Enter your E-Mail to subscribe and You will get a confirmation mail - read it.

Enter your email address:

Delivered by FeedBurner

Monday, December 31, 2007

NetVouz - Easy Social Bookmarking

NetVouz is a easy social bookmarking in which you can store your favourate sites online. In which you can easily categorize your folders according to the type of the bookmark. You can keep your bookmarks for Public or Private according to the use of privacy.

Here is a great advantage for firefox browser user. In firefox you will get an add-one for Netvouz.
After Installation you can see netvouz logo beside of the address bar of the browser.


While surfing websites if you want to add it in your netvouz account you have just click on Netvouz button. Then a new pop up window will appear to categorize it and to set priority. Before adding this you must have to create an account in netvouz. Netvouz is very very useful to the people who are surfing more websites an
d keep up them for the future use.

(Remember : firefox add-one is not working in Firefox 3 beta version. It works only <3 V )



Monday, December 24, 2007

Batch files Magic :Shutdown, Restart, And Stand By

In MS-DOS,OS/2, and windows, a batch file is a text file containing a series of commands intended to be executed by the command interpreter. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. Batch files are useful for running a sequence of executable automatically and are often used by system administrator to automate tedious processes.

Here is a technique to shutdown, restart , and standby of your PC by using batch file.

Just copy and paste below text in a notepad and save it "shutdown.bat" , "restart.bat",and "standby.bat" respectively.

Shout down: shutdown.exe -s -t 0
Restart:
shutdown.exe -r -t 0
Standby:
rundll32.exe PowrProf.dll, SetSuspendState Standby


You can see those files like this

To put those file in quick launch button menu you have to fallow these steps

Just drop and drag those file into quick launch menu.
Right click on each short cut and click on change icon.
Then you can change those file appearances according to your wish.

By these way you can easily access Shutdown,Restart,and standby options.


Wednesday, December 19, 2007

Defraggler - Alternative to Windows defragmenter

From Piriform, the company that brought you CCleaner and Recuva... they now bring you a file defragmentation tool... Defraggler! This is a very small utility with the size of 400KB.

It differs from other defrag tools on the market, by enabling you to quickly and simply defrag the files you want to, without having to process the whole drive. Simply run it, select the file and defragment in seconds. No more struggling with the Windows fragmentation tool!

  • Defrag Individual files
  • Compact and portable
  • vista support
  • Locate files on the drive
  • freeware
And remember like all Piriform products, Defraggler is completely free for both corporate and individual use.

Download from filehippo


Thursday, December 13, 2007

Blogger editor in Flock (The social Web browser)


Flock is a social web browser. It is the integration of Mozilla Firefox browser. It's options are exactly same as that of the Firefox with additional features. Media sharing is the main feature of this browser. In this you can uploads your photos directly into your account of the flicker . In this browser you will get media bar too.
For blogger user this browser is very advantageous for posting not only for blogger it is for live journal , Typepad , Wordpress also. A blogger editor is provided in this browser. By which you can posts directly form the web browser itself. No need to sign in again via blogger.com. Ofcourse you have to sign in indirectly with this editor. This editor is more useful when you are in offline. When you are in offline you can draft your post and save it. After entered to online you can directly post it into your blog.
Web clipboard is provided inside to save the matter you have typed.
Disadvantage of this browser is you can not get more add-ones and extensions like provided in Mozilla Firefox.

" I sent this post through flock."

See a logo here "Blogged with Flock"

Blogged with Flock




You can enable, disable, or modify the way that error reporting works on a Windows XP-based computer. When an error occurs, a dialog box is displayed that prompts you to report the problem to Microsoft. If you want to report the problem, technical information about the problem is sent to Microsoft over the Internet. You must be connected to the Internet to use the feature. If a similar problem has been reported by other users and information about the problem is available, you receive a link to a Web page that contains information about the problem.
To disable this feature from your system
1. Right click on my computer icon on your desktop.
2. Click on Properties
3. click on advanced menu
4. At bottom of the window you can see Error Reporting
5. Click on Disable error reporting



Tuesday, December 11, 2007

True Crypt : The OSS power

True crypt is an Open source tool for storing data securely. TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g.., file names, folder names, contents of every file, free space, meta data, etc).
Truecrypt supports two types of encryption process. One is standard truecrypt and hidden true crypt. Select standard truecrypt option is the better choice to the beginner. I already said in my previous posts by truecrypt we can create encrypts volumes for removale storage devices too. In the next option software asks you, to whether select the file or device. You select it according to your requirement.
Don't confuse to look for the created encrypted drive after encryption process. It has to mount. Select mount option for particular drive letter where the encrypted file is stored
The great feature of the truecrypt is its encryption algorithms. Here you can choose any encryption algorihms which is better fit for the choice of encryption level. True crypt allows only a larger and complex passwords only.

