Showing posts with label COMPUTER. Show all posts
Showing posts with label COMPUTER. Show all posts

Thursday, January 19, 2012

How to Avoid Getting Ripped-Off Online

Online security is one of the top catch phrases these days, but hardly anybody knows what it means and worse, most home computer users think security only applies to corporations and online businesses.

Most people think online security means simply protecting your credit card data from fraud and theft, but it actually goes way beyond that.

The potential for mayhem and just plain disruption of your life doesn't just mean credit card fraud - it can mean having your identity stolen, your life disrupted and spending hours cleaning up after an online 'vandalism' attack.

You must protect yourself from everyone from the teenage computer hacker to the organized crime syndicate using computer worms and keystroke logging viruses.

The great news is that a number of simple techniques should protect you against the vast majority of threats, since the evil doers will simply move on to easier pastures.


Update your anti-virus files

The widespread 'Bad Trans' worm logged keystrokes and transmitted potentially sensitive data such as credit card and social security numbers to the 'bad guys'.

Though this virus contained a high level of criminal intent, it was easily blocked by anyone with up-to-date anti-virus files.

If you don't have anti-virus software with current virus definitions installed, you leave the door wide open for security problems.


Install a 'Firewall'

A firewall helps prevent unauthorized access to your computer by 'hackers'.

It closes off the entry points (called open 'ports') carried by virtually every computer connected to the Internet.

A common misconception is that firewalls are only for people with cable or other high-speed connections.

Even if you use a dial up connection to get online, a firewall can help you detect and prevent people from logging on to your computer, stealing files or even using your computer to break into others!

You can take a free test of your computer's security by logging on to http://www.symantec.com/securitycheck/ and clicking 'Find out today if you are safe'. The results may surprise you.


Use secure sites

Only give sensitive data such as credit cards, social security numbers and important passwords over a secure connection.

This means the little yellow lock appears in the lower part of your browser and nobody but the website you are connected to should be able to read the data you send.


Change passwords often

An easy way for you to protect your sensitive data and email is to change your passwords on a monthly basis, or even more often depending on how frequently you use computers away from home.

If you log on to your email at the library, in 'cyber cafes' or any other remote computer then the possibility exists that computer could have a key-stroking virus present.

This means everything you type into the computer (passwords, birthdays, social security numbers, credit cards) could be logged and used by someone else.

** Change your passwords at lease once a month.


Though not fool-proof, these security tips should help reduce your vulnerability and keep you safer online.

Tuesday, January 17, 2012

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

5 Sure-Fire Tips for Buying a New Computer

So you're thinking of buying a new computer...

Where do you start?
There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.

How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?

I have sold computers professionally for almost 20 years, and there are certain "tricks of the trade" that most computer stores and salespeople use. Knowing these secrets can make your decision easier and will help you buy the right computer for your needs.

1. Buy What You Need, Maybe a Little More

One of the most important things you can do when buying a new computer is make a list of the things that you will be using it for. There are so many different models - with different capabilities - that you can easily buy more, or less, than you really need if you don't.

If this is your first computer, this can be a little tougher. Until you've used a computer, it's hard to know exactly what you might want to do with it beyond the obvious, like connecting to the internet.

Regardless, you should think about some of the things you might want to do. Some possibilities include:

- Connect to the internet
- Play games
- Digital photography
- Digital video
- Type documents
- Accounting
- Design websites
- Programming
- Digital scrapbooking
- Geneology

Some of these things need more power than others. For example, connecting to the internet really doesn't need a lot of power. Even the most basic computer available will probably work just fine.

Digital video and many games need a lot more power. If you don't get a fast enough computer with enough memory, you'll be disappointed with the performance.

Knowing what you're going to be using your computer for will help your salesperson, whether they're on the phone, the internet or standing in front of you, recommend the best system for your needs.

As a general rule you're always better off buying more power than you need rather than less, but buying too much can be a waste of money.

2. Warranty Considerations

Computer warranties are one of the most confusing and obscure parts of your purchase. Most manufacturers have cut back on their customer service to the point where poor service has become a given.

The three most common options are onsite, carry-in or manufacturer's depot service.

Onsite service can be helpful, but think about whether you want to have to be available for a technician to come and diagnose your computer, and possibly have to come back with parts at another time.

Carry in service is a good option, but find out whether the service center is factory authorized for warranty repairs, as well as whether the technicians are all certified.

Shipping your computer to a factory service center can take a long time - sometimes a number of weeks. It also creates risk that your computer will be damaged or even lost in shipping. In some cases, the manufacturer will even replace your computer with another unit and ship it back to you, rather than repairing it. This can result in your losing any information that was on your system and having to reload all your software.

Another aspect of the warranty to find out about is technical support. Find out if the computer manufacturer offers a toll-free phone number and what the quality of service is like.

The better computer salespeople will be honest about this and tell you if a company's service leaves something to be desired. You can also do some research on the internet - most of the computer magazines like PC Magazine and PC World have annual customer service comparisons that rate the larger computer companies.

