Friday, December 5, 2008

Security Optimization

Use these programs to kill infections and prevent them from attacking your machine in the first place.

  • Comodo Firewall Pro (free) this excellent firewall has been rated as one of the top tools of its kind by the independent testing site Matousec , which found that Comodo has the highest level of “antileak” protection(in sense, a measure of a Firewall’s effectiveness). It offers two-way protection and a great view into your system and your internet connection as well.
  • Avast (Free) A lightweight antivirus utility, Avast won’t weigh down your system by consuming too many system resources –yet it does a great job scanning
  • AVG Antivirus Free Edition (Free) AVG’s excellent antivirus software is similarly prudent with PC resources, simple to use, and easily configurable.
  • Spyware Blaster (Free) keep your system in top running form by stopping the installation of active X-based malware and other types of spyware.
  • Spybot Search & Destroy (Free) A longtime favorite, spybot offers live protection against spyware installations, and scans your system for pre-existing spyware and squashes it.
  • Ad-ware 2008 (free) some people like to use more than one scanner.

Ad-ware does a great job of scanning, and it lets you put potentially damaging software in a quarantine area, where you can later restore the item if it isn’t dangerous.

  • Trend Micro HijackThis (Free) it you think your PC is infected with spyware, but your spyware killer can’t track it down, try this freebie, after Hijack This analyzes your Registry and file, which you can upload to one of several HijackThis Web forums for the community to analyze.

Wednesday, December 3, 2008

Creative’s Zen X-Fi : An All-Around Star


Creative’s Zen X-Fi is a tremendous digital music player , offering more out of the box features than Apple’s recently revamped iPod’s . the X-Fi has great sound, superb headphones, expendable storage via SD Card, and the ability to stream and download music from your PC wirelessly. It looks great, too. Its features differentiate this player from the competition. Not only can you download music, video and images wirelesslt to the device, but you can also stream media from your PC from creative servers, or from a computer that’s running on an open network.

Creative’s heralded X-Fi Xtreme fidelity Audio playback deserves much of the credit fro this player’s amazing sound. It delivered dep, clean well-defined audio.

As much as I found to like about the X-Fi, it does have some limitations. It doesn’t work with Mac OS X (only with XP and Vista); its online chat application doesn’t work well; and you won’t get the same degree of integration with third –party speaker systems, car stereos, and accessories that you would with the ubiquitous iPod.

The masses may continue to think iPod first when they need a new MP3 player. But you check out the X-Fi , too : it might be the most innovative, features-packed player on the market, and it’s an absolute steal for the price.

Sunday, November 16, 2008

Power Supplies

The computer’s components would not be able to operate without power. The device in the
computer that provides this power is the power supply (Figure 1.36). A power supply converts
110 volt or 220 volt AC current into the DC voltages that a computer needs to operate. These
are +3.3 volts DC, +5 volts DC, –5 volts DC (ground), +12 volts DC, –12 volts DC (ground),
and +5 volts DC standby. The 3.3 volts DC and +5 volts DC standby voltages were first used
by ATX motherboards.
FIGURE 1 . 3 6 A power supply

Power supplies are rated in watts. A watt is a unit of power. The higher the number, the
more power the power supply (and thus your computer) can use. Most computers use power
supplies in the 250- to 500-watt range.
Classic power supplies used only three types of connectors to power the various devices
within the computer (Figure 1.37): floppy drive power connectors (Berg connectors), AT system
connectors (P8 and P9), and standard peripheral power connectors (Molex connectors).
Each has a different appearance and way of connecting to the device. In addition, each type
is used for a specific purpose. Newer systems have a variety of similar, replacement, and additional connectors.

Expansion Slots

Fig:1.4




The most visible parts of any motherboard are the expansion slots. These look like small plastic
slots, usually from 3 to 11 inches long and approximately 1⁄2 inch wide. As their name suggests,
these slots are used to install various devices in the computer to expand its capabilities. Some
expansion devices that might be installed in these slots include video, network, sound, and disk
interface cards.
If you look at the motherboard in your computer, you will more than likely see one of the
main types of expansion slots used in computers today:
 ISA
 PCI
 AGP
 PCIe
 AMR
 CNR
Each type differs in appearance and function. In this section, we will cover how to visually
identify the different expansion slots on the motherboard.
ISA Expansion Slots
If you have a computer made before 1997, chances are the motherboard has a few Industry
Standard Architecture (ISA) expansion slots. They’re easily recognizable because they are
usually black and have two parts: one shorter and one longer. Computers made after 1997
generally include a few ISA slots for backward compatibility with old expansion cards
(although most computers are phasing them out in favor of PCI). Figure 1.4 shows an example
of ISA expansion slots.
PCI Expansion Slots
Most computers made today contain primarily Peripheral Component Interconnect (PCI)
slots. They are easily recognizable because they are short (around 3 inches long) and usually
white. PCI slots can usually be found in any computer that has a Pentium-class processor or
higher. Figure 1.5 shows an example of several PCI expansion slots.
AGP Expansion Slots
Accelerated Graphics Port (AGP) slots are very popular for video card use. In the past, if
you wanted to use a high-speed, accelerated 3D graphics video card, you had to install the
card into an existing PCI or ISA slot. AGP slots were designed to be a direct connection
between the video circuitry and the PC’s memory. They are also easily recognizable because
they are usually brown, are located right next to the PCI slots on the motherboard, and are
shorter than the PCI slots. Figure 1.6 shows an example of an AGP slot, along with a PCI
slot for comparison. Notice the difference in length between the two.
PCIe Expansion Slots
The newest expansion slot architecture that is being used by motherboards is PCI Express
(PCIe). It was designed to be a replacement for AGP and PCI. It has the capability of being
faster than AGP while maintaining the flexibility of PCI. And motherboards with PCIe will
have regular PCI slots for backward compatibility with PCI.
FIGURE 1 . 5 PCI expansion slots


