Search
How to improve your computer performances
Monday, August 2, 2010
Labels:
Windows
Posted by
Unknown
at
10:37 PM
0
comments
What is BitLocker? and how to encryption and decryption
Saturday, July 31, 2010
Labels:
Windows
Posted by
Unknown
at
12:39 AM
0
comments
Forgot Administrator password Try this
4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now
Labels:
Windows
Posted by
Unknown
at
12:04 AM
0
comments
What is cache memory?
Wednesday, July 28, 2010
Labels:
Windows
Posted by
Unknown
at
8:32 PM
0
comments
What is the difference between Unix and Windows?
In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations in the program where the functions and data are placed in memory. This is basically a link operation.
Labels:
Windows
Posted by
Unknown
at
8:25 PM
0
comments
What we can do if system was infected by Virus
Tuesday, July 27, 2010
"The only way to absolutely, positively clean a machine from a virus is to completely reformat the machine and reinstall the operating system, updates, applications and data from scratch."
It's simple really: consider the possibilities after you're infected with a virus:
1. Your anti-virus program successfully cleans it off.
2. Your anti-virus program thinks it successfully cleans it off, but in fact the virus has hidden itself so well that it remains. You're still infected, and you don't know it.
3. Your anti-virus program doesn't catch it and doesn't even try to clean it off. You're still infected, and you don't know it.
4. Your anti-virus program fails to clean it off and tells you. You're still infected, but at least you know.
Not Satisfied with the above , please try below steps and check:
Labels:
Windows
Posted by
Unknown
at
2:51 PM
0
comments
how to protect my system from Virus..
Viruses are not the only forms of malicious code that may invade your system. Worms, Trojans, adware, spyware, key loggers together with viruses form part of malware running in the wild that may seriously harm your system and your data while also hogging system resources, reducing PC performance and Internet bandwidth. Here are seven ways of protecting yourself against malware.
Today, security threats come in all shapes and sizes and from a variety of sources including software downloads, peer-to-peer networks (e.g., Kazaa), floppies, CD or DVDs, emails and their attachments, chat rooms, your colleagues on the network and the Internet in general.
Few ways to protect your system from Viruses.
Labels:
Windows
Posted by
Unknown
at
2:43 PM
0
comments
Tips for a secure password
Monday, July 26, 2010
What do online social networks, online banking and email accounts have in common? They all require passwords.
These passwords act like sentinels, keeping snoops and data pirates away from one's personal data. But bad passwords are as easy to crack as cheap locks. That means one can't be careful enough when picking a password.
“A good password should include a lot of the different options available on most keyboards,” says Lutz Neugebauer of Bitkom, a German technology industry association.
Labels:
Windows
Posted by
Unknown
at
6:06 PM
0
comments
How to troubleshooting blue screen (BSOD) errors ?
First , before troubleshooting blue screen you should enable a complete memory dump on your system after Windows Installation. This is done under the system properties in Startup and Recovery. It's best to do this right after you install Windows, before you start getting any BSODs. Sometimes the blue screen will show the name of the driver that is causing the problem. If nothing else, you can look up the STOP code and see what the problem is.
The most important info to record from the blue screen is the technical info, it will look something like this:
*** STOP: 0x0000007B (0x00000032, 0x00002345, 0xABCDEF00, 0x00000000)
Labels:
Windows
Posted by
Unknown
at
3:37 PM
0
comments
Ten Reasons to Upgrade to Windows 7
Saturday, July 24, 2010
- Aero Peak : To quickly peer past all open windows to look straight at the Windows 7 desktop, simply point to the right edge of the taskbar. All open windows will instantly turn transparent, making it possible to see what's on the desktop.
- Redesigned Taskbar : With Windows 7, getting an application icon onto the taskbar is as simple as right-clicking on the icon and selecting "Pin to Taskbar." Voila, it magically appears on the Taskbar.
- Aero Snap: With just about every laptop being sold now having a widescreen display, have you ever needed to position two documents side-by-side? Rather than tearing your hair out in frustration, Aero Snap offers a quick and easy way to "snap" windows into the left or right half of your screen simply by dragging Windows to the edges. (You can also snap windows vertically.)
Labels:
Windows
Posted by
Unknown
at
10:15 PM
0
comments
Plan your Windows 7 migration
Labels:
Windows
Posted by
Unknown
at
9:59 PM
0
comments
Windows 7 Minimum System Requirements
Labels:
Windows
Posted by
Unknown
at
8:53 PM
0
comments
Could Windows Vistas Pretty Looks Be To Blame For It Running So Slow?
Labels:
Windows
Posted by
Unknown
at
8:34 PM
0
comments
Why Cleaning Up After Windows Can Make Your Slow Computer Faster
Labels:
Windows
Posted by
Unknown
at
8:33 PM
0
comments
Registry Cleaners Can Provide Numerous Advantages
Labels:
Windows
Posted by
Unknown
at
8:32 PM
0
comments
Image Spam
Image spam is junk email that replaces text with images as a means of fooling spam filters.
Image delivery works by embedding code in an HTML message that links to an image file on the Web. Image spam is a larger drain on network resources than text spam because image files are larger than ASCII character strings.
Larger files require more bandwidth and, as a consequence, cause greater degradation of transfer rates.
If the recipient's email program downloads images automatically, the image appears when the message is opened. The image itself may be a picture or drawing of alphanumeric characters that appears as text to the viewer, although it is processed as an image by the user's computer. Many spam filters, especially older or less sophisticated ones, rely upon certain text criteria on which to make judgments.
Such filters typically watch for predetermined words in the subject lines of e-mail messages, suspicious word patterns and word frequency. Image spam is not stopped by such filters because it contains no words that can serve as the basis for blocking messages.
There are a number of approaches to dealing with image spam. In current versions of Outlook, for example, images are not automatically downloaded into messages unless the user has specified that messages from the source can be trusted.
Labels:
Windows
Posted by
Unknown
at
7:56 PM
0
comments