Always find out how the warranty is handled before making your decision. Even if it doesn't influence your choice, knowing what to expect if something does go wrong will save some nasty surprises down the road.

3. Can You Negotiate the Price Down?

A computer is a relatively large investment - anywhere from a few hundred to a few thousand dollars. Many computer buyers expect that there is a significant amount of "wiggle room" on the price.

The reality is that most computer hardware - the physical pieces like the computer, monitor and printer - is sold at very low profit margins. Often, computer systems are even sold at or below the dealer cost. When you're buying a computer, it never hurts to ask for a better deal, but don't be surprised if you only get a few dollars off, if anything.

Over the close to 20 years I've sold computers, I watched the profit margins go from over 40% to less than 5%. It's almost embarassing to offer a $20 discount on a $2500 computer system, but that could mean the difference between making and losing money on the sale.

What you can do to get the best price is to do some comparison shopping. Most computer stores offer price-matching guarantees, so if you find your computer for less at another store, most dealers will match or beat that price, even if it means they lose money.

4. How Do Computer Stores Make Any Money?

You might be wondering how these computer stores make any money if they're selling computer for so little profit.

Their money is made on add-on items. The highest profit areas in most computer stores are cables and "consumable" products such as printer ink and paper.

Printer ink is a huge money-maker for most computer stores (even more so for the printer manufacturers). Why is this? Once you've bought a printer, you're going to have to replace your ink at some point, and continue to replace it as it runs out.

Most chain computer stores and office supply stores that carry a large selection of ink cartridges make more from ink than they do from the computers themselves.

Cables also have huge markups. A cable that costs the store $2-3 will often sell for $20-30. That's ten times their cost!

If you're buying a new computer, you will likely need to buy some cables. Some items - printers, for example - don't often include the cables needed to hook them up.

Many printers also come with "starter" ink cartridges that are only half-full. You might also want to pick up some extra ink cartridges.

This is where you should be able to negotiate a better price. Don't expect the salesperson to throw them in for nothing, but they should be willing to offer you a better price. After all, if you're happy with their service, you'll probably continue to buy your ink, paper and other products from that store in the future.

5. What Software is Included?

The last secret of buying a new computer has to do with the software that is included. Most new computer systems include quite a few programs and sometimes the value of the software can be quite high.

Something to watch out for when looking at the included software is "trial versions" or "limited editions".

Many programs that are preloaded are either crippled versions that don't have all the features of the full program, or trial versions that will only run for a certain amount of time before they expire.

Computer are often sold with trial versions of the following types of software:

- antivirus
- firewall
- MS Office or other office suites
- Accounting - both business and personal

The computer manufacturers generally don't make it easy to tell whether the software on their systems are trial versions or limited versions. This is a question that you should specifically ask if you can't find the answer in their promotional information.

If you're buying a new computer with trial versions of the software, keep in mind that you will need to pay to continue using it after the trial period is over. This is an added cost that you need to consider as part of your overall budget.

These five "secrets" of buying a new computer are fairly common sense, but they are not always made clear up front. Knowing what to ask will help you in two ways. First, you can be sure you are getting the right computer for your needs.

Second, if the salesperson or company that you're dealing with explains these things to you without being asked, you'll know you're dealing with someone who is honest and upfront.

Knowing you can trust the people you're dealing with is an invaluable feature of your new computer system.

Monday, January 16, 2012

Top 10 Ways To Protect Yourself From Computer Viruses

As more and more people are becoming comfortable using their computers at school, home or in the office it’s only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.

Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.

Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.

Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for “off hours” like 2AM when you aren’t likely to be using your computer.

Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.

Backup your data regularly. Most windows computer users keep their documents in the “My documents” folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.

If you use floppy disks or USB drives on public computers like your school computer lab, Kinko’s, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.

Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren’t expecting. Also be careful of attachments from people you know but weren’t expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.

Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.

Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.

Be wary of links in IM or instant messaging software. Don’t accept invitations from people you don’t know and never click a link from someone you don’t trust, they can easily redirect you to another website that will try to install a virus on your computer system.

Tuesday, January 3, 2012

Computer Error? Do not hastily Reinstall

Computer errors can be experienced by anyone, anytime. Problems that can be sourced from any component that is making you lay somewhat confused to find a solution.


Reinstall the operating system is the easiest way. Before doing so it's worth finding first solution. During the problem limited to the application or the operating system alone, this can be easily resolved with the help of an application system repair.

Here are some examples of problems that are often found in computer systems and their causes:

1. Display a blue screen (Blue Screen of Death)
Display BSOD is most frustrating moment happens to your computer. Inevitably you have to reboot, the severity of this can happen when you do not save the jobs that have been made previously. This message has the intention to notify any errors that occur by displaying certain codes. Most of this is caused by hardware that is beginning to show symptoms of unhealthy or any problems with the drivers.