Note:
Be careful the user who are using it at first. I lost my 14GB data with wrong selection of options.
Be careful while selecting mount partitions. But don't have fear about data loss. You should not fear to do any experiment. In your life toooooo.

(Download )

Saturday, December 8, 2007

Which is correct?


My Live Signature : Online singature

Is it boring to write every time your name at the end of e-mail. Would you like to sign at bottom of your sending e-mail. Would you like to sign at bottom of your each post in blogger. Have a look at this site mylivesignature can do this job.

This site enable to the user to create their own signature. It give the html /java script to your signature . Use that code wherever you want to appear your singature. Below this post I signed my signature.
You will get a doubt that "What is the difference between this (mylivesignature) signature image and the normal signature image I uploaded in blogger while posting?" Let it clarify me.
When you are uploaded your signed image into your post that looks like an image you have uploaded. But when you use mylivesignature it exactly looks like signature. Keenly obeserve the the uploaded image and your signature image , you can see a Square box on blogger uploaded image. Isn't it? But it will not appear on your signature.

Blogger Tip:
Blogger user who wants to use this signature on every post, you fallow this method.

Get the html/java code from the mylivesignature. Copy it.
Opne your blogger account.
Click on setting options.
There again click the formatting option.
You find this option shown below.
There you have to paste the code you have copied.
And click on save setting.

Now you will get your signature on each and every post you publish.






Friday, December 7, 2007

Typogenerator : Online background generator



Typogenerator is a site that will generate backgrounds for your text. Just type whatever word you want to have a background and TypoGenerator will show you randoms of background including the text design and color of the word you have typed.
If you'd like the generated background, you can keep it and just change the text design and color or vice versa (keep text design change background) if it doesn't fit your taste. If you want to keep a copy of the generated typobackground in you computer, you can manually download it by right-clicking the image when it's in the 640x480 size view.

TypoGenerator uses images indexed from Google, meaning it's involve copyright issues that's why TypoGenerator stated that
"you may use images generated by typoGenerator on private websites, but NOT for any commercial applications. the images used for generating may be subject to copyright."

But for personal use you can use TypoGenerator to create typo background and use it freely.




Friday, November 30, 2007

The Power of Ccleaner- An OSS

My system slowed down. Most of the people says like this.
Find the reasons behind of it.
(I already explained about it in my previous posts)
Most probably,
1. Bulk of Temporary files stored in your computer.
2. Unexpected changes in windows registry entry.
3. Proper install and uninstallations of softwares.
3. Application which runs at system start up.

Are you agreeing my points.

Now all these problems can be solved by an Open source software i.e CCleaner
CCleaner consists of
Temporary file cleaner
Registry cleaner
Uninstaller
Startup
All the above problems can be
solved by the CCleaner

Here a major advantage only I want to say to you.

Are you observed?
You can't uninstall multiple applications by windows "Add/Remove Programs"
Even you can't select another application while uninstalling.

But here you can do multiple uninstallations at a time.
These are the advantages of a single and powerful software CCleaner





Creating Log Files of your own

You can create Your own log files by using note pad.

About Note Pad:
Microsoft Notepad is a word processing tool included with Windows and is installed by default under the Accessories program group. You can use it to create a log-type file that adds the current date and time each time the Notepad file is opened. This article describes how to create a log file with Notepad.

To create a log file in Notepad:
1.Click Start, point to Programs, point to Accessories, and then click Notepad.

2. Type .LOG on the first line, and then press ENTER to move to the next line.

3. On the File menu, click Save As, type a descriptive name for your file in the File name box, and then click OK. When you next open the file, note that the date and time have been appended to the end of the log, immediately preceding the place where new text can be added. You can use this functionality to automatically add the current date and time to each log entry.

