- Watch the installationStay alert during the installation. If you have the option, always opt for the custom installation. You'll probably have a choice of where the program plants its icons. Besides avoiding system tray litter, you can also stop programs from adding icons to the Start menu and desktop.
- Protect your system trayWinPatrol is a free early-warning system that stops unsavory programs, such as Trojans, phone dialers, and spyware, from doing damage to your system or reporting your surfing habits to others. WinPatrol watches for anything that adds itself to the Startup group or Windows Registry, flags suspicious items, and offers to remove nasty programs. In order to remove or disinfect the offending program, you'll still need a spyware removal tool, such as Spybot, and an antivirus program.
- When WinPatrol starts yelling about an unwelcome entry, you can allow the program into your Startup group if it's legit; if you say no, and the program tries again, WinPatrol blocks subsequent attempts. That's especially handy for notoriously insistent programs such as QuickTime, RealPlayer, and MSN Messenger.
- WinPatrol also lets you see a list of Active Tasks, cookies, and Win XP's running Services, and it works with all versions of Windows. In most cases, you can also gain some insight into the applet's source and purpose. For $13, WinPatrol Pro provides an extensive database to further identify what's trying to get into your system tray. The program is available at http://www.oreilly.com/pcannoyances.
- Make a clean sweepStart by hovering the pointer over the icon to identify the application it belongs to -- then decide if the icon needs to be in the system tray. (Most don't. Programs such as RealOne Player, RealPlayer Jukebox, ATI's Video Manager, and AOL's Instant Messenger are typical culprits.) Select Start > Programs ("All Programs" in XP) > Startup to see what's in your Startup group, and you'll probably find a few programs you can dump.
- To dig deeper, use Windows msconfig (select Start > Run, type msconfig, and press Enter) or use Startup Control Panel, a free utility that lets you examine and remove programs that are loaded at startup (get it at http://www.oreilly.com/pcannoyances).
Sunday, June 17, 2007
PROTECT YOUR SYSTEM FROM DUMB INSTALLATIONS!!!
Thursday, June 14, 2007
PROTECT YOUR PASSWORDS FROM HACKERS!!!!!!!!
- A lot, and I mean a lot of people are infected with Magic PS. Especially with Magic PS 1.5 Second Edition. If you don't know what is Magic PS. Magic PS is a trojan, simply a program that steal your Yahoo! Messenger 5 or 6 user name and password to the sender. Magic PS 1.5 SE no longer show itself in the Message Archive, so checking there won't help.
- If the sender is stupid enough, he/she would sent you the file "sender.exe", DO NOT accept it because it is the default name for a MPS created file.
- Check your computer for certain files such as these:
- regsvr.exe in c:\Winnt or c:\Windows ; depends on version of Windows.
- MsAgent32.exe in c:\*Win installed folder*\system 32
- Perflib-Perfdata in c:\*Win installed folder*\System32
- PIF in c:\*Win installed folder*.NTMSJRLN in c:\*Win installed folder*\system32\NtmsData(Sender.exe)
- MPSmmtask0.exe in c:\Documents settings\*User Name*\Local settings\Temp
- The sender.exe (can be any name) file may also contain a text string "UPX-Scrambler RC1.x -> ?OnT?oL". You can see this by using a hex editor, etc.
- MPS 1.5 SE hides the (sender/hacker) Yahoo! ID in the sender.exe file, it is scrambled so even with a hex-editor, you still cannot view it. To reveal the (sender/hacker) Y! ID, simply reverse-engineer the sender.exe file.
- Solution :: Do not receive any executable files from a unknown person on chat.
2: BY using fake login screens.
They ask you to have a look at their picture by sending a link to yahoo fake login screen. It exactly look like mail.yahoo.com page or photos.yahoo.com page.It will ask you to enter your ID & password to login. If you enter your details those login details directly goes into hackers inbox. So be careful of these kind of attacks.
3: Cracking passwords By using Yahoo Password Cracker.
There are many Password crackers out for cracking Yahoo passwords.If you are using a dictionary based password like ? something, 12345, abcdef, Attitude, etc? It takes hardly 3 hours for a good cracker to crack the password.
Solution : Never use dictionary based passwords. Use a password like this..Example : (Sec*)Pass+) . This kind of passwords are impossible to crack
Friday, June 8, 2007
HOW TO REPAIR XP AND AVOID A FULL REINSTALL!!!!!!!!!!!
- While this may seem like very little comfort when compared to XP's many shortcomings, these tips can often keep a bad day from getting a lot worse, if you know what I mean.