2. DLL files are missing
File Dynamic Link Library (DLL) is an information center of the operating system that functions to perform various functions. DLL files are missing can be caused by errors in the installation process or file damage due to viruses and other things.
3. Applications that do not want installed
If an application is not installed or it is always a failure, it could be because your computer does not have enough hard drive space. In this case, you need to free up space on your hard disk by deleting files or folders that are not important or already have a backup.
4. The application is running slow
There are several reasons why this could be happening. But mostly it comes from the operating system or applications installed. The number of hidden applications that run concurrently or irregular placement of files and folders can be the cause.

5. Application behavior is not normal
When running an application, all of a sudden some functions may not work properly. For example, Microsoft Word is experiencing hangs when activating a function. This could
caused by damage to certain files or clashing with other files. Usually you have to do to update or reinstall the application.

Most of the repair system application handles the above problems in an easy and fast. Even some of these applications have additional features to enhance overall system performance.

Wednesday, November 3, 2010

Virtual Memory settings tricks tips to speed up windows xp



If you open the program simultaneously, let alone a big program2 such as Photoshop, working memory becomes full and a slow computer, windows address this problem by using an empty capacity in the hard disk. The Virtual Paging File (also called swap files) on your hard disk to act as a temporary storage place if windows shortage of places in memory. Usually windows create temporary paging file on the hard disk only when needed, but with the paging file that fixed the computer's performance could be better.

How: Click "Start" -> right click My Computer -> select Properties -> Advanced tab -> at the performance - click the settings button -> open it again and hold in the advanced tab virtual memory click" change ".
Select the partition on the hard disk (C or D) that has an empty place at least twice the size of RAM. In this partition set the "initial size" and "maximum size" with the same value (eg 512 MB). By setting the same value, you have created a fixed paging file.

Important: Set the size to twice the size of RAM you have and should be the same, when it's finished click the "set" and then "ok". You must restart your PC to activate the change.

tips tricks in vista boot problems

Many people argue that Windows Vista is not so good, but despite that Vista has many advantages from a variety of operating systems (OS) Windows. One of them as will be discussed this time are the facilities and Repair System Restore Windows Start Up.

When Windows Vista boot problem in this case, there are two easy ways to overcome them:
1. Repair Facility Start Up Windows Vista
2. Facilities System Restore Windows Vista
The trick is:
1. Insert the Windows Vista installation DVD
2. When asked to select the language during installation leave it alone and click "Next"
3. Windows will then display the options of Windows Vista and Repair Install, select "Repair"
4. Windows will automatically check the start-up process is broken (error) and fix it
5. Once done a window will appear indicating that repair activity has been successfully performed
6. If you believe others do not damaged the file click on the "Next", but if you want to restore as many components of Windows OS that you suspect is damaged click "Cancel"
7. Next will appear a window that displays several options, now select the "System Restore"
8. In the next display you will be confronted with various options that can restore your OS back to the previous condition
9. If you want the first time again select the option "Show System Restore Older Than 5 Days"
10. Select a date when you will restore your computer and click "Next"
11. Wait until the process is complete
12. Restart your computer
System Restore Windows Vista better than Windows XP because it is truly restore the files that are in the System Drive and the entire configuration of Windows. In addition, Repair facility start up fairly well because it really solve the problem of Windows fails to boot into windows.

Note: If you do a system restore without Windows Vista DVD takes a long time.

Tuesday, November 2, 2010

Performance Optimization Tricks Tips Windows Vista

Windows Vista comes with a myriad of features. Several features make Vista look very attractive, some features could help the office, some features had to walk for Vista to function.
Unfortunately, many of the several features that can make the computer work decreased. Features that enhance the appearance of Vista turned out to be a burden for the working graphics card. Recommended for people who do not use the office housing the memory burden. These features are less well off have used it for computer work faster.

Precisely, what features should be turned off? What all of the features PCplus tell in this article? There are no definitive answers, depending on how computers are used and the taste of the owner of the computer. On a laptop belonging PCplus, only some of the features turned off.
Before tinkering with the features of Vista, you should first make a "restore point". So, if there is anything after a feature is turned off, stay back again to "restore point" that.

Sidebar
Sidebar contains small applications, such as clock, slide show photos, and RSS. PC users must pay with decreasing computer work for the little things. If it is turned off, the PC can work faster. The speed with which it was when Windows is turned on (booted).
How to turn it off like this.
1. Right-click on the Sidebar (in any area), then click [Close Sidebar].
2. Remove the check mark on [Uncheck Start Sidebar When Windows starts].
3. Click [OK].

Aero
Vista has Aero which is a package that beautify the appearance of Vista. If enabled, Vista will have various effects that must be recognized is quite amazing.

One effect of the proud Microsoft is Flip 3D. Its function is to switch applications, but with 3D effects. Flip 3D application switch beautify function that is accessed with the [Alt] [Tab]. Flip 3D itself is accessible by the [Windows] [Tab].
Unfortunately, the computer hardware specifications mediocre, Aero became a burden. So also on the computer that it is too much.