Source of above Post: Microsoft.Support




Make windows Transparant by Vitrite


When I was reading Computerera (September 2007) Magazine I read an article in it.
In that they given about a small utility to make windows transparent.


I downloaded that utility and it is working nice. That utility is vitrite.

Download and install it. After installation the vitrite will appear at the tray icons.

To make windows transparnt press "CTRL+SHIFT+0,9,8,7,6,5,4,3,2,1," Simultaneously accoriding to your requirement of transparancy.






Download virus and Test Your Antivirus Software


Hey guys!

Are you using any antivirus software?

Have you ever tested that antivirus wheather it is working or not properly?

Here is a simple solution to do this.

Eicar (European Institute for Computer Anti-Virus Research (EICAR))
providing some of the virus test files.

Fallow this procedure

Open Eicar home page.
There you click on the link shown below.


Then you will get below window consists of virus test files.

You need to download above four files.
Make sure that before downloading shout down your anti virus. (Not your pc)

After downloading them save them on your hard disk.
Then start your antivirus and scan the folders.
If your antivirus detected them, then it is functioning properly. Other wise........? (You know)

Don't be tense about virus files.
They never harm to your computer.
Just they were built to test antivirus performance only.




Key Logger - A mighty Cop in your Machine


Key Logger surveillance software has the capability to record
1. keystroke
2. captures Screen Shots and
3. save it to a log file (usually encrypted) for future use.

Captures every key pressed on the computer viewed by the unauthorized user.Key logger software can record instant messages, e-mail and any information you type at any time on your keyboard.The log file created by the key logger can then be saved to a specific location or mailed to the concerned person. The software will also record any e-mail address you use and Website URLs visited by you.

Why You Need Key Logger?

Have you ever questioned what your spouse, kids or employees have been doing on the computer? Is your child misusing the Internet facility and taking secret chat with the stranger? Are your employees mailing your business data to your competitors? If you wonder how to tackle these serious issues, you need key logger software.


Features of Key Logger?
  1. Key Stroke Recording
    Record all keystrokes made on computer by the users!
  2. Screen-Shot Monitoring (Visual Surveillance)
    Facilitate to Capture entire screen snap-shots periodically so that you can see what was being displayed on computer screen in your absence when other user was working on your machine.
  3. Sending Computer user’s log of activities to you by Email automatically
    Send log in the stealth mode to user specified e-mail address (Email delivery).
  4. Saves The Log File
    Software records the encrypted log file which can later viewed by the user.
  5. Recording Multiple User account
    Record all users logged on your computer machine (including the Guest user).
  6. Password Protected
    The key logger software is password protected and prevents the unauthorized users to change its configuration setting.
  7. Hidden Installation
    Users can not detect about the key logger installation on the computer.
  8. Stealth Mode
    Key Logger will not appear on the Desktop, Add/Remove Programs, Control panel and even remains in hidden attribute in installation folder path.
Key Logger Soft wares and Download links:

Advance Key Logger (Download)
Actual Spy (Download)
Ardamax Key logger (Download)
Family Key logger (Download)
Home Key logger (Download)
Perfect Key logger (Download)
Actual Key logger (Download)


If we are be the unauthorized user what to do?
Here again a solution for it.
That is "Key Logger Killers"

keylogger killer (Download)
Keylogger Stopper (Download)

Keep the track of your system log when somebody misusing your system without your permission.




Add favourate folders By a Small Uitility

Freeware application FileBox eXtender adds keyboard-shortcut-accessible favorite folders to any Explorer window (including Save/Open File dialogs) so that you can quickly jump to any frequently used folder from the comfort of your keyboard.



Just you need download the free software FileBox eXtender (Click Here)

By this Software:
  1. Navigate easily through Windows folder maze with FileBox eXtender buttons placed on standard Windows file boxes.
  2. Access your favorite and recently visited folders and documents with one mouse click or hot key. Make the file boxes bigger to see more folders and files.
  3. FileBX buttons can be also placed on Explorer windows.
  4. Adds push-pin button to keep windows on top, and roll-up button to hide window contents except for title bar.





Thursday, November 29, 2007

Find unknown file extensions

One day I have downloaded "Partition Logic" Software from its site.

It was looking like a "partlogic-0.67" file.
I thought that it was a ".rar" (Winrar zip file).