- Let's start by looking at some tips and utilities for dealing with XP issues before jumping into a XP reinstall.
- Last known good config: Always the easiest to try first before settling for a reinstallation of Windows XP. Reboot the PC and tap F8 while you wait for boot options to be displayed for you. Once there, choose "Last known good configuration."
- System restore: In some cases, a reinstallation can be avoided by using system restore. If you are unable to get system restore to work from within safe mode, you can try to access it from within a command prompt. You do not need to leave safe mode to do this, just follow these instructions closely:
- Reboot into safe mode with a command prompt.
- Get to an administrator account so that you have the needed permissions to get things done.
- At the command prompt, type: %systemroot%\system32 restore strui.exe
- Follow the instructions to restore your PC to an earlier state of operation.
- Recovery console: The XP recovery console can be a very useful utility when employed with care. There are a variety of situations where having access to it can be really handy. In fact, you need to get access to it before we go any further.
- Reboot from the Windows XP CD. Once you arrive at the welcome screen, choose "R" for recovery.
- You will be asked which Windows installation you wish to access. Choose the appropriate number.
- Now a prompt for your administrator password will appear. Enter it and continue (if no password, press enter).
- Now we are ready to roll up our sleeves and get to work. While at the console, you can type help for a list of available commands that are at your disposal. For example, you can repair a messed up boot sector by typing FIXBOOT and then typing enter afterward. If you are having difficulty booting up because of a messed up ntldr file, however, then you might need to replace it by typing:
- COPY E:\i386\NTLDR C:(Keep in mind this is assuming that E: is the correct drive letter for your CD ROM drive). Once you have repaired what you have needed to from the recovery console, simply type EXIT at the prompt to leave and restart Windows.
Boot from your XP installation CD.
- At the welcome screen, choose enter.
- Once at the license agreement, press F8.
- At the next screen, choose to repair the selected Windows XP installation by pressing R.
- The files will begin to install and then your PC will reboot. During the reboot you will be presented with option of booting from the CD again by pressing any key. Don't press anything. Allow it to finish the install without booting from the CD again.
- Full reinstallation of Windows XP: If all else fails and you are ready to completely delete everything on your hard drive, then you are ready to do a full reinstallation.
- You will be erasing everything, so make sure you already have a backup of any important data before you continue. Follow the instructions above 'til you arrive at step 4. At that point, choose to continue installing a fresh copy of XP on your system and NOT the repair option. Black Viper has a great walkthrough that will take you step by step through the nuances of setting up your partitions, formatting, etc.
Sunday, June 3, 2007
CONVERT CASSETTE TAPES TO CD!!!!!!!!!!
HARDWARE:"Cassette Deck ,Computer With Sufficient Harddisk (to store the .wav files) and RAM (to edit and process the files), CD Writer, Soundcard Interconnect cables for connection between the cassette deck and the soundcard, SOFTWARE"
Noise Reduction Software or Plug-in (Optional)
CD Authoring Software
CONNECTIONS & PROCEDURES:
- Connect the LINE OUT of the Cassette deck to the LINE IN of the Computer Soundcard
- Select the soundcard as the prefered recording device (under control panel - multimedia icon)
- Ensure the LINE IN Fader on the audio mixer of the computer is not muted
- Launch the audio recording software
- Depending on the software used, activate and check all the settings to allow recording
- If possible, monitor the incoming signal from the cassette deck using the audio software to ensure the incoming signal is not clipping (Too Hot; Levels Too High)
- Set the appropriate levels for recording and rewind the cassette tape.
- Activate the recording on the computer and playback the cassette tape
- Once the material on the cassette tape has been recorded into the computer, save the material as .WAV format and edit the wave files accordingly.(Break them up and save them into the individual tracks; process the files with the noise reduction software; edit out the unwanted parts; etc.)
- When all editing have been completed, the number of .wav files should correspond to the number of songs on the cassette, unless some songs have been omitted.
- Next, close the audio recording software (Be sure to save all your work) and launch the CD authoring software.
- Select for audio CD writing and import the .wav files and arrange them according to the sequence required (Exact procedure of import would be dependent on the software used)
- Load in a blank CDR disc and write to the disc using disc-at-once mode and finalized as a CD-DA format (Exact procedure of writing would be dependent on the software used)the computer, audio recording software and noise reduction software, your editing skills, etc.
Chose a good CDR disc to ensure durability and intergity of the disc.