Here's how to turn off Aero.
1. Right-click on the desktop, then click [Personalize].
2. Click [Windows Color and Appearance].
3. In the box that appears, click [Open classic Appearances properties for more color options]. Nah find that option? Means, Aero is already not active. When the hardware specs are not eligible, the Aero is automatically dead.
4. Select [Windows Vista Basic].
5. Click [OK].
Not all the pretty effects derived from the Aero. There are some effects that are already in Windows, such as the effects of shifting from the window is minimized or effect the emergence of instructions (tooltip).

These effects could also be turned off. The trick here.
1. Click [Start], right click on the [computer] and click [Properties].
2. Click [Advanced System Properties].
3. In the box that appears, click the [Advanced].
4. Click [Settings] in the box "Performance".
5. Look at the choices that effect appears. Simply put, just turn off all. But, it could be partially disabled. Remove the check mark to the effect that would be turned off.
Internet Printing Client
There are tables of online printing services. People can send photos to the service provider, photo printing, then sent to an address. If a service like this is never used, just turn off the feature "Internet Printing Client."
How:
1. Open the Control Panel, then click [Programs and Features].
2. Click [Turn Windows features on or off] which is on the left.
3. In the box "Windows Features", click [Print Services].
4. Remove the check mark on [the Internet Printing Client].
5. Click [OK].
6. Restart the computer when prompted.

Windows Meeting Space
Meeting Space is a feature that allows a computer user to share files with friends who are in a computer network. The file is not just divided, but can be edited together. If this feature was never used, just off well.
Here's how:
1. Open the Control Panel, then click [Programs and Features].
2. Click [Turn Windows features on or off] which is on the left.
3. Uncheck the "Windows Meeting Space".
4. Click [OK].

Tablet PC Features
Vista comes with features for the Tablet PC. If Vista is not installed on Tablet PCs, what its features enabled. After all, will not be used.
How to turn it off:
1. Open the Control Panel, then click [Programs and Features].
2. Click [Turn Windows features on or off] which is on the left.
3. In the box "Windows Features", remove the check mark on [Tablet PC Optional Components].
4. Click [Start], typing "services" in the search box. When the show [Services] in the search results, click on it.
5. Search [Tablet PC Input Services]. If you have found, double click on it.
6. In the drop-down menu "Startup type", select [Disabled].
7. Click [OK].

ReadyBoost
Originally ReadyBoost speed up Vista. But, what speed increase is very pronounced? In some cases, the use ReadyBoost actually slows down the computer.
ReadyBoost can be turned off in the Services in a way:
1. Click [Start], typing "services" in the search box. Click [Services] in the search results.
2. Double click on [ReadyBoost].
3. In the drop-down menu "Startup type", select [Disabled].
4. Click [OK].

Report Errors
If a program suddenly stopped working-either have a Windows program, whether other programs-Vista will offer what the user wants to report the error to Microsoft. Ideally, Microsoft would find out what is causing the error. Well, if PCplus still rarely send reports. Thus, the error reporting feature PCplus off.
Here's how to turn it off.
1. Click [Start], typing "services" in the search box. Click [Services] in the search results.
2. Double click on [Windows Error Reporting Service].
3. In the drop-down menu "Startup type", select [Disabled].
4. Click [OK].

Search Index
PCplus need to think again and again to turn off this feature. You see, this feature is very useful to find files, programs, or e-mail quickly. If this feature is disabled, search and other files that should be met in seconds, can only meet after several minutes of searching.
But, if this feature is enabled, Vista will continue to create an index for the contents of the hard drive changed. Some people are just barely computer specifications, so-so turn off this feature.
How to turn it off:
1. Click [Start], typing "services" in the search box. Click [Services] in the search results.
2. Double click on the [Windows Search].
3. Select [Disabled] on the drop-down menu [Startup Type].
4. Click [OK].

Wednesday, October 27, 2010

Recovering the administrator password on Windows XP













This time, I wanted to not give tutorial how to restore the admin password, if you forget the password without using the software. In this way, you also can break into someone's computer without knowing the administrator password ..


Steps :

1. First, reboot your computer, and press f8 at start up (bios)
2. Select safe mode menu, then click start - run, then typing the following command: "control userpasswords2" without the quotes.
3. After that you will see several accounts including the administrator who was on the computer. And you live it just reset the admin password if you forget the password.
4. Click on the administrator user account, then click Reset Password.
5. The last step is, adding a new password, fill in the new box password and confirm the new password in the box, content with what you fill in the new box password. Then click Ok.
6. Restart the computer and do not press f8 or select normal mode. And see the changes ..

Set Desktop Icon Desktop With Shock



Number icon on the desktop there could be enough to disrupt the viewing. Especially if the location of the icon is not neatly arranged.
By using Shock Desktop you can easily adjust the position or location of the icon on the desktop. There are a variety of layouts to choose from, such as circle, ellipse, heart, star, etc..




To change the layout icon you can right-click the Desktop icon Shock contained in the systray, then click the Desktop Icon Layout.

If you want to try Shock Desktop, you can download. its free http://www.docs.kr/attachment/ek140000000002.exe .

Consumption Monitor Download

If it is connected to the internet network download both freeware and song of course fun. This download activity can make a complacent because there are lots of eating your network bandwidth. That certainly will affect your internet bill if calculated based on the received bandwidth consumption.

