluetooth module (if your laptop doesn’t already have Bluetooth).
  3. 3G or 4G modem (if your laptop doesn’t have built in 3G) or in lieu of that:
  4. A cell phone device that acts as a Wi-Fi hotspot (such as Verizon’s MiFi service). This is a great service to have on long road trips where there may be multiple devices that can connect to the Internet.
  5. Noise canceling headphones – be sure that you get one that easily folds down for traveling.

Some less obvious essentials to have in your laptop bag are:

  1. Identification (like a business card) in case your bag is lost.
  2. Some kind of tracking software on your laptop (much like BlackBerry’s Protect or Apple’s Location services for iPhone/iPad). There are software options that can be used to help locate a misplaced or stolen laptop (such as Lojack for Laptops).
  3. Spare battery (but not if you are planning to fly).
  4. Laptop Bag EssentialsAutomobile cigarette lighter DC power cable for laptops or automobile power inverter (also great for long trips).
  5. Laptop travel mat – some kind of surface that allows the laptop to stay put but keep the fans clear and the heat away from you.
  6. Essential cables. Think how you are going to use your laptop – are you going to need a cable to connect to a projector or HDTV. Will you need a cable to connect your camcorder or cell phone? Will you be staying at a hotel that only offers wired Internet, and need an Ethernet cable? All things to think about when looking for items to include in your case.
  7. Cleaning cloth for the screen (even if it is not a touchscreen). Be sure that you get one that is safe for LCD screens.

In conclusion

There are a myriad of essentials and must-haves that you can get for your laptop bag. With this Tech Tip we have looked at the bag itself, some of the must-have essentials to the not so obvious essentials. We encourage you to plan ahead when traveling with it and we hope that this Tech Tip helps gives you some good ideas on what essentials you’d most like to have in your laptop bag.

Why You Should Use A Random PIN

There’s safety in numbers – but only if your PIN isn’t your birthday or one of 100 commonly used examples. In fact, according to research by Cambridge University, using your birthday means that there’s an 8.9% chance a stranger could guess your PIN in three attempts.

This means that if everyone was to use their birthday as a PIN (and, thankfully, only around 7% of us do), thieves would be able to get into our accounts once every 11 tries.

The results showed that 84% of PINs for iPhone’s and banks used random or “pseudo-random” numbers. This is the safest type of PIN available, so if you’re issued a random PIN, you should really keep it.

For the non-random PINs, 23% of us use dates – with 29% using their own birthday. Romantically, 26% use their partner’s or a family member’s birthday. 9% use a pattern on the keypad and 5% use a numeric pattern such as repeated numbers.

The problem for the 29% that use their own birthday is that their bank card is usually found in their wallet, alongside information that reveals their date of birthday (such as a driver’s license). In fact, 99% of survey respondents reported keeping their bank card in their wallets along with a card that revealed their birthday.

This means, to quote Cambridge, “if an attacker knows the cardholder’s date of birth and guesses optimally, the chance of being successful is nearly 9%.” That’s pretty high!

Luckily, for the majority of us that use the randomly-generated PIN the bank issued, there’s only a 0.03% chance that the attacker will be able to guess our pin in three attempts. Phew.

I think there’s one oversight here, however – what if your random PIN is accidentally the same as one of the most-common PINs, like 1234? Then you’re back in the high-risk area of having your PIN guessed.

The guys at Cambridge suggest banks could use the following PIN blacklist to prevent the use of these predictable numbers. Until this practice is wide-spread, however, I suggest that you read the list below, and if you PIN is in it, change it!

0000, 0101-0103, 0110, 0111, 0123, 0202, 0303, 0404, 0505, 0606, 0707, 0808, 0909, 1010, 1101-1103, 1110-1112, 1123, 1201-1203, 1210-1212, 1234, 1956-2015, 2222, 2229, 2580, 3333, 4444, 5252, 5683, 6666, 7465, 7667.