FIGURE 1 . 6 An AGP slot compared to a PCI slot

There are seven different speed levels for PCIe, and they are designated 1X, 2X, 4X, 8X,
12X, 16X, and 32X. These designations roughly correspond to similarly designated AGP
speeds. The slots for PCIe are a bit harder to identify than other expansion slot types because
the slot size corresponds to its speed. For example, the 1X slot is extremely short (less than an
inch). The slots get longer in proportion to the speed; the longer the slot, the higher the speed.
The reason for this stems from the PCIe concept of lanes, which are the multiplied units of
communication between any two PCIe components and are directly related to physical wiring
on the bus. Because all PCIe communications are made up of unidirectional coupling between
devices, each PCIe card negotiates for the best mutually supported number of lanes with each
communications partner.
AMR Expansion Slots
As is always the case, Intel and other manufacturers are constantly looking for ways to
improve the production process. One lengthy process that would often slow down the production
of motherboards with integrated analog I/O functions was FCC certification. The
manufacturers developed a way of separating the analog circuitry, for example, modem and
analog audio, onto its own card. This allowed the analog circuitry to be separately certified
(it was its own expansion card), thus reducing time for FCC certification.
This slot and riser card technology was known as the Audio Modem Riser, or AMR.
AMR’s 46-pin slots were once fairly common on many Intel motherboards, but technologies
including CNR and Advanced Communications Riser (ACR) are edging out AMR. In addition
and despite FCC concerns, integrated components still appear to be enjoying the most success
comparatively. Figure 1.7 shows an example of an AMR slot.
CNR Expansion Slots
The Communications and Networking Riser (CNR) slots that can be found on some Intel
motherboards are a replacement for Intel’s AMR slots. Essentially, these 60-pin slots allow
a motherboard manufacturer to implement a motherboard chipset with certain integrated
features. Then, if the built-in features of that chipset need to be enhanced (by adding Dolby
Digital Surround to a standard sound chipset, for example), a CNR riser card could be added
to enhance the onboard capabilities. Additional advantages of CNR over AMR include networking
support, Plug and Play compatibility, support for hardware acceleration (as opposed
to CPU control only), and no need to lose a competing PCI slot unless the CNR slot is in use.
Figure 1.8 shows an example of a CNR slot.
FIGURE 1 . 7 An AMR slot

FIGURE 1 . 8 A CNR slot

Sunday, November 9, 2008

Get rid of a Spyware carrying program that won’t uninstall

The uninstaller that comes with a malicious program isn’t likely to do much good. Still, you might run it with Revo Uninstaller a freebie that launches an app’s own uninstall function and then scans the hard drive and registry for left over’s. if that doesn’t work, try to manually delete the program file or folder. If Windows won’t permit that, check out cedrick collomb’s free unlocker . once you installed, unlocker comes up automatically when Windows refuses to delete , move or rename a file or folder; or you can launch it from the file or folder’s context menu. It also shows you that you what processes are hanging on to the culprit and lets you kill them. You can also try Windows’s system Restore.

In windows XP, select start>all program>Accessories>System tools>>system restore> choose restore my computer to an earlier time, and then click next. Pick the earliest restore point available, and follow the prompts.

In Vista, Click start>type rstrui and then press, Select choose a different restore point, click next and check show restore points older than 5 days. Click next, finally, pick the earliest restore point you see available and follow the prompts.

If that fails to solve things, run system restore in safe mood reboot your PC and press just before Windows loads. At the resulting menu, select safe mood with Command prompt and pick your operating system. At the command prompt type C:\windows\system32\restore\rstrui (just rstrui in vista) press and then run system Restore from there.

Still can’t get rid of the various thugs? Try hijack this ( adwarefixit.com ) a free utility that creates a very technical report on your system’s suspicious windows behavior. You probably won’t be able to make heads or tails of it, but plenty of Internet forums exist where friendly people can help you decipher Hijack this reports and can recommended a course of action.

In nothing else works, reformatting your hard drive is the last, desperate measure to take, but back up all of your data first. In fact, if you already have a full backup of your data, make an extra backup anyway, the more the safer.

Friday, November 7, 2008

Livescribe Pulse Rewrites Note Taking


The pulse “smartpen” from Livescribe is part pen, part recorder, and part nothing you’ve ever seen before.

The pulse records sounds through integrated stereo microphones and then creates audio notes that it “ties” to your written notes. The device works with special notebooks and ink cartridges; the paper bears scarcely noticeable dot patterns that provide a reference grid. This allows the pen to jump to specific moments in your note-taking history and playback audio or voice notes recorded at that time.

To record audio while you write, you tap the printed “record” button at the bottom of your sheet of paper .when you are done recording, you tap “Stop”. The pulse records audio with surprising clarity and directional precision: the pen’s on-board microphones performed well in my tests.

Livescribe gives you two ways to playback notes.

One is to tap a printed pattern at the bottom of each page, bringing up the menu on the pen’s OLED screen. You then select the day and time of audio to play back.

The second way to play back audio is by tapping written notes in your notebook’ when you do so , you can hear the audio that was recorded at the exact moment you wrote those notes. This feature is extremely useful for recording shorthand notes and interviews.

Once you plug your pen into its USB cradle and connect it to your PC, you can se a page-page achieves of your notes. From there you can us the desktop app to listen to and manage your voice recordings.

The software is well designed, but it lacks an optical character recognition mode for converting your handwriting into text. The Livescribe pulse may have limited appeal, but it’s certainly innovative and a whole lot of fun to use.

Tuesday, November 4, 2008

Speed up AVG Free Antivirus


The latest version of AVG free (www.avg.com) does more than detect viruses; it has stronger protection against malware and malicious sites. But one of the new security tools, link scanner, can bog down some PCs. Link Scanner checks Google, MSN and Yahoo searches results for exploits or phishing expenditures. The tool disguises itself as an Internet explorer component so that malware programs can’t detect it and hide from it.

If link scanner is a drag on your PCs system resources, you can remove it by downloading and reinstalling AVG Free. When installation starts, chose ADD/remove components, click next for a list of components, uncheck Link Scanner, and finish the process.