Try with different brands to see which works well with your CD writer and can playback on your CD Player.
Remember that the limit for a regular CDR is 74mins of audio or 650M byte of data.
If you use a 80mins CDR disc, make sure both the CD writer and CD authoring software supports it.
There are many software out there, some are specifically for recording or CD authoring while others are an all-in-one solution.
Pick one that is most suitable to your needs, applications and budget.
Ultimately, the quality of your end result will depend on several things such as the inital sonic quality of the cassette, the quality of the soundcard used, the power and flexibility of
Saturday, June 2, 2007
WHAT CAUSED MY BLUE SCREEN OF DEATH(BSoD)!!!!!!!!!!!
- Firstly, when your system crashes, by default it saves a file to your hard drive with quite a bit of information. Those files are called Dump Files and they are located in the C:\windows\minidump folder. The files are created using either of these two naming conventions:
- Minixxxxxx-0x.dmp where xxxxxx is the date the system cashed and -0x corresponds to the number of times the system crashed that day. The higher the -0x number the more recent the crash.
- Dumpxxxxxx-0x.dmp where xxxxxx is the date the system cashed and -0x corresponds to the number of times the system crashed that day. The higher the -0x number the more recent the crash.
Let's start decrypting the info found in the dump file.
- First, we need to download and install the Microsoft Debugging Tools from here: U WANT TO BE MICROSOFT DEBUGGING TOOLS : Post Your Mail ID to following this Link http://www.blogger.com/email-post.g?blogID=838102387059097317&postID=5696605637935079135
- After installing we open the Debugging Tools by going to the Start menu > Programs > Debugging Tools for Windows > windbg . When the Debugging Tools for Windows program opens click on File then Symbol file path. Put this in the text box: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
- Now click the OK button. Now we open the dump file by clicking File then Open Crash Dump. We browse to the C:\windows\minidump folder and choose the dump file we would like to look at. When it's done loading you'll see the words "BUG CHECK ANALYSIS" in an * box.
- In the text box below (to the right of kd>) type in !analyze -v to get a word-for-word output of the error. Once it is completed look for the section the text right after "BUG CHECK ANALYSIS". There you will have some words with underscores in between each word. Sort of like IRQL_NOT_LESS_OR EQUAL. That will help you find a solution to your problem. Also, scroll to the section IMAGE NAME: . The words after that will tell you what file caused the error.
RECOVER DELETED FILES!!!!!!!!!!!
- The first step is to make absolutely sure that it has been deleted. Open your Windows Recycle Bin and double-check. Is it in there? If so, simply right-click on the file and choose Restore.
- If you have emptied your recycle bin since deleting the file or folder you need, you still have an option, though. Restoration is a free utility that can search your computer for deleted files. Recovering them is a snap. And you don't even have to install the program - it can run from anywhere, including thumbdrives or CD-ROMs.
U WANT TO BE DOWNLOAD THE RECOVER DELETED S/W: Post Your Mail ID to following this Link http://www.blogger.com/email-post.g?blogID=838102387059097317&postID=215922876132193471
- After you have downloaded the file, double-click the icon and it will extract itself into a folder. Open the folder (it will probably be called something like REST.Zip) and double-click the icon that says Restoration. You should see a screen similar to this one:
- Now, you can click the Search Deleted Files button, and it will display every file on your PC that was deleted and might be recoverable.
- Note: Files removed from your recycle bin MAY NOT have the same name as when you deleted it. For instance, if I delete the file "Firefox Setup.exe", it may appear in Restoration as "DC411.exe". The trick is to look for files that are in a folder called C:\RECYCLER\ or something similar in the Restoration screen.
- The best way to find a file by far is to sort by deletion date. If you know that you deleted the file today, it can go a LONG way towards finding the correct file to restore.
- Once you find the file, just click on the Restore by Copying button, and you will be prompted to save the file somewhere. It's always a good idea to save the file to a different drive than the one you are recovering it from
- We hope this helps you recover your deleted files!
MY COMPUTER IS SLOWING DOWN,"WHAT CAN I DO"!!!!!!!!!
- How much free space do you have on your hard drive? Between 15% and 20% is ideal. XP and the other programs you have, not only require RAM memory to work, but also use your Hard Drive (Virtual Memory, which allows a computer program to behave as though the computer's memory is larger than the actual physical RAM. The excess is stored on hard disk and copied to RAM as needed.) Many large or data intensive programs and games these days require a lot of memory to operate seamlessly (no stalls or freezing).