Install A New Hard-disk

English: 5.25 floppy disk drive

Running out of hard disk space, yet also want to keep all the files that are currently on the system in perfect order? Install an extra hard disk, and see your available space rise!

Firstly, make backups of your existing system files. You may never know when these may come in handy. If your current hard disk may go down the pan, you’ll be glad to have something to start with again. Also, if you want to use all your data that is on this drive, back it up anyway; ready to be transferred to the new drive. Also, create a system disk for your PC. This can be created by going to Control Panel > Add/Remove Programs, and then the “System Disk” tab. The instructions should be there for you. “WHEN I INSTALLED MY EXTRA HDD I DDNT FOLLOW ANY OF THE ABOVE MENTIONED….INSTEAD JUST OPEANED THE CABINET AND LOOKED FOR THE WIRES AND CONNECTED THEM …ANY ONE CAN TELL WHERE THE CORRECT WIRE GOES ….. THE MAIN THING IS TO MAKE SURE THAT THE BROAD THIN GRAY WIRE OR DATA CABLE SLOT WITH THE WORD ‘P2’ IS CONNECTED TO THE EXTRA HDD”
Once you are prepared on the software side, turn off your PC and open the case to your PC (Please take proper precautions at this point. Anti-static wristbands and other such devices should be used. If you don’t have these, just make sure you are properly earthed, and know what you are going to do. Oh, and please turn off the PC properly. I don’t want you dying on me, literally!). The hard disk is the metal box shaped thing that is either the size of the floppy drive or it could be the size of the CD-Rom drive. It should be easy to spot, because it might even say “Hard Disk” on it. At this point, look and see where you can put the new drive, and how you are going to connect it up. If there is no hard drive in there, then don’t worry; I’ll explain how to connect it up as well.
Look at the end of the HDD. It should have a load of sockets and pins for you to play around with. At one point, you should be able to see some pins with some jumpers attached, and a sticker on another side telling you what configuration of jumper positions means what to the computer. If you are attaching it to the same IDE cable as your existing drive, then set it to “Slave”, otherwise, select “Master” and fit it as close to the start of the cable as possible (The start of the cable being where it’s connected to the motherboard). This cable is an “IDE” cable, and can only be fitted two ways to the drive itself. Look for an indication as to which side pin number 1 is (Look for stickers again!) and insert the IDE cable in that socket and pins, with the red side as close to pin 1 as possible. Then, just fit it into the computer, as you would do any other drive (For the thickies, which means attaching it to the case using the mounting screws that should come with the PC. Before you do this though, note down the extra information on the top of the drive, usually the number of cylinders, heads, sectors, and any other information. Next, connect one of the power cables to the HDD (These are the 4 cable collections with connectors attached, which leads from the power supply unit), and close the PC case.
Next, you will have to mess with CMOS. Turn on the PC, and hit whatever key you are told to at the bootup to get to the CMOS menus. When in there, choose the relevant section (We can’t say exactly, because there are many different CMOS set-ups around) and select “IDE Auto-detection”. If the hard disk does not appear on it, then you will have to enter the information manually. Use the notes you collected from the top of the hard disk earlier to tell the computer what the hard disk is.
IMPORTANT:
Afterwards, insert the system disk(“THE BACKUP DISK THAT CAN BE CREATED BY RIGHT CLICKING A DRIVE4R AND SELECTING FORMAT AND THEN THE CREATE BACKUP DISK OPT”) prepared earlier and “Save” your editing of the CMOS and exit. The system disk should work instead of the original hard disk (Or if you are installing from scratch, then it will boot from the A: anyway).
Type “fdisk” at the dos prompt. This runs a program called, surprisingly, FDISK. Tell the computer which drive ie the harddisk is the new one (Please choose the correct one at this point. Make a mistake, and you really could be using those backups!), and then tell it what partitions you want (Don’t worry about it, as there are full instructions while you are running the program). Once this is done, you can reset your PC (Except if this drive is being installed from scratch and is on it’s own. If this is the case, then you can format the drive by typing “format c:” This will format the drive for you, but what’s really good is if you type “format c: /s” instead, as this installs some important files at the same time. Then, just follow the instructions to install whatever OS you are going to use.)
If you are adding this drive as a second HDD, Go into Windows (Or any other OS, but the instructions may be different!) and then format from “My Computer” like you would a floppy disk. There you go: A newly installed hard disk, with minimum effort!….and dont take the risk of formatting any of the drives u know!!!! if in doubt contact me here or don’t do at all………”SOD will not be held responsible for any data lost in this process”