You will probably need to reboot, and make sure to do a manual update to grab the most current virus definitions. To suppress any annoying warnings that link Scanner isn’t working , choose tools, Click Advanced settings*ignore faulty conditions ,check the Link Scanner check box and click OK. If you still aren’t happy with AVG try Avast Home Edition.

How do You get Windows to stop asking you for a password when you boot your PC?

Windows requires a log-in pas word for a reason: to protect you. If some one else can log in as you. They may be able to send out e-mail under your name, access your encrypted files, log in to Websites as you, and even make purchases using your credit card number.

You can protect yourself from the worst of those offenses without log-in passwords at other times. For instance, you can set up your e-mail system to require a password, and you can keep sensitive files in a True Crypt vault, but giving up the log in password removes a layer of security.

Still, if only trustworthy people have access to your PC, and if you take the right precautions, turning off Windows native password protection probably won’t do you harm.

Turning the password off is simple: select start* Run (Just start in Vista) type control user passwords2 and press uncheck users must enter a user name and password to use this computer .when you click OK or apply. A dialog box will ask you which user should be logged on automatically. Entering your name and password this onetime will free you from having to type them in again.

Sunday, November 2, 2008

Load up Free Apps for Your 3G iPhone

If you want to save cash by loading, great free programs on your new toy. Here are some suggestions.

Air Me: (airme.com)This utility enables you to upload digital photos directly from your iPhone to your flicker account. Snap a pick with your iPhone camera, and Air Me geotags it (if yoy want it to) and posts it on your flicker page within a minute. The process is much easier than emailing iPhone pics to you and then uploading them manually.

AOL Radio: want to listen to tunes when your flight is delayed in Phoenix? AOL Radio scratches that itch, to the tune of more than 350 radio stations from across the United States. It’s an audio –streaming App that works staggeringly well even at the slower EDGE speeds.

Evernote: (evernote.com) Save notes, photos, and voice recording to a web storage platform that you can access anywhere, with every note. If you are planning on using your iPhone to take a lot of notes or to snap a bunch of pictures while you are out and about, this App is must –have.


Google Mobile App: think of it is Firefox 3’s “Awesome Bar” for the iPhone. This search –bar –on steroids not only suggests popular query matches for you once you type in a few letters , but also searches you phone for any contact names that start with the same letters. Tapping a search result launches it in a browser window, and tapping a contact name lets you message or call that person.

Pandora: (pandoara.com)Thanks to the iPhone version of the free music site, you may never need to use the iTunes Music store again –as long as you like your music to play randomly. Just enter an artist’s name, press the crate button and listen as your selected artist and similar acts play in no particular order.

Friday, October 31, 2008

Listen to the Internet on your Alarm Clock


At first glance Aluratek’s Internet Radio alarm clock with built in Wi-Fi looks like an ordinary alarm clock, Unlike run of the mill clock, however , it connects to your home network to aces more than 11000 channels of internet radio, and it can also connect to a library of tunes on your PC.

Sound is decent but a bit tinny-as you’d expect from an alarm clock. True audiophiles may be disappointment.

Still, this radio is fun to use. If you’re bored with the offerings on your FM radio, the Alurateck Internet Radio alarm clock can expand your musical options.

Thursday, October 30, 2008

Intel Will Release New Core Chips in Late 2008


High-end Laptops and desktops could become faster and more power efficient when Intel releases CPUs that are built around its new Nehalem micro architecture late this year.

Initially the company will target the chips, to be called Core i7, at power desktops and workstations, But scaled –down versions will eventually appear for consumer desktops and laptops; thy will be upgrades from Intel’s current Core 2 chips.

Nehalem is supposed to eliminate bottlenecks found in Intel’s earlier Core Micro architecture, thereby improving system speed and per-watt performance.

“Nehalem is going to be about more performance, and people always wants more performance,”Nathan Brookwood, principal analyst at insight 64, notes.

Down the line, Intel will integrate graphics capabilities with the CPU. That strategy should bring more power efficiency, particularly to laptops, since as a result an integrated graphics chipset will no longer be necessary. However, gamers will still need discrete graphics card to achieve the best graphics performance.” If you look at what Intel is doing towards desktops and laptops chips by integrating graphics that could very well reduce power consumption.”Brookwood says.

Nehalem chips will still carry the Core brand name, but Intel will omit the numeric reference to 2 for its mainstream desktops and laptops. “The Core i7 brand is the first of several new identifiers”, says Intel spokesperson George Alfs.

Packing between two and eight processor cores, the first Nehalem chips will include Quick path interconnect (QPI) technology, which integrates a memory controller and provides a faster pipeline for the CPU to communicate with system components such as the graphics card and other chips. Each Core will able to execute two software threats at a time- so a desktop with four processor cores, for example , could run eight threads simultaneously for quicker application performance.

Calibrate Your HDTV to High-Def Perfection


You spent a lot of money on your fancy new HDTV, but the set’s picture probably isn’t as good as it could be. If you want to see exciting sports events and movies that look the way the broadcaster and filmmakers intended, you need to calibrate your HDTV.

Fine-tuning your picture with just your eyeballs and instincts is theoretically possible. But if you want to get it right, you should use a DVD based calibration tool. You likely already have THX optimizer, since it comes on every commercial DVD bearing a THX logo. But you don’t have all of it. Some of the optimizer’s tests require special blue glasses that you must buy through mail order from THX.com. The glasses cost only $2 Plus an additional $2.50 for shipping and handling.

THX offers a decent set of test patterns, although they’re not as complete and well explained as some stand alone products. Nor are the written instructions as helpful as the narrated ones on stand-alone discs.

Not surprisingly, considering THX’s background in cinematic audio, the optimizer can also assist in setting up your home theater’s surround-sound system.

Imaging Science Foundation’s $30 HDTV calibration Wizard (imagingscience.com) is a tool co-created by Imaging Science, Microsoft, and monster cable. The disc walks you through calibration without using a bunch of unnecessary tech jargon.