- One thing you can do to save space is go to Control Panel >System >System Restore Tab >make sure the box 'turn off System Restore on all drives' is NOT checked >move the slide bar to 4% to 6%, (this will give you more than enough restore points and free up 6% to 8% of your HD. (That's 6 to 8 gigs on a 100 gig drive) >OK.
- Another thing you can do is clean up your personal files and to save the important ones to disk/CD, delete the garbage files and only keep the important current files. Also, uninstall programs you are no longer using (either use the program's uninstall process or the Add/Remove Programs in the Control Panel). Remember, you're aiming for 15% to 20% free HD space.
- If you need all the programs and data files, think about installing a slave hard drive and saving your files to that .. programs too (other than operating system).
- In Internet Explorer go to - Tools >Internet Options >General Tab >Delete Files while there, Delete Cookies also. Note: This does not delete your Favorites, but login information to your favorite sites will be deleted. If you don't have a printed list of login names and passwords, now is a good time to make one before deleting cookies. (For security purposes, you should never keep your passwords on your PC). However, a program such as Webroots 'Window Washer' will do all this for you while protecting the login information from being deleted. If you are using other browsers, ask in a post for instructions.
- Have you run chkdisk? This will check your C: drive (or which ever drive you have your operating system on) for errors, and repair any damaged or changed Windows files. You do this by going to Start > My Computer > right click C: drive >Properties >Tool >under Error Checking >Check Now > check both boxes >Start. It may say that chkdsk will run when you next reboot .. Reboot/restart now and let chkdsk do its thing. Note, if you have tweaked the registry to change some of the windows features, they will return to their default settings.
- Defragment your Hard Drive. As time goes on, the information on your Hard Drive becomes displaced and scattered. Your HD has to work harder finding this data and putting it together when you need it. Defragmenting pulls the data all together, making retrieval faster and working the HD less. To defragment go to Start >Programs >Accessories >System Tools >Disk Defragment. (You can also defragment from the same window as you used when you checkdisked). You should try to do this a least once a month, more if you're a heavy user. If you haven't done this at all or for quite some time, this process can take awhile to complete. Let this be the last thing you do at night or if your not going to need the computer for an extended period. Regular defraging will not take so long in the future. Defraging is best done in 'Safe Mode', this way there are minimal programs working in the background which slow down the process.
- Have only one anti virus program running. More than one running can cause conflicts and slow you down.
- Before doing any of the following steps, make sure System Restore is turned on (it should be if you have adjusted the setting to 4% to 6% above) you create a new Restore Point. Start > Help & Support > select 'undo changes to your computer with System Restore >click the radio button 'Create a Restore Point' >Next >type in a name that you'll remember should you need to restore .. something like Good Restore Point .. >Create ..a restore point will now be created and you can go on to the next steps.
- Other areas that can cause slowdowns are the programs that run in the background. There are 2 built in utilities in XP that manage these. The first is msconfig .. go to Start >Run >type in msconfig >OK >Startup tab. Here you will see a listing of programs, the ones with a check mark in the box are running the second you turn on your computer. Most software companies feel that their program is so important, that you'll want it available in a split second. Most of these programs are taking up valuable RAM memory and slowing down the bootup process as well as your programs in general. With the exception of security software and a few others, most do not need to be running. You can uncheck the boxes of the ones you want stopped and click Apply >OK. It will then ask if you want to restart your computer for the changes to take effect >select to restart. When Windows starts up again, a configuration window will open. Just click the box saying not to show this notice again >OK. Your done. Should you want easy access to a particular program, you either go to Start >All Programs, or create a shortcut on your desktop (this does not take up memory). Note: by stopping the program from running, you are not deleting it, nor are you stopping access to it. You can always go back in and check the box again. If you have any questions on these startup programs. Feel free to ask the advice of our members in your post.
- The other utility is Services. You can open this utility by either Start >Run > type in services.msc >OK or by going to Control Panel >Administrative Tools >Services. Here you can have various services selected to be in automatic (running), manual (only runs when you activate the program) or disabled (not running and not available to be run manually). If you are knowledgeable in what these services do, change the settings by double clicking the line and changing the drop-down to the desired action. If you are not sure ... DO NOT CHANGE!! You can really mess things up. Again, if you have any questions about the various services ask our members in the Q&A forum.