Microsoft Demos Office 15 & Windows Live Metro

Windows President, Steve Sinofsky’s article about Windows 8 on ARM, Microsoft shared a video demonstrating how the product looks as of now. During the demo, Microsoft showed what Office 15 will look like on a tablet and the Metro version of Microsoft’s Windows Live suite of applications. Here are the screenshots:

Microsoft Office 15 Word

Microsoft Office 15 Excel

Microsoft Office 15 PowerPoint

Microsoft Office 15 OneNote

Windows Live Calendar

Windows Live Metro Photos

Windows Live Metro Mail



How To Fix The Common Problems In Internet Explorer 8

Internet Explorer may not be the favorite browser among geeks, but sadly, it is still the most widely used browser in the World. In this article, let us take a look at the common problems in Internet Explorer (IE8 specifically) and its fixes.

Some of the common problems seen in IE8 include:

  • You have more toolbars that you desire. Some of them are uninstallable.
  • The browser does not go to the website you want it to go. You type a web name, press Enter. It brings you to another site that is full of ads.
  • Your searches doesn’t look normal. You are being redirected to another search provider.
  • The home page changes without our knowledge.

If you are experiencing one of the above, don’t be alarmed. Here are the ways to fix them.

1. Remove Uninstallable Toolbars

Occasionally, when you install a new program and you didn’t read the fine print, it will automatically install toolbar(s) in your IE. These toolbars are often annoying, disruptive and take up valuable screen estate. In most cases, you can uninstall them via the Add/Remove Program panel, but there are times when they are very persistent and refuse to disappear from your browser.

In this example, we are going to uninstall the Alexa toolbar (this is only for illustration purpose. in no way did I mean that Alexa toolbar is not useful). The tool we are going to use is Autoruns.

Autoruns is a tool designed by Mark Russinovich and Bryce Cogswell, you can download the program using this link: Autoruns for Windows

This tool can configure what programs run during startup. It can also be used to find out what plugins are installed in Internet Explorer.

To use the utility, run the application as Administrator:

Autoruns classify the objects, basically dynamic link libraries and programs, using different tabs. Just go to “Internet Explorer” tab:

In the screenshot above, we can see that the tab is split into three groups.

  • First group contains the browser helper objects. They are plugins designed to provide a new functionality.
  • Second group is a list of the toolbar in the browser
  • Third group are extensions.

In this case, we are going to remove the Alexa toolbar. Highlight the entry, right click and select “Delete”.

Done. You have just removed an uninstallable toolbar.

2. Remove Search Providers

If you see an unwanted search provider (as shown in the image below),

Click on the button and select “Manage Search Providers“.

Internet Explorer doesn’t allow you to remove the default provider, so before you can remove it, you have to set another search provider as the default.

Now you can remove “Alexa Web Search“.

3. Reset Internet Explorer Settings

If all the tricks don’t work, the ultimatum is to reset your Internet Explorer to its default settings.

Using the search function in Windows 7, search for “internet options“. Alternatively, you can also access the Internet Options from the browser File menu.

Now go to the “Advanced Tab” and select “Reset“:

You need to quit all browser windows before using this function. You will see a popup window explaining the stuff that are going to be reseted:

This should restore your IE back to its original state.

Do you use any other ways to solve Internet Explorer 8 issues?

Free Applications | Digital Life – http://www.cubesquare.co.cc


Personal Files: Please do not share.

Clean up.exe

    (Make you PC faster and run with Ease)

•• D I G I T A L – L I F E ••