But finally I found that it is ".iso" file.

Before finding it I was cracked.
Whenever extracted that file it is showing errors.
Finally I find the mystery behind of it.

It is ".iso" file.

I did this:


Open windows explorer.
Open tools menu.
Click on
folder options
Then you can see above window.
There you find "
Hide extensions for known file types"
Just remove the right option.
Then click on "OK"

Now all files will appear with their extensions.

By this way you can find unknown file extensions.




Have a Fun with Folder

Can you disappear any folder (But you should not use hide option)?
Here is a funny technique.

Suppose I have a folder "My works".
It contains important files. Now I want to hide it.





"Right click" up on the folder to be hide.
Click on "properties".
Click on "customize" option.
There at bottom you can see "Change Icon.." option. Click up on it.

Then you can see this



In the above while you are scrolling you can see three empty icons.
There will not appear any image.
Click up on it and click "OK" button.

Then the original folder icon will become empty icon. Like this



Now the Problem is to how to hide the name of "My Works". To do this
Right click on "
My Works"
Click on "Rename" option.

And then type "ALT + 0160" Simultaneously.

Then the folder will hide.


Here above folder is there. It will not hide entirely.
Just it disappears.
hat empty icon folder works like a normal folder.

How to recover the original foder?
Before performing the above technique you need to remeber the folder name to be hide. Ok.

Right on the empty space.
Click on Properties.
Click on Customize option.
Click on Change icon button.
Select the original windows folder icon.
Then click ok.
Then rename it.

You will get the orignial folder with its contents.



Secret Of Capture on Your KeyBoard


Do you know?
you can capture entire screen only by your keyboard without any third party software.
Have a look at your key board.

There is key looking with the label "PrtScn/SysRq" (Print Screen/System Request).





When You Click on this key - Whatever on the screen will be captured and stored in the clip board.

Then you open any image viewer software -> click on
edit many and then click on paste option.

Or

Open Windows utility
Paint
and paste it.

Screen capture will be paste on this utility.





Friday, November 23, 2007

Very Important SecurityTips

The openness of the Internet has dramatically transformed global communications, making it easy for people around the world to exchange information. But the very same openness also creates an enormous problem. Anyone can access the network, yet not everyone has good intentions.

Some engage in malicious mischief by unleashing destructive software programs, while others view hacking computer networks as sport. Then there are people with criminal goals in mind.

To avoid becoming a victim of misguided pranksters or cyber-crime, take the time to examine the security of your personal data. Here are our recommendations, along with links to more detailed information:

1. Use anti-virus software:
Viruses spread rapidly and can damage or destroy your computer. New ones appear almost daily. It's critical that you install and update anti-virus software regularly. Use the program to scan all the files on your system once a week, deleting the infected ones.

2. Be wary of e-mail attachments:
A virus can hide in an attachment. Opening it will unleash the virus. Don't open an attachment from anyone you don't know. Even if you do know the sender, an infected attachment may have been surreptitiously sent from an infected machine. The safest thing to do is to scan the attachment with anti-virus software before you open it.

3. Install a firewall on your computer:
A firewall is a software program that blocks unauthorized access to your computer. This is particularly important if you have a broadband connection, such as DSL or a cable modem. Windows XP has a built-in firewall, so make sure it's activated if you use that operating system. If not, we recommend ZoneAlarm. You can download it for free for personal use from Zone Labs.
Or better to use open source software "Comodo Firewall".

4. Protect your passwords:
Many online services, such as banking, brokerage and e-mail require the use of passwords. A secure password is the first line of defense against cyber-snoops. Use a different password for each account, don't divulge them to anyone and change them periodically.

5. Update security patches for your operating system and web browser:
You've probably read about security "holes" that turn up periodically. Once they are discovered, you can download fixes. For Windows users, an easy way to update your system is click on the Windows Update option under the Start menu.

6. Back up your data:
Make copies of your files in case they become corrupted, your system fails or your computer is damaged or stolen. Get in the habit of doing this regularly, at least once a week.

7. Log offline when you are done for the day:
You are most vulnerable when connected to the Net. If there isn't a good reason to remain online, disconnect from the networ.

8.Use some of the third party encryptions softwares:
True crypt is the better tool to encrypt your files ,folders ,entire hard disk and your USB too....
Download and install it form www.truecrypt.org/


Follow these tips and you will enhance your personal security and the health of your PC.