However, at least there is a simple way to simply alert, whether the activity you are doing already donwload eat excessive bandwidth or not. Is it time you stop the activity because it will be a lot of draining the contents of the bag or not? If you are using Windows XP operating system, do it this way to monitor your bandwidth consumption. Do this by pressing Ctrl-Alt-Del to open Task Manager and select the Networking tab.

To display donwload select View, Select Columns and check Bytes Received then do not forget to click OK. Well, if you want to get data that has been done cumulative download, select Options, Show Cumulative Data. If you want to stop to see the amount of consumption of your download, close Task Manager, and do the back of your Internet activities without having to shut down and restart Windows.




Tuesday, October 26, 2010

How to Reset Waste Ink

How to reset waste ink reseter full without using software.

1. Unplug the AC power behind the printer.
2. Press and hold the power button.
3. Input AC cord back in (the power button remained in detention)
4. Release the power button.
5. Turn the printer ..


METHOD 2:

How To Reset Printer Canon IP & MP Series

Steps Reset Ink Tank Full Error Canon iP Series and mP
First Stage (Hardware Reset)
1. Turn off the printer, then unplug the power cord.
2. Press and hold the POWER button on the printer. ... (Use your index finger to hold the POWER button this)
3. Replace the power cord. ... (Index finger still pressing the Power button)
4. Use the middle finger to press the Resume button 2 times.
5. Remove your index finger from the POWER button. ... .... (The printer will be detected again as a new printer)
6. You have completed the first phase to reset Ink Tank Full Error ... (flashing power light).

Proceed to Stage Two!
Phase Two (Software Reset) for Permanent
1. Download Resetter Canon IP (just googling)
2. Extract / Unrar downloaded file tesrebut in a folder, ... eg C: \ Resetter Printer
3. Make sure all files in the folder attributes are free from Read Only. ... How: select all the files (Ctrl A)> right click on one file> select properties> ... turn off a check in the Read-Only attributes> OK
4. Double-click GeneralTool.exe> will appear GeneralTool for application menu ...
5. In USB Port select the active port for your printer.
6. Select (check) in the EEPROM CLEAR.
7. Provide blank paper for printing. Then click the button TEST PATTERN 1.
8. Restartlah your computer, to detect a new printer does not appear again. Done.
Good luck, good luck!

Another way:
If you find a way above is not successful, then try to replace the cartridge with a new or have borrowed another friend, good luck!

TYPES AND TYPE PRINTER SOFTWARE RESET
Here are the types of Software Reset printer according to the type of printer to be reset. Usually a Software Reset can be used for several types of printers. As attached below:

1. RESETTER CANON iP1700, iP1300, ip6600, iP6000, iP6210, iP220D, mP8302. RESETTER CANON iP1200, iP1600, iP2200, iP4200, iP5200, mP1503. SOFTWARE RESETTER CANON i250, i255, i320, i350, i3554. SOFTWARE RESETTER CANON PIXMA ip1000, iP15005.

SOFTWARE RESETTER EPSON
CX-4600, CX-5300, CX-5100, RX420, RX425, RX620, R1800, C50, C60, C61, C62, C20/C40, C43, C45, C41, C46, C65, C85, C86, CX-3600, CX-6600, R800, SC-740, RX600, Stylus400, 440, 480LPT, 480SXU/580, Stylus600, 640, 660, 670, 680/777, 740, 760, 800/850, 860, 880, 900/EM- 900C, 980, 1160, 1520, 3000, C63, C64, C70, C80, C82, C83/C84, C85/C86, CX3100/3200, Cx3600, CX5200, CX5400, CX6400, Photo EX, Photo700/IP-100, 750 / PM-770c, 780/790, 810/820, 825/915, 830/830U, 870/PM-875DC, R200/210, R300, R800, RX500, RX600, 890, 895/785EPX, 900, 925/934 , 950/PM-950C, 1200/PM-3000C, 1270/PM-3300C, 1290.2200 / PM-4000EPX, 5000/PM-5000C.
CANON iP1200, iP1600, iP2200, iP4200, iP5200, mP150

First Stage (Hardware Reset)
1. Turn off the printer, then unplug the power cord
2. Press & hold the POWER button printers use the index finger
3. Replace the power cord
4. Use the middle finger to press the Resume button 2 times
5. Remove your index finger from the button POWER
6. You have completed the first phase to reset Ink Tank Full Error (power light blinking)

Phase Two (Software Reset) for Permanent
1. Download resetter applications (large file 9.7 MB)
2. Extract / Unrar the folder C: \ IP1200
3. Make sure all file attributes from Read Only
4. Run GeneralTool.exe
5. In USB Port select your printer port
6. Select (check) the EEPROM CLEAR
7. Provide blank paper to print, then click the Test Pattern 1
8. Done, IP1200 and IP1600 printer you back to normal

Text Command Windows XP

Here are the commands run (text Command) on Windows XP. By knowing
These commands can then save time when we are about to open a program.
There are some commands that run if a software / application is already installed on the system.