The Wizard uses live video instead of test patterns; the clips are easier to look at, and thy give you a better sense of what your TV’s picture will look like. For instance, to set the black level, you get a close-up of man’s black shirt and coat, and you simple adjust the setting until you can se the difference between two.

Once you get the TV right for the DVD input, jot down those video settings on a piece of paper; then reenter them for each of the other inputs, tweaking them a little as needed until the image looks as good as possible.

Wednesday, October 29, 2008

Unmountable Boot Volume Error Message

Computer Crashes, they seem to happen at the most inconvenient times. Always when you need the computer the most. I've run across this boot error message many times since Windows XP was released and luckily most of the time this problem can be solved with a few simple steps.

Basically the error means that Windows XP is having trouble booting from Drive C. Following the steps below, you should be able to troubleshoot this problem and get your computer back and running.

Causes of Unmountable Boot Volume

Many times this error occurs when I have swapped a hard drive and used the wrong IDE cable to connect it. If your computer uses an Ultra Direct Memory Access (UDMA) hard disk controller, and you use a standard 40-wire connector cable to connect the UDMA drive, you may experience this error. Make sure you are using the correct IDE cable.

Also, if your BIOS settings are configured to force the faster UDMA modes, this error may occur. In this situation, restart your computer and enter the BIOS and load the "fail-safe" default settings and reboot.


If neither of these issues are the cause for the Unmountable Boot Volume, then the issue most likely is caused by a damaged BOOT.INI file in the root directory of the boot drive or file system corruption.

Follow the steps below to correct these file system issues:

1) Start your computer with your Windows XP CD-ROM, or with Wnodws XP Boot Disks.
2) When the Welcome to Setup screen appears, press R to Repair the installation using the Recovery Console
3) If you have a dual-boot or multiple-boot computer, select the Windows installation you want to access
4) Type the administrator password when you are prompted, if no administrator password is set then just press Enter
5) At the command prompt, type CHKDSK /R and then press Enter
6) Once CHKDSK has finished checking and repairing the hard drive, type EXIT and press Enter to restart your computer

If this procedure does not work, repeat it and use the fixboot command in step 5 instead of the chkdsk /r command. FIXBOOT writes a new partition boot sector to the system partition. The fixboot command is only available when you are using the Recovery Console.

Tuesday, October 28, 2008

Dell’s Slick Studio Hybrid Pc


Dell’s new studio hybrid makes a strong impression with its stylish design, and its price will make you take notice too. A basic configuration starts at $499 without monitor; configuration with a 19 inch LCD cost $1064.

Dell bills the studio hybrid as being 80 percent smaller than a typical desktop. To achieve this feat of miniaturization, the Hybrid uses notebook-computer components. The Test configuration had a2.1 GHz core 2 Duo T8100 CPU, 2GB of memory , a 250 GB Hard drive , and Intel mobile 965 Express Chipset integrated Graphics. The system isn’t expandable, so it has no graphics option beyond the integrated Intel Graphics.

What’s most noteworthy about this system is that you don’t pay premium for the miniaturized design.

What’s least noteworthy is the machine’s performance. It mustered a score of only 79 on our World Bench 6 tests, tying the mark garnered by the HP Touch Smart IQ506, which likewise uses notebook components; neither of these systems is in the same league as value PCs configured desktop guts. Graphics performance was weak as well: the studio Hybrid failed to muster playable frame rates on either of gaming tests.

The studio Hybrid Blah performance limits its versatility, but the idea of having stylish, unobtrusive system to connect to my television appeals to me. Suddenly, using a PC as a digital video recorder seems plausible.

Monday, October 27, 2008

Unlock Your Mobile Phone


If you travel internationally , you can save money by buying a local, prepaid SIM card and swapping it into your phone,instead of paying high roaming rates to your U.S cellular provider. Most U.S phones, however , are locked to a single carrier and function only with SIM cards from that company. Here's how to unlock your mobile handset for use on any GSM network.
First try to find a free code online that might unlock the phone. You can visit unlockitfree.com
or bilemo.com/unlock or you can being by searching for your phone model online, using terms such as "Nokia 6820b free unlock code" You will be prompted on such sites to enter phone's unique |ME| number (usually found under the battery), the model , And your carrier. With that data, the site will generate several codes and instractions for typing them into the handset.
I recommend trying the first code returned at a few sites (since they can generate different results), instead of running though a full list of codes at one site.
If you unsuccessful, try following the same process at a paid site , such as mobilecodez.com

Toyota and Sony Develop a Personal Transporter


Toyota is developing a Segway-like personal transportation device called the Winglet, partly based on robotics technology from sony.
The Winglet looks like a slimmed-down version of the Segway.It can carry an average size person a littile over 6 miles at a speed of arround 3.7 mph. Toyota hopes to see commecialization of it in the early 2010s.
The smallest model weights about 22 pounds and has a range of just over 3miles. The medium and large versions both weight about 26 pounds and have double the range. Sll hsve a cruising speed of 3.7 mph-a brisk walking pace. In comparison, the Segway i2 Weighs 106 pounds , can travel up to 24 miles, and has a top speed of12 mph.

Flip Mino captures clear, sharp Video clips.


Pure digital has made video posting easier than ever with the $180 Flip Mino, the latest model in the Flip series of pocket camcorders. If you have used the Flip Video or the flip ultra, you will know how to operate the Mino; even its new features are easy for a first time user to master. The Mino adds touch sensitive controls, but they may be too touchy for some users. In our testing we found it easy to play back or delete clips accidentally by brushing a finger against the buttons.

Also new on the Mino is the location of the flip out USB jack on the top of the device .It makes the Mino slightly less unwieldy to plug into your computer’s USB port. When connected, the Mino can upload clips directly to AOL Video, my space, or you Tube; you also use the USB connector to charge the device battery (it has no power cord). Thanks to a new Video engine, the Mino produces great looking SVGA resolution (640 by 480) MPEG-4 AVI Clips at a frame rate of 30 frames per second. And even in indoor settings with mediocre lighting, The Mino still turns out clear, sharp clips.