Adding shortcuts to Task Bar




Generally we may access some of the files or folders frequently.

Some times it may iritate to go through my computer and selecting a particular file.

Here windows task bar shortcut techniques is the better solution for it.

Just you right click on the task bar -> Toolbars -> New Folder

And then select the folder you want to add from the hard disk where it was placed earlier.

Just copy and paste into that folder which files you may require to access frequently.

(Here "Freq Access" is my own folder not by default with windows)





Tuesday, October 30, 2007

How to rename Recycle Bin ?

You can change the name of Recycle Bin desktop icon

1-Click Start menu > Run > and type “regedit” (without quotes), to run Windows Registry Editor

2- Find and go to following

“HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}”

3- Change the name "Recycle Bin" to whatever you want

Please Note :Incorrectly editing the registry may severely damage your system.



Monday, October 29, 2007

Secret Music In Windows XP

Microsoft Windows XP is playing a cool music during installation. It is a pleasant little tune that you’ve probably never heard, unless you were present when Windows was being installed on your PC. After that it’s never played again, unless you know where to look for it.

To hear what you’ve been missing, just follow these:

Make you way to

C:\WINDOWS\system32\oobe\images

and look for a file called "Title.wma"

This Music will not play at the time of fresh installation of Windows XP.
When you choose "Repair" option while your installation You can here the sound.

Difference is
At the time of fresh installation audio drivers are not yet installed. So you can not here the music.
While you are repairing you can here. Because already audio driver is installed.



Saturday, October 27, 2007

can you create Folder?

It is looking Funny!

So try to create these folders (or files)

CON, .CON , CON. ,COM1 ,COM2 , COM3 ,COM4 ,LPT1 ,LPT2 ,LPT3 ,PRN ,NUL ,AUX

Once Check it Out.

It is impossible.

Interesting !

You aren't allowed to create folders with names that are the same as the ones that have been used for various devices on a PC since the DOS era.

"CON" refers to "console" in DOS.
"PRN" refers to "printer,"
"LPT1," "LPT2," etc., and "COM1," "COM2," etc. refers to the communication ports.

The bug has been tried and tested in both Windows XP Home and Professional. If you try to make a folder named "CON" (case insensitive), Windows XP renames it back to what it was. So creating a new folder with the name "CON" just renames it to "New Folder".

The bug seems like a variable that got treated as a string or vice-versa. Trying to create the folder from a cmd prompt failed with an error "The directory name is invalid.".

This also works when you try to create a file called "CON", or "CON.". ".CON" shows up the way it should.

Methods To Create Above Folders:

Method 1:

STEP1: goto command prompt
STEP2: type in prompt e:\> ((mkdir \\.\e:\con))
STEP3: verify by typing ((dir \\.\e:\con))
STEP4: delete the file or folder ((rmdir \\.\e:\con))
Note::Not necessary for to go only E:,u canm create in any Drive.

(This method is bulky and confusion. So You can Use)

Method 2:

Create Folder
While name Type CON and then stroke the key ALT+0160 on numeric key pad.
(CON -> ALT+0160)
Then you can create CON folder and other described folders.

It means that when you type a folder name with simple
ALT+0160 you can create empty folder.
There is no name for a folder.
Here we are using "CON " (CON with space).
This is the tricky logic here.





Ten tips to keep your computer running smoothly:

1. Never, never, turn your computer off with the power switch until Windows has shut down.
The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.

Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.
Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.

2. I highly recommend that you purchase an UPS (uninteruptable power supply)

This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.
An UPS is far superior to a surge protector and will save your computer from almost any power type of disaster. (See #1 above for what happens when your computer crashes.)

3. Backup, backup, backup:

any data you cannot afford to lose to at least two separate physical drives. So backup data to floppies, Zip disks, CD-RWs etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.

4. Run Scandisk and Defragment at least once a month:

This will keep your hard drive healthy and prevent crashes.
Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.
Or Do like this,
right click on my computer,
click on manage,
here you can see
a tree like structured links, click on Disk defragmenter.
and click on specified drive and click on analyze and then click on disparagement.