Can run from a DOS prompt or just from the menu:
Start - Run - Command

Here are the commands:
Accessibility Controls = access.cpl
Accessibility Wizard = accwiz
Add Hardware Wizard = hdwwiz.cpl
Add / Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Adobe Acrobat (if installed) = acrobat
Adobe Distiller (if installed) = acrodist
Adobe ImageReady (if installed) = ImageReady
Adobe Photoshop (if installed) = photoshop
Automatic Updates = wuaucpl.cpl
Basic Media Player = mplay32
Bluetooth Transfer Wizard = fsquirt
Calculator calc CCleaner (if installed) = CCleaner
C: Drive = c:
Certificate Manager = cdrtmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Clipboard Viewer = clipbrd
Command Prompt = cmd
Command Prompt = command
Component Services = dcomcnfg
Computer Management = compmgmt.msc
Compare Files = comp
Control Panel = control
Create a shared folder Wizard = shrpubw
Date and Time Properties = timedate.cpl
DDE Shares = ddeshare

Device Manager = devmgmt.msc
Direct X Control Panel (if installed) = directx.cpl
Direct X Troubleshooter = dxdiag
Disk Cleanup Utility = cleanmgr
Disk Defragment = dfrg.msc
Disk Partition Manager = diskmgmt.msc
Display Properties = control desktop
Display Properties = desk.cpl
Display Properties (w / Appearance Tab preselected) = control color
Dr. Watson System Troubleshooting Utility = drwtsn32
Driver Verifier Utility verifier Ethereal (if installed) = ethereal
Event Viewer = eventvwr.msc
Files and Settings Transfer Tool = Migwiz
File Signature Verification Tool = sigverif
Findfast = findfast.cpl
Firefox = firefox
Folders Properties = control folders
Fonts = fonts
Fonts Folder = fonts
Free Cell Card Game = FreeCell
Game Controllers = joy.cpl
Group Policy Editor (xp pro) = gpedit.msc
Hearts Card Game = mshearts
Help and Support = helpctr
Hyperterminal = hypertrm
Hotline Client = hotlineclient
IExpress Wizard = IExpress
Indexing Service = ciadv.msc
Internet Connection Wizard = icwonn1
Internet Properties = inetcpl.cpl
Internet Setup Wizard = inetwiz
IP Configuration = ipconfig / all
IP Configuration (Display DNS Cache Contents) = ipconfig / displaydns
IP Configuration (Delete DNS Cache Contents) = ipconfig / flushdns
IP Configuration (Release All Connections): ipconfig / release
IP Configuration (Renew All Connections): ipconfig / renew
IP Config (DHCP refreshes & Re-Registers DNS) = ipconfig / registerdns
IP Configuration (Display DHCP Class ID) = ipconfig / showclassid
IP Configuration (Modifies DHCP Class ID) = ipconfig / setclassid
Java Control Panel (if installed) = picpl32.cpl
Java Control Panel (if installed) = javaws
Keyboard Properties = control keyboard
Local Security Settings = secpol.msc
Local Users and Groups = lusrmgr.msc
Logs You Out Of Windows = logoff
Malicious Software Removal Tool = MRT
Microsoft Access (if installed) = access.cpl
Microsoft Chat = winchat
Microsoft Excel (if installed) = excel
Microsoft Diskpart = diskpart
Microsoft Frontpage (if installed) = frontpg
Microsoft Movie Maker = moviemk
Microsoft Management Console = mmc
Microsoft Narrator = narrator

MSPaint Microsoft Paint =
Microsoft Powerpoint = powerpnt
Microsoft Word (if installed) = winword
Microsoft Synchronization Tool = mobsync
Minesweeper Game = winmine
Mouse Properties = control mouse
Mouse Properties = main.cpl
MS-Dos Editor = edit
MS-Dos FTP = ftp
Nero (if installed) = nero
Netmeeting = conf
Network Connections = control netconnections
Network Connections = ncpa.cpl
Network Setup Wizard = netsetup.cpl
Notepad = notepad
Nview Desktop Manager (if installed) = nvtuicpl.cpl
Object Packager = packager
ODBC Data Source Administrator = odbccp32
ODBC Data Source Administrator = odbccp32.cpl
On Screen Keyboard = OSK
Opens AC3 Filter (if installed) = ac3filter.cpl
Outlook Express = msimn
Paint = pbrush
Password Properties = password.cpl
Performance Monitor = perfmon.msc
Performance Monitor = perfmon
Phone and Modem Options = telephon.cpl
Phone Dialer = dialer
Pinball Game = pinball
Power Configuration = powercfg.cpl
Printers and Faxes = control printers
Printers Folder = printers
Private Characters Editor = eudcedit
Quicktime (if installed) = quicktime.cpl
Quicktime Player (if installed) = quicktimeplayer
Real Player (if installed) = realplay
Regional Settings = intl.cpl