The Flip Mino is more expensive than its rivals, such as the $100 creative Vado, but you get what you pay for.

The Mino offers superior Video quality (and it’s compatible with Macs, too) making it worth the extra scratch.

Why doesn’t Vista’s System Restore actually restore the system?


Poor disaster recovery is one of windows Vista’s most vexing problems. some utilities-usually big security suites that must be on at all times to protect you—interfere with system restore.

One work around is to run system restore in Safe mood. Reboot your PC and press before windows start loading (you may need a few tries to get the timing right).Select Safe mood. Once Windows is up, try system restore.

Is a long time solution available? Not really. Uninstalling your security software might help. But there’s no guarantee, and you will need to replace that software with something else. Trying to uninstall it is probably not worth the trouble unless the program is giving you a lot of other problems.

Disabling and re-enabling System Restore as a possible fix. But do that only after you have successfully restored you system or completely given up, as that action erases all of your existing restore points. If you are ready to give it try, here’s how:

v Click start, type sysdm.cpl and press

v In the resulting system properties dialog box, click the system protection tab.

v You will see the available Disks list. Uncheck all discs that are checked.

v When you attempt to uncheck C: a warning will come up asking if you really want to turn off system restore. Click Turn System Restore Off.

v Back in system properties, click Apply. Wait while windows processes that command.

v Recheck the box next to C: and then click Apply again.

v Click creates to make a new restore point. You should be set for your next emergency.

Unlock Vista’s Hidden Boot Screen


If you are sick of staring at the same old startup screen every time your Windows Vista PC churns into action, you are not alone. From now on you can unlock an alternative Vista boot screen with just a click of the mouse.

Windows Vista has a hidden boot screen that you can activate, and it’s totally different. Instead of the boring progress bar, you will see a soft aurora against a black background.

Click start, type msconfig in the search field, and press After you click through the UAC prompt, as system configuration window will open. Select the Boot Tab.

In the Boot Tab, check the box marked no GUI boot. Click Apply and then OK. Windows will prompt you to restart the PC, so click restart.

The next time your computer reboots, you will see the aurora screen with a black background and the text “Starting Windows Vista” at the bottom. If you decide to restore the original startup screen, just go back into the system configuration tool and uncheck the No GUI boot option.

Saturday, October 25, 2008

Titan's Better Backup


It can't create partition images, but neobyte solution's $40 Titan backup does just about everything else;backup files (including ones you have open), compress backups to .Zip files or to excutable .zip archives, and secure them with 256-bit AES encryption.Options include the ability to run other software before and after backups and the ability to remember log-in information for backing up to prtected network locations. I had no problems backing up to network folders, flash drives, CDs, or DVDs-or via FTP.
The excellent Titan interface intuitively combines tabbed dialog boxes and step-by-step wizards. Alas, it's now competing with the feature-rich Nova Backup,which costs only $10 more.

5 Downloads to make your Wi-Fi life easier


At home, at work, and on the road, you can often connect to Wi-Fi networks and hotspots for internet access. Here are some free or cheap software tools to help you find safe Wi-Fi networks and protect yourself against snoops.

WeFi (Free) We-Fi presents you with a map showing all nearby hotspots that you can connect to it also tells you whether the networks are encrypted or open, and notes their signal strengths. Double click any hot spot shown on the map connect. if you want to meet up with people who are connect to hotspots near you, click the people tab , and you’ll see list of folks nearby. You can then obtain more information about any of them, and contact them as well.

Plug and Browse ($40, free demo) If you regularly connect to more than one wireless or wired network-one at home and one at work, for example you know that a new connection fails if your adapter is stuck on the old settings. This exceedingly simple tool permits you to create and use predefined network settings profiles for each network that you visit

Wi-Fi Guardian (trial for 30 days ;$5 per 1 GB transferred) This program sets up a virtual private network (VPN) for you when you connect at hotspot, or when you want to protect you wireless transmissions. Run the software, log in, and choose a server(Currently in the US and UK), and everything you do will be hidden through encryption.

Xirrus Wi-Fi Monitor (Free) If you use both windows Vista and Wi-fi, Xirrus Wi-Fi monitor may be one of the most useful vista tools you can download. It automatically displays your connection’s signal strength the SSID of the network you’re connected to, and your current IP address. Visually, in radar monitor fashion, it also displays the wireless network you’re connected to, as well as any other networks nearby.

Friday, October 24, 2008

To Make Easily Logo Or Banners

In different causes we need to make LOGO and BANNER,But if we don't have sufficent knowledge about photoshop or other graphics, it is difficult to make Logo or Banner.If you have Internet you can make logo or banner to take easily from website.Doing so go to www.text2logo.com
There is varities design of logo and banner To click here you will find new pages and here you can make easily logo of banner of your choise and then save it as image of jpg form.

Thursday, October 23, 2008

Internet Privacy

What's so important about Internet Privacy?
Every time you open a browser to view a web page, order something online, or read your email in a web based viewer that information is stored on your computer for later use. Whether you are viewing the weather online, reading sports, catching up on the latest world news or viewing something a little more private, all that information is stored in your computer. Windows operating systems store all this material in what are called Temporary Internet Files or cache. Web pages may store bits of information about who you are when you visit web sites in files called cookies on your computer. Your web browser will store a list of web sites you've visited and places you've gone in a history file in your computer. Even if you are not online, programs will store histories of the files you've opened, played, or viewed.

Generally there might not be any reason to worry about all these files in your computer, but what if you sell your computer and all that information is left for someone else to see. Maybe friends and relatives visit and use your computer and you dont want everyone to know what files you are running on your computer. Then you are going to want to know how to delete these files.

Even if you are not worried about privacy on your computer, you may be surprised to realize how much hard drive space all this information takes up. If you are running out of drive space, you may want to delete these files.

How can I delete these files?

For Internet Explorer 5 and above, you can follow these directions to clear out temporary files and delete cookies.