- Another area to cleanup is the Registry. As programs are opened and shut, added and removed and settings are changed, registry keys are created. These keys tell Windows what to do. When you uninstall a program for example, registry keys are deleted, but not all. After awhile, your Registry will contain keys that no longer do anything .. they just sit there and start to take up space. There are third party Registry cleaners that will cleanup and dump these keys. One such cleaner is CCleaner (aka Crap Cleaner), it's a free program, the link can be found on our recommended software page. As mentioned above in cookie cleaning, this little utility will also clean up cookies and has an option to leave the cookies you don't want deleted.
- Here's a brief description on its use, after downloading and installing Ccleaner:
- Go to Start > programs > Ccleaner >Make sure the "windows" tab is selected >Under "internet explorer" tick the following boxes ...Temporary internet files - Cookies - History - Recently typed URL's (leave this unticked if you DON'T want to clear the drop down list in the address window of IE) and Delete index.dat files.
- Next under "Windows explorer" > All boxes ticked except 'Other explorer MRU's' (leave this unticked if you DON'T want to clear lists such as the start un list)
- Under "System" - Empty recycle bin - Temporary files - Memory Dumps - Chkdsk File Fragments - Old Prefetch data
- If there are any cookies you want to keep (if you remove the cookie for a site you require a password for, you will need to re-enter your password when you next visit that site) ... click options > cookies > then keep the cookies you want. You may of course check any or all boxes as you wish, but these are the main ones we suggest.
- Click the Analyze button and Ccleaner will scan the Registry for the 'orphaned' keys. When it's finished, click the Run Cleaner. You will get a popup window stating that 'The process will permanently delete files from your system' click OK . A message in the upper window will now state the 'Cleaning is Complete' , you may now shut down the program. It is suggested to do this about once a week or when doing your general maintenance with the other cleanup steps.
- Finally, the key to having a smooth running computer is having a good maintenance routine and to be protected with a firewall, anti virus and anti spam programs. We have articles on these subjects and have a recommended utility programs page (free and retail), so please check this out. You can get to all of these articles and utility programs from the Home page.
Friday, June 1, 2007
7 STEPS FOR PREVENTING LAPTOP THEFT!!!!!!!!!
3. Purchase Insurance coverage for your laptop. If it is company property, be certain under what conditions a theft is covered. If the laptop is your property, check with your insurance agent and determine if it is covered under your homeowners or renters insurance. Also what theft situations are covered, such as on business or pleasure travel. If coverage is not provided, obtain additional coverage as a rider to your policy.
4. Utilize a laptop security cable. We get numerous reports of laptop theft when the owner leaves his or her office or cubicle for just a moment to go down the hall or to get a drink of water. Another time to be cautious is during meetings, laptops are used, a quick break is called and when everyone returns, some of the laptops are missing. Remember thieves have better access than you might think and are very quick.
5. Be certain to back up all important data daily. Remember the hardest thing to replace when a laptop is stolen is the lost data.
6. Encrypt the most important data. The most valuable part of a stolen laptop is the data. Many groups have cash bounties out for particular information that can be resold for identity theft or competitive use.
7. Protect the data and access of the computer with strong password and or a hardware key device. Hardware key products include fingerprint identification devices or other access control devices that plug into the USB port.
We can all learn to be more attentive to the people and our surroundings, so that we can protect our property and our lives.
2. Realize that you are the prospective PREY or VICTIM.
3. Always keep your belongings in your sight and preferably in direct contact with your body or a tether device.
4. Be suspicious of unusual activity and keep your property closer to you until this activity is over and any threat has diminished.
5. The use of laptop security cables to lock down your property or lock it together will significantly reduce the risk of theft.
6. Put a label or tape your business card to the top of your laptop. Too many business travelers are using the same brand and model of laptops leading to confusion and in some cases the picking up of someone else’s laptop when going through security. The business card or label provides identification quickly when retrieving your laptop or trying to prove ownership in a mix up or attempted theft.
REMOVING VIRUS FROM THE SYSTEM VOLUME INFORMATION FOLDER!!!!!!!!!!
"You may not even be able to see the folder at all"
- The second method allows you to save your restore points but remove the virus.
- This method requires playing around with system files so if you are not comfortable doing that, then use the method above.
- First, note the location where the Virus Scanner located the virus. Often you will find this information in the scanner's log file. In this case the location will be a series of numbers. (it will look like BB33ED9C-9125-42AF-92C0-EA614B1F488E:RP45:A01197455)
1. Click On My Computer and choose Tools then Folder Options then click on the View tab. Scroll down till you see Hidden Files and Folders and check the "Show Hidden Files and Folders". Now scroll down to "Hide Protected Operating System Files" and uncheck it then down to "Use Simple File Sharing Sharing" and uncheck it as well.Close the dialog box.