Regedit Registry Editor =
Registry Editor = regedit32
Remote Access Phonebook = rasphone
Remote Desktop = mstsc
Removable Storage = ntmsmgr.msc
Removable Storage Operator Requests = ntmsoprq.msc
Resultant Set of Policy (xp pro) = rsop.msc
Scanners and Cameras = sticpl.cpl
Scheduled Tasks control = schedtasks
Security Center = wscui.cpl
Services = services.msc
Shared Folders = fsmgmt.msc
Sharing Session = rtcshare
Shuts Down Windows = shutdown
Sounds Recorder = sndrec32
Sounds and Audio = mmsys.cpl
Spider Solitare Card Game = spider
SQL Client Configuration = clicongf
System Configuration Editor = sysedit
System Configuration Utility = msconfig
System File Checker Utility (Scan Immediately): sfc / scannow
System File Checker Utility (Scan Once At Next Boot) = sfc / scanonce
System File Checker Utility (Scan On Every Boot) = sfc / scanboot
System File Checker Utility (Return to Default Settings) = sfc / Revert
System File Checker Utility (Purge File Cache) = sfc / purgecache
System File Checker Utility (Set Cache Size to Size x) = sfc / cachesize = x
System Information System Properties = sysdm.cpl msinfo32
Task Manager = taskmgr
TCP Tester = tcptest
Telnet Client = telnet
Tweak UI (if installed) = TweakUI
User Account Management = nusrmgr.cpl
Utility Manager utilman
Volume Serial Number for = C: label
Volume Control = sndvol32
Windows Address Book = wab
Windows Address Book Import Utility = wabmig
Windows Backup Utility (if installed) = ntbackup
Windows Explorer = explorer
Windows Firewall = firewall.cpl
Windows Installer Details = msiexec
Windows Magnifier = magnify
Windows Management Infrastructure = wmimgmt.msc
Windows Media Player = wmplayer
Windows Messenger = msnsgs
Windows Picture Import Wizard (Need camera connected) = wiaacmgr
Windows System Security Tool = Syskey
Windows Script host settings = wscript
Widnows Updte launches = wupdmgr
Windows Version (shows your windows version) = winver
Windows XP Tour Wizard = tourstart
Wordpad = write
Zoom Utility = igfxzoom

Wednesday, September 22, 2010

23 How to Speed up Windows XP Running

Here there are tips taken from an article of foreign experts:

1. To reduce the boot time and improve performance, do not worry using third-party defrag software, simply use the Defragmenter tool artificial (built-in) Windows, will not be much different. And also, we recommend using Type Ultra-hard drive with 133 or Serial ATA (SATA) with 8-MB buffer.


2. If the RAM is less than 512 MB PC, then it should plus the capacity of memory.
It is relatively inexpensive and will help improve your system's performance
dramatically.

3. Make sure the file system used by Windows XP is NTFS. How to check:
a. Open Windows Explorer (My Computer)
b. Right click on drive C:
c. Click Properties.

If it turns out you use the FAT32 file system, then to change it
is in the following manner:
- Backup important data for now.
Run > ketik CMD" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">- Click Start> Run> type CMD
- After the Command Prompt window appears, type:
Code:
CONVERT C: / FS: NTFS
Note: Computers should not be interrupted when doing this conversion, and also in
virus-free state. The file system used by the bootable drive (normally C:)
can be FAT32 or NTFS. I highly recommend using NTFS
for superior security, durability and greater space efficiency.

4. Disable the File Indexing. File Indexing Service extracts the information from
documents and other files that exist on the hard disk and make a
"Searchable keyword index" (index search keywords),. This process can be imagined
be very burdensome to the system.

How it works as follows:
A user searches for words, phrases, or properties of a document, from
documents the hundreds or thousands, and he did not know the name of the
documents sought. Windows XP with the built-in search functionality can still perform
various types of searches without involving the Indexing Service. But a little more
long. Operating systems have to open each file when asked to help find what
user wants.

Most people do not need this search feature. Which normally requires
is a large corporate environment where thousands of documents placed on
at least one server. But if the only kind of system builder, which
most of his clients are small and medium-sized businesses, and if the client is not
require these features, I recommend to mendisfungsikannnya
(Disable) services.

How Mendisfungsikannya:
a. Open Windows Explorer (My Computer)
b. Right click on drive c:
c. Choose Properties
d. Remove the check (checklist) "Allow Indexing Service to index this disk for
fast file searching. "
e. Click the Apply button, appears: apply changes to "C: subfolders and files"
f. Click the OK button.
If any warning or error message appears (such as "Access is denied"), click the button
Ignore All.

5. Update VGA and motherboard chipset drivers, including BIOS and driver updates
configurations. Find the info-info about BIOS settings appropriately in the internet.

6. Empty the Windows Prefetch folder every three months or more.
Windows XP to record some of the data or applications that are often used to
make the process seem faster load when called by the user. This is good,
but for a long time, prefetch folder may become overloaded reference file
and applications are no longer used. If that happens, Windows XP
wasting your time and slow system performance, when making load
application or file. Nothing is important in that folder, and all its contents safe
to be removed.
Located in the folder: C: ¥ WINDOWS ¥ ¥ Prefetch
Once a month run the disk cleanup.