5. As each new Windows program is installed and uninstall ed, it leaves behind parts of itself that can slow down or crash your computer:
These are mostly .dlls and other shared files.
It's also very possible when uninstalling a program that needed Windows system files can be deleted. When your computer asks if you want to uninstall shared files it's usually safest to say no -- even if your uninstall program claims the files are not being used.
Old Windows drivers can be found by booting into Safe Mode, then opening Control Panel/System/Devices and ridding your system of old drivers.

Or Your registry hierarchy gets unknown application values. This cause system registry may breaks down.

6. Do keep at least 100 MBs of your C:

If you use Windows Me or Windows XP then you should have 200 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use Cleansweep included in Norton Utilities to clean up your drive. If you do use Cleansweep or another hard drive cleaner, do not delete shared files unless you back them up.

Use Ccleaner software for deleting temporary files.

7. Do not let a lot of programs load up when you start your computer.

They use valuable memory and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.
Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.
or Do like this
go to start menu,
click on Run,
type the command "msconfig"(without qoute)
click on "startup" menu
and now you can enable or disable required programs at srart up.

8. Do use a virus checker regularly.

Everyone should use a virus checker.
The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.
The second best thing is to use is the free online virus checker Housecall provided by Trend Micro.
Some of anti virus softwares are:
AVG,Avast,Norton,Trend Micro Internet Security,Clam Win,McAfee,Spyware Doctor with antivirus,Kaspersky,pondo

9. If you have a high speed Internet connection you need a firewall program.

A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.

You can use Zone alarm or Comodo (Open source) firewall third party softwares.

10. Keep track of the software disks you receive
Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.









Monday, October 22, 2007

Difference Between Hybernate and Standby

Standby:

Your machine recovers quickly as your data is stored in RAM. The slower part is waking up the peripherals. Although your machine is in "standby" the power has been cut to items such as your hard drive and monitor. You're running your machine in a very low power mode, but it is still on. This mode can be useful if you're on a notebook and need to conserve your battery while you step away.

Hibernate:

The big difference is that your PC has shut down and is not pulling power. Another difference is that your data is saved to your hard disk and not RAM. This makes it a safer, but slower option for shut down and resume.

Note:
Not all PCs have the capability and are configured to Hibernate. If yours is, to see the Hibernate option on your XP shutdown screen, hold down the Shift key when you shut down.

Some comments up on hibernate and standby:

comment 1:

I've always loved hibernate. It's great for when you are running out of power and don't want to lose what you're working on.

Still, I used hibernate for a while on my home machine, but my wife hated it because it took to long so I switched it to standby. It's much faster, but I constantly get these annoying errors about data lost on $DMFT or something like that.

comment 2:

I prefer Hibernate for my desktop, as it allows me to pick up right from where I left off. Slow as a it may be, it is not nearly as slow as a clean boot.

comment 3:

It uses about as much hard disk space as you have RAM. Thus, if you have 1 GB of RAM, you can expect hibernating to take about 1 GB of hard disk space. This will be cleared up when you bring the system back up. Whether this is an "enormous chunk of your hard drive" depends on your particular system and your definition of "enormous".

My choice is depending up on your hardware configuration and your flexibility you use hibernate or standby


Clean your computer regularly and give more life

I have a dirty secret. I've never cleaned my computer. Sure, I've dusted my monitor, but I haven't taken off the cover or tried to reach the crumbs lurking inside my keyboard.

"Your computer could fry if you don't keep it clean," says Jonathon Millman, chief technology officer for Hooplah Interactive.Dust clogs the vents behind your computer, which causes your CPU to heat up—and heat is the biggest cause of component failure in computers. Regular cleaning could save you costly maintenance fees down the road.
Keep your computer in tip-top shape by following Millman's guide to a spotless computer system.

Preparation:
  • screwdriver
  • can of compressed air (available from computer dealers or office-supply stores)
  • cotton swabs (do not use a cotton ball)
  • rubbing alcohol
  • paper towels or anti-static cloths
  • water
Note: Always turn your computer off before you begin and unplug all the cords.

STEP 1: Inside the case:

Using a screwdriver, remove the side of the case that's opposite your motherboard. Touch as little as possible inside the computer, keeping fingers away from cards and cords.

Blow air around all of the components and along the bottom of the case, keeping the nozzle four inches away from the machine. Blow air into the power supply box and into the fan (from the back of the case). Lastly, blow air into the floppy disk and CD drives. Wipe the inside of the cover with a lightly moistened cloth before replacing it.

