Search

Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

How to improve your computer performances

Monday, August 2, 2010

If you have any questions leave a comments :)

1. Configuring the paging file.
How to increase paging file or Virtual memory?
In windows XP and Vista : Right My computerà go to Properties ->Advanced->Under Performance click on settings -> Un performance option select advance -> under Virtual Memory click on change -> select the drive and select Set option to increase the Paging file size as per the memory in the system available.

What is BitLocker? and how to encryption and decryption

Saturday, July 31, 2010

BitLocker is an operating system-level extension to Vista and Windows 7 that combines on-disk encryption and special key management techniques. The data and the operating system installation are both protected by two-factor authentication, specifically, a hardware key used in conjunction with a long passphrase.

 Windows 7 ultimate  includes BitLocker To Go, which takes the capability of BitLocker that performs bit-level full volume encryption and extends its use to removable storage devices such as USB keys, meaning if we lose our USB thumb drive, our data is safe

Forgot Administrator password Try this

1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)
2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”
3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
4. When you get to the
Welcome to Setup screen, press ENTER to Setup Windows now
5. The Licensing Agreement comes next - Press F8 to accept it.

What is cache memory?

Wednesday, July 28, 2010

Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory.

What is the difference between Unix and Windows?

Unix and Windows use completely different paradigms for run-time loading of code. Before you try to build a module that can be dynamically loaded, be aware of how your system works.

In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations in the program where the functions and data are placed in memory. This is basically a link operation.

What we can do if system was infected by Virus

Tuesday, July 27, 2010

"The only way to absolutely, positively clean a machine from a virus is to completely reformat the machine and reinstall the operating system, updates, applications and data from scratch."

It's simple really: consider the possibilities after you're infected with a virus:


1. Your anti-virus program successfully cleans it off.

2. Your anti-virus program thinks it successfully cleans it off, but in fact the virus has hidden itself so well that it remains. You're still infected, and you don't know it.

3. Your anti-virus program doesn't catch it and doesn't even try to clean it off. You're still infected, and you don't know it.

4. Your anti-virus program fails to clean it off and tells you. You're still infected, but at least you know.

Not Satisfied with the above , please try below steps and check:

how to protect my system from Virus..

Viruses are not the only forms of malicious code that may invade your system. Worms, Trojans, adware, spyware, key loggers together with viruses form part of malware running in the wild that may seriously harm your system and your data while also hogging system resources, reducing PC performance and Internet bandwidth. Here are seven ways of protecting yourself against malware.


Today, security threats come in all shapes and sizes and from a variety of sources including software downloads, peer-to-peer networks (e.g., Kazaa), floppies, CD or DVDs, emails and their attachments, chat rooms, your colleagues on the network and the Internet in general.

Few ways to protect your system from Viruses.

Tips for a secure password

Monday, July 26, 2010

What do online social networks, online banking and email accounts have in common? They all require passwords.

These passwords act like sentinels, keeping snoops and data pirates away from one's personal data. But bad passwords are as easy to crack as cheap locks. That means one can't be careful enough when picking a password.

“A good password should include a lot of the different options available on most keyboards,” says Lutz Neugebauer of Bitkom, a German technology industry association.

How to troubleshooting blue screen (BSOD) errors ?

First , before troubleshooting blue screen you should enable a complete memory dump on your system after Windows Installation. This is done under the system properties in Startup and Recovery. It's best to do this right after you install Windows, before you start getting any BSODs. Sometimes the blue screen will show the name of the driver that is causing the problem. If nothing else, you can look up the STOP code and see what the problem is.

The most important info to record from the blue screen is the technical info, it will look something like this:

*** STOP: 0x0000007B (0x00000032, 0x00002345, 0xABCDEF00, 0x00000000)


Ten Reasons to Upgrade to Windows 7

Saturday, July 24, 2010



  1. Aero Peak : To quickly peer past all open windows to look straight at the Windows 7 desktop, simply point to the right edge of the taskbar. All open windows will instantly turn transparent, making it possible to see what's on the desktop.
  2. Redesigned Taskbar : With Windows 7, getting an application icon onto the taskbar is as simple as right-clicking on the icon and selecting "Pin to Taskbar." Voila, it magically appears on the Taskbar.
  3. Aero Snap: With just about every laptop being sold now having a widescreen display, have you ever needed to position two documents side-by-side? Rather than tearing your hair out in frustration, Aero Snap offers a quick and easy way to "snap" windows into the left or right half of your screen simply by dragging Windows to the edges. (You can also snap windows vertically.)