2. Now navigate to the System Volume Information folder, right click on it and choose Properties then Click on the "Security" Tab . Click ADD and add the name of the user that is currently logged on. An incorrect name will not be accepted. Check all the boxes on the left column. Click OK and Ok again.
3. You can now open the System Volume Information folder.
4. Locate the number (it will look like _restore{BB33ED9C-9125-42AF-92C0-EA614B1F488E}) and open the folder. Look for the second part of the number (it will begin with RP). Open it, then look for the last part of the number your anti virus scanner showed (it will look like A01197455.ini_ ) and delete it.
5. Close down everything then reverse the above steps in order from step 4 to step 1.
Thursday, May 31, 2007
LAPTOP CARE!!!!!!!
Laptops should be transported in their protective carrying cases at all times.
- Laptops should be protected from temperature extremes, precipitation (rain, snow, sleet, and ice) and dampness.
- Staff members should refrain from placing drinks or food near laptops and in places where spills could cause damage to the laptop.
- Staff members should note that insurance coverage has been purchased for the office’s laptops. However, the coverage provides only reduced, or no coverage in the following instances:
- Theft,vandalism, or pilferage of a laptop left in an unattended automobile;
- Disappearance of a laptop (i.e., a laptop turns up missing during the performance of a physical inventory, or vanishes without any signs of a break in);
- Damage caused by insects, vermin, corrosion, rust, dampness, dryness, freezing or extremes of temperature;
- Damage caused by exposure to rain, snow, sleet, or ice; and Damage caused by rough handling
- The laptops are provided with all the necessary software. Do not download any software to the laptop, or install any software to the laptop without the approval of the Network Administrator. Laptop Security, In the Office
- Laptops should be secured when not in use and overnight. Doors to offices with laptops should be locked over the lunch hours.
- A designated staff person will be responsible for the safeguarding of, and accountability for, any laptops not assigned to a particular staff member.
Tuesday, May 29, 2007
HOW TO MAKE THE INTERNET SAFE FOR YOUR KID'S!!!!!!!!!!!!!!
The Internet is NOT television. The Internet is more like a city street; there are many shady people that would love to take your child's money, or worse. Many children are trusting of strangers, and children are always influenced by new ideas -- how can you police their interactions so you make sure that they're not conversing with a maniac?
In this article you'll find out:If the Internet is safe for kids How to protect your child from shady characters How to block them from visiting inappropriate sites The skinny on violence on the Internet and in video games How Do I Know?
- Much of my teen years were spent in front of a computer -- even in the days before the Internet, a teenager could use a PC and modem to access all kinds of information. Remember the movie "WarGames"? Well, I wasn't that bad, but I was amazed at what a kid could see and do, all without regard for age. Fortunately, my parents had instilled some taste and common sense into my brain, so I managed to avoid the truly tasteless things I suddenly had free access to.
- The same went for video games. Frankly, I enjoy violent video games -- some of them are quite fun. However, these graphically violent games did not exist when I was younger. The early Atari and Nintendo games I played were wholesome fun.
- If my experiences have taught me anything, it is that a child with a computer can have virtually limitless access to all kinds of vulgar material, whether it be violent or pornographic. But this same child also has access to a wealth of information to advance their intelligence, and after all, that knowledge has helped me to a successful career and also to start this web site.
Online Dangers:PornographyOn search engines like Yahoo and Altavista, the top five words most commonly searched for are pornographic in nature. That statistic alone shows you how much pornographic material is open to the public, even minors. There are literally hundreds of thousands of web sites that are devoted to pornography.
Hate Sites:Nazis, the KKK, Black Supremacists: they're all on the Internet, and they would love to recruit your child as a new member. The Internet is an excellent forum for disgruntled people to voice their views without debate -- they just put up a web page. You need to make sure your kids aren't unduly influenced by these monsters.
Filtering software works with your e-mail software to filter out any messages from "unauthorized" people. For instance, you can authorize family and friends to send e-mail to your child, and anyone else who tries will get their e-mail bounced back to them.
HOW FAST IS MY INTERNET CONNECTION SPEED!!!!!!!!!!!!!!!!
- There are lots of web sites out there that will test your Internet connection. Your best bet is to try several, because if you have a very fast connection, your results may vary by how far the web site's server is from your home/Internet provider.