Millman recommends doing this every three months if your case sits on the floor, if you have pets that shed, or if you smoke. Otherwise, every six to eight months is fine.

STEP 2: Outside the Case:

Run a cotton swab dipped in rubbing alcohol around all of the openings on the back of your case. Give them one swipe with the damp end of the swab and one swipe with the dry end. Do this as often as you clean the inside of your computer.

STEP 3: Keyboard

Turn the keyboard upside down and gently shake it. Most of the crumbs and dust will fall out. Take a can of compressed air and blow into and around the keys. Next, take a cotton swab and dip it in rubbing alcohol. It should be damp, but not wet. Run the cotton swab around the outside of the keys. Rub the tops of the keys. If you have a laptop, follow the same procedure but take extra care with your machine. Do this monthly.

STEP 4: Mouse

Rub the top and bottom of your mouse with a paper towel dipped in rubbing alcohol. Open the back and remove the ball. Wash the ball with water and let it air dry. To clean inside the mouse, dip a cotton swab in rubbing alcohol and rub all of the components. Scrape hard-to-remove grime with your fingernail. Finally, blow air into the opening. Replace the ball and the cover. Do this monthly.

STEP 5: Monitor

Moisten a paper towel or a soft, lint-free cloth with water. (You can also buy monitor cleaning products at computer-supply stores.) Don't spray liquid directly onto the screen—spray the cloth instead. Wipe the screen gently to remove dust and fingerprints. Never touch the back of the monitor.

(I found this article in Microsoft.com)


I don't know some file formats

You know a software is the collection of different types of files.

One day when I was looking deep into a software I saw a file with the extentions XXX.nb.
It is a unknown file format for windows.
How to open?

Just I searched the web and I got a great website dedicated for only file extensions.

It improves your knowledge about different file formats in windows.

click Here
http://www.fileinfo.net/



How to Start Multiple Applications via Start Menu


Whenever we start a program via the start menu, the start menu will automatically disappear after we've clicked on one of the program shortcut. So when you need to launch another program, you need to open again the start menu. Meaning, the start menu can only open one program one at a time (by default).


Luckily, there is a way to prevent start menu from closing every time you open a program shortcut by holding down the SHIFT key while clicking on the shortcut. This can help you save time if ever you need to open different program, by holding the SHIFT key the start menu will not disappear after you open one program.

This also works when you want to delete different program shortcuts in the start menu.


Thursday, October 11, 2007

Why Don't you use open source softwares

You know that each any every software need some registration.
It requires registration code to access the full version of the software.

I have a doubt that why people are not using open source softwares.
These are free and powerful.

In my machine I use all open softwares and free softwares.
There is no trial version and limited capabilities.

Just look at these and tell me is there any utility require ?

Operating system:
When I was purchased my machine Windows XP Pro Service pack 2
preloaded. So there is no need of Xp installed again.

Then I installed application softwares given below.......

Anti Virus:
I am using ClamWin 0.91.2
Or
You can use Avast home edition for free

Spyware:
I am using Spybot search and destroy.

Firewall Security:
I am using Comodo Firewall security
or
You can use Zone Alarm.
(zone Alarm is a free software for only firewall It requires registrtion for spam blocking)

Temporary error cleaner and registry cleaner:
I am using Ccleaner for temporary files .And useful for Registry cleaner.

Zip Software:
I use 7-Zip for zip files.

PDF (Portable Document File) Reader:
I use FoxitReader for pdf files viewer.

Office (Word,PowerPoint,Excel):
I use Openoffice org 2.2.

CD burner:
Generally you can get it from the manufacturer.
If ever you require use InfraRecorder .

Image Viewers:
Google provides free software Picassa for maintaining Images.
Or
Use OSS Irfan view.

Vedio and audio Players:
I am using VLC Player for Vedio.
and Real Player

Internet:
Generally most of the internet applications are free.I prefer

Browser:Mozilla Firefox
Download Manager: Orbit Download Manager

Now tell me Is there any need to buy a software?

Caution:
Don't use pirated versions, and Cracks.
Because there is lot of effort behind of software making.
Software companies are spending cores of rupees for making a single software.
Don't steel others hardwork.

Raviteja G