1) Open Internet Explorer and click on Tools
2) Click on Internet Options
3) On the General Tab, in the middle of the screen, click on Delete Files
4) You may also want to check the box "Delete all offline content"
5) Click on OK and wait for the hourglass icon to stop after it deletes the temporary internet files
6) You can now click on Delete Cookies and click OK to delete cookies that websites have placed on your hard drive.

To clear the Internet History in IE:

1) Open Internet Explorer and click on Tools
2) Click on Internet Options
3) On the General Tab, in the middle of the screen, click on Clear History
4) Click OK

To clean up other temporary files on your computer in Windows 98 or higher:

1) Click Start, Programs (or All Programs), Accessories, System Tools, Disk Cleanup
2) Choose the correct drive usually C:\
3) Check the boxes in the list and delete the files

How to Delete Your Windows Vista Logon Password

How to Remove Your Windows Vista Logon Password
When Windows Vista first installs, it asks you for a password for your account. Then each time you log onto the computer you have to type the password in before you can access Windows Vista.

This security feature is nice to keep your information separate and private from the other users on the computer. However if you are the only user on your PC and the password prompt is annoying, you may want to consider removing the password and bypassing the logon process altogether.

Listed below you'll find the simple and quick procedure for removing your Vista password.
) Click on Start, then Click on Control Panel

2) Click on the User Accounts and Family Safety link

NOTE: if you are in the Classic View of Control Panel, you won't see this link, continue on to step 3

3) Click on the User Accounts option

4) In the "Make changes to your user account" section, click the Remove your Password link for the user.

5) On the next screen, enter your current password

6) Click the Remove Password button to confirm that you would like to remove your account password.

7) Close the User Accounts window

8) Restart your computer and test the system.

Now that your Windows Vista user password has been removed, you will no longer need to log inot Windows Vista. Instead when your computer starts, it will now continue loading through to your desktop automatically.

Master/Slave Settings vs. Cable Select

Although I covered most of the ways to speed up Windows boot time in another article, I encountered a unique roadblock recently that made me write this article.

During the last week I was asked by a customer to upgrade one of their office computers from Windows 98SE to Windows XP. Normally this is pretty standard, however because their current hard drive was only a 20GB with a gig or so remaining I wanted to upgrade their hard drive as well.

I proceeded to ghost the drive to a larger hard drive and then installed an upgrade version of Windows XP on top of Windows 98 to preserve all of their settings and programs.

Everything went flawlessly, until I was finished...
After I completed the Windows XP upgrade, I shut down the computer completely and restarted it. The computer took FOREVER to boot into Windows XP. It was literally 2 minutes before I saw the Windows XP logo screen and another 30 seconds more before the desktop appeared. This was definitely a problem.

After checking multiple settings in the BIOS, I compared the old and new hard drives. Everything seemed to be normal, except one. The old hard drive was setup to Cable Select and as my normal routine I had set the new hard drive as a Master drive. I changed the new hard drive to Cable Select, rebooted the computer, and the Windows logo screen came on seconds after the POST screen as before. Therefore, I have to add one more item to my list of ways to make Windows boot faster. Try changing the hard drive from Master to Cable Select, check the boot up speed and switch back to Master if you don't see a change.

Master/Slave Settings

Now for a refresher course on hard drive connections. When connecting more than one hard drive to a computer on the same IDE controller, you generally have to assign one as the primary (master) and one as the secondary (slave). You do this by changing the jumpers on the hard drive next to the power connector. Normally, the drive will have a diagram to let you know which jumper should be set for a master drive and which to set for a slave drive. You'll notice in the picture below the jumpers are circled on the end of the drive and the top of the drive shows the diagram to follow.

Master/Slave Settings

After changing the jumpers, connect the hard drive cable from the motherboard to the hard drives. Under normal circumstances, the end of the drive cable attaches to the Master hard drive, while the inside connector on the cable connects to the Slave drive.


What About Cable Select?

Cable Select (CS) settings were designed to make it easier to connect hard drives because you didn't need to bother with setting the Master/Slave jumpers. You just connect the drives and depending on where you connected them to the cable the computer would know which is Master and which is Slave...in theory. Now comes the confusing part.

With cable select, you first needed a special 40 conductor IDE cable that would determine master/slave connections. This was different from the normal IDE cables at the time. Also, the Master connector on CS cables was the inside connector not the end connector. This made for a very confusing switch from everyday master/slave configurations.

80 conductor Ultra DMA cables WILL determine the Master/Slave settings through Cable Select however. So as technology advances, Cable Select as a concept may still catch on. With the newer Ultra DMA cables, you can set both drives to Cable Select (CS), connect them and they will work. Another change with the 80 conductor cables, the Master connector is on the end of the cable where it should be. In situations where you are using a newer Ultra DMA drive and cable, you can use Cable Select or standard Master/Slave jumper settings and the drive will boot properly.

In my scenario to start this article, the change from Master/Slave to Cable Select for this particular computer reduced the Windows boot time by more than 2 minutes.

How to Delete Undeletable Files in Windows

Many times when trying to remove an unwanted program, especially a piece of adware or spyware, you may run across a file that is undeletable by any normal method. When you try to remove it you'll receive the error message shown below telling you "access denied" and explaining the file may be in use. You may also receive one of the following messages.

Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.
Make sure the disk is not full or write-protected and that the file is not currently in use.



So if the file is in use, how do you delete it?

I'll show you several ways of removing these types of files and even some freeware programs that help you remove these pesky undeletable files.

Access Denied - Error deleting file


Windows 95/98/ME

If you are using Windows 95, 98, or Windows ME, the easiest way to remove an undeleteable file is to boot to a DOS prompt and manually delete the file. Before you do this, you'll want to make a note of the location of the file including the entire path to it. Follow the steps below to delete these types of files.