How:
a. Open Windows Explorer (My Computer)
b. Right click on drive C:
c. Choose Properties
d. Click the Disk Cleanup and delete all temporary files.

8. In Device Manager, Double click on IDE ATA / ATAPI Controllers device and
be sure to enable DMA on (enabled) for each drive that is connected to a Primary
Secondary controller or controllers.

Do this by:
a. Double click on Primary IDE Channel. then click the Advanced Settings tab.
b. Make sure the Transfer Mode was set to "DMA if Available" for both Device 0
and Device 1.
c. Do the same to the Secondary IDE Channel.

9. Wiring Upgrade.
In order to increase hard disk technology, which will encourage needed pengakabelan
better performance.
Be sure to use 80-wire cable Ultra-133 for all IDE devices and
use a socket connector that matches the Master / Slave / Motherboard.

Device if it's just one, it must be connected at the very end of the connector
ribbon cable (data cable), but not on the connectors in the middle of the ribbon cable, if not, then
would signal a problem occurs. At Ultra DMA hard drive, this could signal problem
prevent hard drive to maximize its potential.

10. Remove all spyware from your computer.
Use free programs such as Lavasoft AdAware artificial or SpyBot Search &
Destroy. Once the program is installed, be sure to check and update
download it, if any, before performing a search of spyware on your computer.

Anything either program finds can be deleted safely. All free programs
requesting the spyware to run will no longer work. If
free programs that are still needed to stay just one more install.

11. Dispose of all programs or unnecessary items from the routine (routin) Windows
MSCONFIG startup using the utility.

How:
a. Run > ketik MSCONFIG > klik OK" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">Click Start> Run> type MSCONFIG> click OK
b. kemudian hilangkan checklist (tanda centang) dari program yang" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">Click the StartUp tab-> then treat checklist (check mark) of program
undesirable.
Not familiar with these items? Visit the WinTasks Process Library. Site
includes system processes, applications and also known as spyware references and
explanations. Or it could be identified the name of the items directly with
use google.

12. Dispose of all unused programs from Add / Remove Programs in Control
Panel.

13. Turn off any and all unnecessary animations, and disable
(Disable) active desktop.
In fact, to optimize performance, turn off all animations. Windows Xp
offers a lot of different settings in this section.

How:
a. Click the System icon in Control Panel
b. Click the Advanced tab
c. Click the Settings button in the Performance box.
d. Eliminate checklist (tick) any option that does not want to run.
Or can just click on the Radio Button: Adjust for best performance.

14. If Windows XP can edit the Registry, do to improve performance
XP.
Can use to tweak the software or manually edit the registry. On the internet already
widely spread.

15. Visit Microsoft's Windows update site regularly, and download all updates
labeled Critical.
Download any optional updates at your discretion. (Remember, if the windows OS software
XP was pirated, do not try to update, can be given the "stamp" sign
same pirated Microsoft that will actually slow down the system when the booting and
running).

16. Update anti-virus in one week or even daily. Make sure that only one
the installed software. Combining more than one antivirus will only
invite disease for performance and kahandalan computer.

17. Make sure the font is installed less than 500 species just on the computer. More
fonts, the more lambatlah system. Although Windows XP is more efficient in handling
fonts of the previous version, but the excess will result in lower font
system.

18. Do not partition the hard disk. (Optional only)
NTFS File System Windows XP run more efficiently on one large partition. Data
no safer on a separate partition, and reformat is not needed to install
re Operating System (OS). One partition functions so that no restrictions
partition but will be limited by the size of hard drive capacity itself. So that
no need to resize partitions meghabiskan time and risk losing
data.

19. Make checks on the RAM to ensure system operates with
good.
I recommend using a free program MemTest86.
Once downloaded, can make a bootable CD or diskette (your choice) that will
conduct 10 tests on the PC's memory after you boot automatically
with a CD or floppy that is created. Allow all tests to run until at least
pass three tests of 10 tests completed. If the program encounters an error, turn off and unplug
computer power, remove the RAM memory, replace it with another and do more tests.
Remember, bad memory can not be repaired, only replaced.

20. If there is a CD or DVD recorder, look for updated firmware from the manufacturer.
In some cases, upgrade proved to be accelerating the recorder to a
free.

21. Non-enable (disable) service (service) is not important.
Windows XP install many services that are not needed. To determine
Any service that is not required, open the Black Viper site for configuration
Windows XP.

22. When a single view of Windows Explorer having problems when displaying
operating system files and block, do the following:
a. Open My Computer
b. Click Tools
c. Click Folder Options?
d. Click the View tab
e. Slide / roll down to "Launch folder windows in a separate process",
enable this option. After the computer is restarted, this option will run.

23. At least once a year, open the computer case and clean all the dust and
"Ruins." Meanwhile, also check the fan, if the rotation is still
proportional.
 

Statistic

Checkpagerank.net Google PageRank Checker Powered by  MyPagerank.Net

Followers

ONE STOP INFO Copyright © 2010 Community is Designed by Bie