- An important thing to keep in mind is that bandwidth is measured in kilobits per second (kbps) - one bit is simply a binary 0 or 1, so transferring one kilobit means that you transferred 1000 0s or 1s. One megabit per second (Mbps) means roughtly 1,000,000 0s or 1s transferred every second.
- However, when you normally think of the size of files, you are not thinking in terms of kilobits or megabits - you think in terms of kilobytes (KB) or megabytes (MB). Since it takes 8 bits to make up a byte, you should divide the speed of your connection in bits per second by 8 to get a real-world idea of how long it would take to transfer a file.
- An example: I have a 1 Mbps internet connection. I have a 10 megabyte file that I would like to download. Will it take 10 seconds? No. Because of the difference between bits and bytes, it will take longer. A 10 megabyte file is actually comprised of roughtly 80 megabits. So, with a 1 megabit-per-second connection, it should take roughly 80 seconds to transfer the file.
Sunday, May 27, 2007
WHOM TO MARRY!!!!!!!!!!!!!!!!!!!!!!!
Wednesday, May 23, 2007
BYPASS WINDOWS FILE PROTECTION IN WINDOWS XP!......
Next, go to your system 32 folder and do the same thing. Look for cmd.exe, double click it, and enter exactly the same command.
- If you have a problem over writing the files, you can do the copying with in the recovery console, or you can try safe mode.
- The dllcache folder is a hidden folder.
- It is important to copy the file to your dllcache folder first.
- If you’re prompted to pop in your windows CD, clicks cancel.
Once the files have been copied, shut down your computer and restart it. The final step is to disable system file protection in the registry. Go to HKEY-LOCAL-MACHINE\SOFTWARE\Microsoft \windows NT\Current version\win logon. In the right-hand pane, if it doesn’t exist, create a new DWORD value named SFCD is able. Double-click it and enter “FFFFFF9D”. Exit the registry editor and reboot. You’re done.
Friday, April 27, 2007
THE TECHNOLOGICALLY CHALLENGED!...
there'sstill hope:
1. Compaq is considering changing the command "Press Any Key" to "Press Return Key" because of the flood of calls asking where the "Any" key is.
2. AST technical support had a caller complaining that her mouse was hard to control with the dust cover on. The cover turned out to be the plastic bag the mouse was packaged in.
3. Another Compaq technician received a call from a man complaining that the system wouldn't read word processing files from his old (5-1/4") diskettes. After troubleshooting for magnets and heat failed to diagnose the problem, it was found that the customer had labeled the diskettes, then rolled them into the typewriter to type the labels.
4. Another AST customer was asked to send a copy of her defective diskettes. A few days later a letter arrived from the customer along with photocopies of the floppies.
5. A Dell technician advised his customer to put his troubled floppy back in the drive and close the door. The customer asked the tech to hold on, and was heard putting the phone down, getting up and going across the room to close the door.
6. Another Dell customer called to say he couldn't get his computer to fax anything. After 40 minutes of troubleshooting, the technician discovered the man was trying to fax a piece of paper by holding it in front of the monitor screen and hitting the "send" key.
7. Yet another Dell customer called to complain that his keyboard no longer worked. He had cleaned it by filling up his tub with soap and water and soaking the keyboard for a day, then removing all the keys and washing them individually.
8. A Dell technician received a call from a customer who was enraged because his computer had told him he was "bad and an invalid".The tech explained that the computer's "bad command" and "invalid" responses shouldn't be taken personally.
9. A confused caller to IBM was having troubles printing documents. He told the technician that the computer had said it "couldn't find printer."The user had even tried turning the computer screen to face the printer - but his computer still couldn't "see" the printer.
10.An exasperated caller to Dell Computer Tech Support couldn't get her new Dell Computer to turn on. After ensuring the computer was plugged in, the technician asked her what happened when she pushed the power button. Her response, "I pushed and pushed on this foot pedal and nothing happened." The "foot pedal" turned out to be the mouse!
11.Another customer called Compaq tech support to say her brand-new computer wouldn't work. She said she unpacked the unit, plugged it in and sat there for 20 minutes waiting for something to happen. When asked what happened when she pressed the power switch, she asked "What power switch?"
12.True story from a Novell NetWire SysOp:
Caller: "Hello, is this Tech Support?"
Tech: "Yes, it is. How may I help you?"
Caller: "The cup holder on my PC is broken and I am within my warranty period. How do I go about getting that fixed?"
Tech: "I'm sorry, but did you say a cup holder?"
Caller: "Yes, it's attached to the front of my computer."