If you already know the path to the file, please skip to Step 7
  1. Click on Start, Find, Files and Folders
  2. Type the name of the undeletable file in the Named or Search For box
  3. Make sure the Look In box shows the correct drive letter
  4. Click on Find Now or Search Now and let the computer find the file
  5. Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to

    c:\windows\system32\undeleteablefilesname.exe
  6. Close the search box
  7. Locate a boot disk for your version of Windows, if you do not have a boot disk, follow the steps on the link below to create an emergency boot disk.

    How to Create an Emergency Boot Disk for Windows

  8. Shut down and restart your computer with the boot disk in your floppy drive.
  9. The computer will boot to a DOS prompt that will look similar to

    c:\

  10. Type the following command and press Enter to delete the filer, substituting the phrase with the actual path and file name you discovered in Step 5 above.

    del

    Example:

    del c:\windows\undeleteablefile.exe
  11. Remove the boot disk in the floppy drive and restart your computer
  12. The file should now be deleted.

Windows XP

In Windows XP, there are a couple ways to remove an undeleteable file, a manual way, and a couple automated ways using some freeware programs. First, I'll show you the manual way.

Manual Method


If you already know the path to the file, please skip to Step 7
  1. Click on Start, Search, All Files and Folders
  2. Type the name of the undeletable file in the box shown
  3. Make sure the Look In box shows the correct drive letter
  4. Click Search and let the computer find the file
  5. Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to

    c:\windows\system32\undeleteablefilesname.exe

  6. Close the search box
  7. Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window
  8. Leave the Command Prompt window open, but proceed to close all other open programs
  9. Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager
  10. Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
  11. Minimize Task Manager but leave it open
  12. Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. You can follow the example below.

    Example: to change to the Windows\System32 directory you would enter the following command and Press Enter

    cd \windows\system32

  13. Now use the DEL command to delete the offending file. Type DEL where is the file you wish to delete.

    Example: del undeletable.exe
  14. Use ALT-TAB to go back to Task Manager
  15. In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.
  16. Close Task Manager
Programs to automatically delete a file

Remove on Reboot Shell Extension
This is a nice extension that loads into the right click menu. All you have to do is right-click on a file and choose "Remove on Next Reboot" and the file will be deleted the next time the computer restarts. Although it probably should only be used by more advanced computer users since it may be TOO easy to delete files using this program.

Pocket Killbox
A simple .exe file that you can use to delete undeleteable files, although the program will also delete temporary files, edit the HOSTS file, and more. A definite must have program when you are fighting an annoying spyware or adware program that won't remove.

Unlocker
Unlocker is another program that runs from the right click menu. Its simple and very effective. The website even has a side by side comparision of other programs that accomplish this task.

Using one of the three tools shown above, you should be able to remove those annoying undeleteable files once and for all.

Monday, October 20, 2008

How to Set Yahoo As Your Default Email Program

If you use web-based email like Yahoo or Gmail, you know the biggest drawback occurs when you click on a link on a web page to email someone and you realize the default email program on your computer is not the web based email one. Instead of opening Yahoo Mail, Outlook Express or some other client-side email program opens. Of course, if you have Yahoo Mail Plus, you could setup Outlook Express or any other default email application to use it. But is there a simple way to set your default email application to Yahoo Mail or Gmail.

There are actually two ways to accomplish this, unfortunately only one way works in both Windows XP and Windows Vista. If you follow the steps below you should be able to use the mailto links on a web page to email someone easily.

Using Yahoo Messenger

The first way to set Yahoo as your default email program is to install Yahoo Messenger. Yahoo Messenger can be download at http://messenger.yahoo.com. If its installed correctly it will set Yahoo as your default email application. You will need to install the Browser Services option to make this work properly. Without the browser services installed, you still cannot set Yahoo Mail as your default.

Installing Yahoo Messenger with Browser Services
Once Yahoo Messenger is installed, follow these steps to set the default email program.

1) Open Control Panel
2) Double-click on Internet Options
3) Click on the Program tab
4) Select Yahoo Mail from the drop down list (as shown below)


Setting the Default Email program in Windows XP
5) Click Ok
6) Close Control Panel

Unfortunately, this procedure DOES NOT work with Windows Vista computers.

Using YAttach!

YAttach! is a free simple to install program developed by a fellow named Chris Wood. It was created to allow someone to attach files to Yahoo Mail but works great at opening Yahoo Mail with a new message window all filled out when you click a mailto link on a web page. YAttach works in Windows XP and Windows Vista.

YAttach set as default email

Yattach! sets itself as the default email program in Windows and will work in Internet Explorer, Firefox, and other browsers. When you click on a mailto link you'll see a window pop up similar to the one below, then it will open Yahoo Mail and create a new message with the To: field already filled in.

Yattach
Sometimes, the program will appear to hang at the screen above instead of opening Yahoo Mail. This issue can be easily resolved by logging into Yahoo Mail and choosing the option to "keep me signed in".

YAttach! is the easiest to use program to allow web based email programs the ability to send documents directly from your computer or intercept mailto links clicked on web pages.

Download YAttach!

There is also a program called GAttach! that accomplishes the same thing for Gmail. My only complaint about that version is that it creates a message in the drafts folder instead of opening a new message window. Because of that issue, I prefer the Gmail Notifier. During the installation of the Gmail Notifier be sure to check the box for "use for outgoing email".

How Can I Remove the Grum Trojan from my system?

What is the Win32.Grum.a Trojan?
An email disguised as a Internet Explorer download from admin@microsoft.com contains a Trojan downloader that infects the computer with a virus named Win32.Grum.

Hijackthis shows the trojan horse adds the following information or similar lines to the Windows registry

O4 - HKCU\..\Run: [Firewall auto setup] C:\DOCUME~1\User\LOCALS~1\Temp\winlogon.exe

The infected file is stored in the Temp directory under Local Settings for the logged in User, and is autostarted in the following registry locations:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

admin@microsoft.com email infected with Grum


How Can I Remove the Grum Trojan from my system?