Plan your Windows 7 migration

Are you thinking about migrating to Windows 7? It’s not hard, but due diligence and good planning are paramount for a successful migration. You need to follow best practices, which includes tapping into Microsoft’s readily available — mostly free — tools and resources

Seven tips will tell you everything you need to know for a smooth transition to Windows 7
1. Determine which of your existing PCs will support Windows 7
2. Determine which of your applications will run under Windows 7
3. Decide which version of Windows 7 is right for you
4. Assess the tasks involved and how you’ll manage the migration
5. Perform a test run with a pilot group
6. Migrate in stages
7. Train your employees



Windows 7 Minimum System Requirements


1 GHz or faster 32-bit (x86) or 64-bit (x64) processor
1 GB of RAM (32-bit) / 2 GB RAM (64-bit)
16 GB available disk space (32-bit) / 20 GB (64-bit)
Direct X 9 graphics processor with WDDM 1.0 or higher driver
DVD-compatible drive


Note: Some product features of Windows 7, such as the ability to watch and record live TV, BitLocker, or navigation through the use of “touch,” may require advanced or additional hardware. Windows XP Mode requires an additional 1 GB of RAM and 15 GB of available disk space.


Could Windows Vistas Pretty Looks Be To Blame For It Running So Slow?

If you have switched over from XP to Vista you surly will have known by now that Vista is much slower. This lack of speed has to do with Vista dedicating a lot of its resources to trying to “look pretty”. Making the operating system look nice is great and all but when it comes time to actually get some work done it can be a huge problem. In this article I am going to show you two quick ways to make your Vista perform a it faster but you are going to have to be willing to sacrifice some of Vistas looks in order to get more function. Keep in mind that there really is no point in having your computer look really nice since you are the only person that is really going to be seeing it.
If you are using the Home Premium, Enterprise, Business or Ultimate more likely than not you have the Aero effect turned on. This effect is designed to make your computers windows have a glass like effect that looks cool. It also allows you to have Windows Flip 3D which is just a fancy version of the Alt + Tab combination which allows you to cycle through your currently opened programs. If your not sure what the Flip 3D is, just open a few programs, hold down the Windows Button and press the Tab key a few times – that’s Windows Flip 3D. Now hold down the Alt key and press the Tab key a few times – that’s the old way of cycling through your programs. Here’s how to get rid of the Aero effect:

Why Cleaning Up After Windows Can Make Your Slow Computer Faster

So your computer’s slow and you have no clue where to start to make it faster? Try cleaning up your Temp folder. Your computer’s operating system is designed to run as quickly as possible but after time it will start to slow down (don’t worry this is natural). Why does this happen? See when your first get your computer it is completely “clean”. Then after you have used it for a while what happens is that it will start to slow down since it starts to accumulate “junk” in different areas of the computers operating system.
All you really have to do is to just go in there and clean up all of that junk – yes it’s that simple (well for the most part, you do also have to know how to tune your computer but that’s more in depth and beyond this article). This is why the idea of registry cleaners is so attractive – it cleans one area of your computer (your registry) to make it faster – but the big problem with registry cleaners is that they only clean one area while there are many different areas that need to be worked on to make your computer faster.

Registry Cleaners Can Provide Numerous Advantages

Registry cleaners happen to be software programs that are used to resolve certain problems that affect the Windows operating system. Such programs will remove those items that are unwanted and even redundant and in doing so will help in restoring the Windows registry to its normal state. Even though most people agree that using such programs is helpful, there are some people that believe that these programs are neither necessary nor effective.
Registry cleaners are used to solve problems related to configuration data present in the Windows registry and which is no longer required or wanted by the computer operating system. The data that has to be removed can be of any kind including information left behind by software that has not been uninstalled. Moreover, the data can also be any item of information that is no longer needed or it could even be malware oriented settings.

Image Spam

Image spam is junk email that replaces text with images as a means of fooling spam filters. 

Image delivery works by embedding code in an HTML message that links to an image file on the Web. Image spam is a larger drain on network resources than text spam because image files are larger than ASCII character strings. 
Larger files require more bandwidth and, as a consequence, cause greater degradation of transfer rates. 
If the recipient's email program downloads images automatically, the image appears when the message is opened. The image itself may be a picture or drawing of alphanumeric characters that appears as text to the viewer, although it is processed as an image by the user's computer. Many spam filters, especially older or less sophisticated ones, rely upon certain text criteria on which to make judgments. 

Such filters typically watch for predetermined words in the subject lines of e-mail messages, suspicious word patterns and word frequency. Image spam is not stopped by such filters because it contains no words that can serve as the basis for blocking messages. 

There are a number of approaches to dealing with image spam. In current versions of Outlook, for example, images are not automatically downloaded into messages unless the user has specified that messages from the source can be trusted.