Tuesday, 3 May 2011

The cabinet must be clean


Did one of your hardwares suddenly fail? I’ve experienced a lot of hardware crash in the past. I remember one time, my personal computer would boot but the monitor is black. I checked the monitor but it is working perfectly. What I did is open up the CPU and inspected my video card. Upon opening the CPU, I noticed the great amount of dust inside it. If this happened to you too, here are some things you could do:
• Remove your hardware from the motherboard. Get a pencil eraser and run it through the tip connecting the hardware to your motherboard (the golden thing).
• Clean the inside of your CPU with a brush and a vacuum cleaner. Just be careful.
After doing the above, my video card worked again perfectly.

Will Pendrive Drives harm your PC

Keeping you personal computer secure nowadays is such a hard thing to do because of the viruses around. Even your little USB thumb drive can be a victim of these viruses. In fact, these thumb drives makes the transfer of viruses from PC to PC a lot more fast if they are left unsecure. Good thing, there are still free anti-virus softwares out there just like AVG is quite reliable since updates are released in a regular basis. If you use USB thumb drives, be sure to have them scanned by your anti-virus software before accessing it via Windows Explorer. You should also turn off the auto-play function when you plug in USB devices.

Clearing the CMOS


This is often the solution, and it’s frustrating because it’s incredibly simple. All you have to do is find out from the motherboard manual where the CMOS jumper is. Make sure the system has no source of power (meaning the power supply is unplugged and the battery is removed). Then, move the CMOS jumper over the pins that clear it. After a few moments, put the jumper back, plug the power and battery back in, and try it.
If it works, you’re done! Congratulations on being extremely lucky! Karma will probably come around later and bite you in the ass.
If not, continue on. You may have a long road in front of you.

Sunday, 24 April 2011

How to Know who used your PC in your absence


"start > run >eventvwr.msc"

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day

How to disable Send Error Report

How to disable Send Error Report


To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:

-Open Control Panel
-Click on Preformance and Maintenance.
-Click on System.
-Then click on the Advanced tab
-Click on the error reporting button on the bottom of the windows.
-Select Disable error reporting.
-Click OK
-Click OK

How To convert NTFS To FAT by using Dos command

Quote: 

C:/convert C:/NTFS:FS 

In this command NTFS will become FAT and if you want to convert FAT to NTFS then just replace FS with NTFS.   

Quote: 

C:/convert C:/FS:NTFS.

Wednesday, 13 April 2011

Make money through Facebook

Facebook (stylized facebook) is a social network and website launched in February 2004, operated and privately owned by Facebook, Inc. As of January 2011, Facebook has more than 600 million active users.Users may create a personal profile, add other users as friends, and exchange messages, including automatic notifications when they update their profile. Additionally, users may join common interest user groups, organized by workplace, school or college, or other characteristics. The name of the service stems from the colloquial name for the book given to students at the start of the academic year by university administrations in the United States to help students get to know each other better. Facebook allows anyone who declares themselves to be at least 13 years old to become a registered user of the website


websites such as facebook and myspace are partially funded by advertisements- thats why when you log in there are hundreds of adverts all over your screen- normally websites like this are funded by award schemes or an anonamous party- but abviously with no intentional financial gain.
Many sites operate on advertising, while some do not make a profit and are subsidized by their owners (i.e. YouTube).

You can go through this link to know how to make money through Facebook
This link help you to refer how to make money
http://www.easy-share.com/1914684086/How%20to%20Make%20Money%20on%20Facebook%20i6.rar

Saturday, 2 April 2011

Before selecting a PC u must have a knowledge in processors


Processors:
Processor or Central processing Unit is the brain of computer,Which carries out the instruction carried out by your operating system,it receives instructions and sent out signal to the hardware.
Now a days  we are selecting the processors without our basic knowledge what make them difference,Processors are now having multi cores ,Now what is meant by core.
Core:
A simple or standard processors usually have only one core,This one core make the all operations,they are interconnected and passing the instructions together and processing the instructions.
Dual core or more than one core:
In the processors having more than one core can work or process indivudal instructions,a dual core contain 2 cores, a quad core contain 4  cores for processing.Here by using the multi cores the advantage is this  we can done multi operations with out hang,such as browse,cd burning.

Newely available processors are inel core i3,i6,i7;what make their difference

core i3 processors have twin core with clocking frequency ranging from 2.933 GHz to 3.2 GHz. A 4MB L3 smart cache, 2 x 256 KB L2 cache and Direct Media Interface bus, fitted with the brand new LGA 1156 socket, makes them the best entry level processors. All these chips are built on a 32 nm architecture which ensures that more transistors can be etched on the silicon chips. An integrated GPU (Graphic Processing Unit) makes graphic processing even more faster. With Intel's hyper-threading and virtualization technology enabled, along with HD graphics