1) Disable System Restore

2) Restart in Safe Mode

3) Once in Safe mode, click on Start, Run

4) Type REGEDIT and press Enter

5) Navigate to the appropriate registry section by clicking on the plus signs (+) next to

  • HKEY_LOCAL_MACHINE
  • Software
  • Microsoft
  • Windows
  • CurrentVersion
  • Run
6) Right-click and delete the following entry in the right-hand side

Firewall auto setup = %User Temp%\winlogon.exe"

%UserTemp% is the Temp folder usually in the following location
c:\Documents and Settings\{user name}\Local Settings\Temp

7) Repeat Step 5-6 above for the following location as well

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

8) Close the Registry Editor

9) Restart the computer in Normal Mode

9) Scan your computer with online virus scanner like Housecall, BitDefender, or eTrust or download and install an antivirus program and run a complete scan. A list of online scanners is below, some however will only scan but not remove issues.

10) Open My Computer, Right-click on Drive C, click on Properties, and click Disk Cleanup to delete other temp files

11) Turn System Restore Backup on


Sunday, October 12, 2008

How To Repair Damaged or Corrupted Thumbs.db Files

Thumbs.db files can sometimes become damaged or corrupted which can cause some very specific problems in Windows.

Sometimes one or more damaged or corrupted thumbs.db files can cause problems when navigating around folders with multimedia content or they could be the cause of error messages like "Explorer caused an invalid page fault in module Kernel32.dll" and similar messages.

Repairing thumbs.db files is a pretty simple task considering Windows will regenerate the file when the particular folder it's contained in is viewed in the "Thumbnails" view.

Follow these easy steps to repair thumbs.db files.

Difficulty: Easy
Time Required: Repairing thumbs.db files usually takes less than 15 minutes

Here's How:

  1. Open the folder that you suspect the damaged or corrupted thumbs.db file to be contained in.

  2. Locate the thumbs.db file. If you can not see the file, your computer may be configured to not show hidden files. If that is the case, change the folder options to allow the display of hidden files.

  3. Once the thumbs.db file is located, right click on it and choose Delete.

    Note: If you can not delete the file, you may need to change the folder view to something other than the Thumbnail view. To do this, click on View and then choose either Tiles, Icons, List, or Details. Depending on your version of the Windows operating system, some of these options may vary slightly.


  1. To recreate the file, click on View and then Thumbnails from the menu in the folder that you deleted the thumbs.db file from. This will initiate the Thumbnails view and will automatically create a new copy of the thumbs.db file.

Tips:

  1. Windows Vista does not use the thumbs.db file. The thumbnail database thumbcache_xxxx.db in Windows Vista is centrally located in the \Users\[username]\AppData\Local\Microsoft\Windows\Explorer folder.


What to Do When XP or 2000 Won't Boot

If Windows XP (or 2000) refuses to start, press F8 right after you turn on your PC but before the Windows log-on appears (it may take a few attempts to get the timing right). At the resulting menu, select Last Known Good Configuration to restore your Registry to an earlier date.

If this doesn't get your PC working, reboot and press F8 again, but this time select Safe Mode, and then choose Start, All Programs, Accessories, System Tools, System Restore. Follow the wizard's instructions and pick an appropriate backup.

If that approach doesn't work either, or if you can't even get to this menu, use your emergency boot floppy. If your hard drive's boot sector or Windows' basic boot files have been corrupted, this disk will circumvent the problem and boot you into Windows. If you don't have an emergency boot floppy, you may be able to use one created on another PC running Windows XP or Windows 2000, but there's no guarantee that it will boot your machine.

To make one, insert a blank floppy disk into drive A:, select Start, All Programs, Accessories, Command Prompt, type format a:, and press Enter. When asked if you want to format another disk, type n and press Enter. Type the following commands, pressing Enter after each one.

xcopy c:\boot.ini a: /h xcopy c:\ntdetect.com a: /h xcopy c:\ntldr a: /h

Now type exit and press Enter to close the window. Remove the floppy disk and label it "Windows XP boot floppy." Put this emergency disk in the floppy drive of your inoperable machine and boot up. Windows should run with no problems. You could simply keep the floppy in the drive all the time, but to truly fix the problem, launch the command prompt as described above, type xcopy a:*.* c:\ /h, and press Enter.

If the emergency boot floppy doesn't work, try the Recovery Console, a Windows utility that provides a DOS-like command line from which you can run some repair programs. It's tricky to use if you're not accustomed to command lines, and you can damage your data, so be careful.

If you have a Microsoft Windows CD-ROM, you can get to the Recovery Console by booting from that CD and pressing any key when you're told to 'Press any key to boot from CD'. At the 'Welcome to Setup' screen, press r for Repair.

If Windows XP or 2000 came with your computer and you don't have a Microsoft Windows CD-ROM, the Recovery Console might be on one of the CDs the vendor bundled with your PC. But it might not. Fortunately, the Recovery Console is hidden in a free, downloadable Microsoft program called Setup Disks for Floppy Boot Install. Visit Microsoft's site to download the setup-disk file that works with XP Professional; available too is the XP Home version, which will also work for Windows 2000, Me, and 98.

When you run the download, it puts the XP installation program, including the Recovery Console, onto a set of six floppy disks. To get to the Recovery Console, boot from the first floppy, and then swap disks as prompted until you reach the 'Welcome to Setup' screen. Press r to open the Recovery Console.

Figure 1 below shows a list of the Recovery Console's most useful commands. For detailed information on a particular command, type the command followed by a space and /?, as in chkdsk /?. (Not all the commands will be available if you don't have a Windows CD-ROM.)

Figure 1: Recovery Console Commands

Command Function
Chkdsk1 Checks disks for errors.
Diskpart Creates and deletes partitions.
Extract2 Extracts files from compressed.cab archives.
Fixboot Writes a new boot sector.
Fixmbr Writes a new master boot record.
Help Lists the Recovery Console commands.
Footnotes:
1 If you load the Recovery Console from floppy disks, chkdsk may complain that it can't locate autochk.exe. When it asks for that file's location, point it to c:\windows\system32.
2 Extract is not available if you load the Recovery Console from floppy disks.