Tech: "Please excuse me if I seem a bit stumped, it's because I am. Did you receive this as part of a promotion, at a trade show? How did you get this cup holder? Does it have any trademark on it?"
Caller: "It came with my computer, I don't know anything about a promotion. It just has '4X' on it." At this point the Tech Rep had to mute the caller, because he couldn't stand it. He was laughing too hard. The caller had been using the load drawer of the CD-ROM drive as a cup holder, and snapped it off the drive.
13.Another IBM customer had troubles installing software and rang for support. "I put in the first disk, and that was OK. It said to put in the second disk, and I had some problems with the disk, but I squeezed it in. When it said to put in the third disk - I couldn't even fit it in..." The user hadn't realized that "Insert Disk 2" meant to remove Disk 1 first.
Sunday, April 22, 2007
GOD AND THE COMPUTER!...
Saturday, April 21, 2007
CONVERSATION BETWEEN BILL GATES AND LALOO OF BIHARI!...........
Gates: Namaskar! you must have heard of Windows. Laloo: Oh yes! most govt. offices we have the single window clearance concept.
Gates: At home have u installed Windows? Laloo: I have removed all windows due to increased burgalaries in our house.
Gates(Confused): Then what is the system you operate on?Laloo: OPERATION? Yes, I had a Hernia operation last month.
Gates(Sweating): Hope the internet is being used a lot in India. Laloo: Oh Yes! Due to increased mosquito problems many people are sleeping under the net.
Gates: By the year 2010 India should export computer chips. Laloo: We are already exporting Uncle Chips.
Gates(Feeling very Uneasy): do you regularly use LapTops? Laloo: My grand-child sleeps on the top of my lap.
Gates(Heavily Sweating): The Chief Minister of Andhra Pradesh knows a lot about RAM and ROM.Laloo: RUM? Prohibition is being lifted and it will be shortly available in A.P..
Gates(Feeling Dizzy): I would like to take your leave before my system crashes.Laloo: I have exhausted all my leave.
Gates: I have no energy left, let us go out and have a bite.Laloo: BITE? I believe in non-violence. I will not bite.
Gates: (System Crashes and Found Missing). "Windows is restarting. Please wait............."
SOFTWARE ENGINEER HUSBAND!....
Wife - would you like to have some snacks?Husband - hard disk full.
Wife - have you brought the saree.Husband - Bad command or file name.
Wife - but I told you about it in morningHusband - erroneous syntax, abort, retry, cancel.
Wife - hae bhagwan !forget it where's your salary.Husband - file in use, read only, try after some time.
Wife - at least give me your credit card,i can do some shopping.Husband - sharing violation, access denied.
Wife - i made a mistake in marrying you.Husband - data type mismatch.
Wife - you are useless.Husband - by default.
Wife - who was there with you in the car this morning?Husband - system unstable press ctrl, alt, del toReboot.
Wife - what is the relation between you & yourReceptionist?Husband - the only user with write permission.
Wife - what is my value in your life?Husband - unknown virus detected.
Wife - do you love me or your computer?Husband - Too many parameters.
Wife - i will go to my dad’s house.Husband - program performed illegal operation, it willClose.
Wife - I will leave you forever.Husband - close all programs and log out for another User.
Wife - it is worthless talking to you.Husband - shut down the computer.
Wife - I am goingHusband - Its now safe to turn off your computer.
Friday, April 20, 2007
MICROSOFT'S SLOGAN!........
After first seeing Microsoft's slogan for its New Windows XP operating system, "it just works," I couldn't help wondering: what were the slogans for all the previous releases? After thinking about it for a while, they became obvious.
Tuesday, April 17, 2007
MAKING WINDOWS XP FASTER IN LOGIN TIME!..
Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the boot up speed you want. This chapter explores how to put these techniques to work.
To reduce the number of services that start on boot up, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.
You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.
Open Control Panel/Administrative Tools Services or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.
I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.
Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.
However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:
Fax:
Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.
IMAPI CD-Burning COM:
Infrared Monitor:
Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.
Print Spooler:
Remote Registry:
System Restore Service:
Themes:
Windows Image Acquisition:
You may have a number of other automatic services, depending on software and other configurations on your computer. So it's a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears
Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.
However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.
Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.
This isn't a networking book, however, so I won't delve into the implications of using a manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.
Select Start/Connect To/Show All Connections. Right-click your network adapter card and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.
In the TCP/IP properties, you can see if you use an automatic or manual IP address. In the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.
Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this chapter.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it.
2.Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.