core i5 line consists of three separate series of processors with twin and quad cores. The twin, as well as quad cores come with 4 threads each. The clocking frequencies of these processors range from 2.4 GHz to 3.33 GHz, powered by the Intel Turboboost technology that boosts clocking frequencies to higher levels when need be. With 4 MB to 8 MB L3 cache, direct media interface, integrated GPU, LGA 1156 socket, Intel HD graphics, Intel smart cache technology and Hyper-threading enabled
core i7  are the best processors.In the core i3 vs i5 vs i7 comparison, core i7 is miles ahead of the rest of the pack. This line consists of quad core processors with clocking frequencies reaching 3.33 GHz powered by Intel Turboboost. As a quad core vs dual core comparison would prove, greater number of cores can immensely boost computing speeds.L3 smart cache ranging from 8MB to as much as 12 MB, Intel QuickPath Interconnect technology (that can enhance data transfer speed to 25.6 GB/Sec), integrated GPU, Hyper-threading and Intel HD graphics, the core i7 series processors are indeed, unarguably, the best processors ever manufactured. They are meant for high end computing applications, web servers and high end business users

Before this i3,i5,i7 there come core2duo,the highly rated one
But core2duo has some problems such as they generate large amount of  heat since it need more power,having no hyperthreading,no PCI-E controller
(Got some reference from yahoo)

Thursday, 31 March 2011

How to secure Your emails


HTML E-Mail

Disable HTML for e-mail or choose to view all messages as plain text if your e-mail client has such options - the better ones do; or use an e-mail content filter for web bugs and embedded content originating from a server other than the one belonging to the sender of the e-mail. Today's cleverly-coded e-mail worms can execute just by viewing HTML-formatted e-mail.

E-Mail Attachments

- Never allow your e-mail client to "View Attachment Inline" ...unless you are sure it arrived    from a trusted sender.

- Never open e-mail attachments from strangers.
- Use encryption software for sending your most private e-mail messages. If you don't, keep in mind that what you are sending is the equivalent of a postcard.
- Never, ever use e-mail to send confidential information such as credit card numbers, bank account numbers, or your Social Security number.
- Never respond to e-mail asking for confidential information. Any e-mail you receive requesting your credit card numbers, bank account numbers, or Social Security number either via e-mail or a web site link is surely an identity theft or phishing scam.

How to disable JavaScript in e-mail programs:

Outlook
  1. Select the "Options..." command under the Outlook "Tools" menu.
  2. Select the "Security" tab in the "Options" dialog box.
  3. Under "Secure Content" section, select "Restricted sites" in the Zone Window.
  4. Click on the "Zone settings..." button.
  5. Click "OK" for the warning dialog box which pops up on the screen.
  6. In the "Security" dialog box, make sure that the "Restricted sites" icon is selected.
  7. Make sure that the security level slider control for the zone is set to "High".
  8. Click on the "Custom Level..." button.
  9. Scroll down to the "Active scripting" entry in the settings list in the "Security Settings" dialog box.
  10. Select "Disable" for "Active scripting" entry.
  11. Press the "OK" button in the "Security Settings" dialog box.
  12. Press the "OK" button in the "Security" dialog box.
  13. Press the "OK" button in the "Options" dialog box.
Note on Outlook: By following this procedure, you will accomplish two things. First, you will configure the e-mail client so that all of its network activity happens in the "Restricted" security zone. Second, you will increase the security of the Restricted zone beyond its default setting so that "Active scripting" is disabled. The end result is that your e-mail program will disable Active scripting (which includes JavaScript) whenever it shows you an e-mail, thereby preventing the e-mail wiretap exploit.

Mozilla Mail
  1. Select "Edit" from the menu bar.
  2. Select "Preferences" from the drop-down list.
  3. Select "Advanced" from the Category list.
  4. Select "Scripts & Windows" from the Advanced list.
  5. Uncheck the box next to "Mail & Newsgroups" under "Enable JavaScript for:"
  6. Important: Leaving "Navigator" checked applies to your browser window only. The option in step 5 applies to e-mail only.
  7. Click on "OK" to save your settings and close the "Preferences" window.
  8. (NOTE: Unlike with Netscape or Outlook, in Mozilla this option is unchecked by default... but it is a good idea to look for yourself.)
Mozilla Thunderbird
  1. Select "Tools" from the menu bar.
  2. Select "Options" from the drop-down list.
  3. Select "Advanced" from the Category list.
  4. Uncheck the box next to "Enable JavaScript in mail messages".
  5. Click on "OK" to save your settings and close the "Preferences" window.
  6. (NOTE: Unlike with Netscape or Outlook, in Thunderbird this option is unchecked by default... but it is a good idea to look for yourself.)
Netscape Messenger
  1. Select "Edit" from the menu bar.
  2. Select "Preferences" from the drop-down list.
  3. Select "Advanced" from the Category list.
  4. Uncheck the box next to "Enable JavaScript for Mail and News".
  5. Important: Leaving "Enable JavaScript" (version 4.x) or "Enable JavaScript in Navigator" (versions 6/7) checked applies to your browser window only. The option in step 4 applies to e-mail only.
  6. Click on "OK" to save your settings and close the "Preferences" window.
Eudora
  1. Click on "Tools".
  2. Click on "Options".
  3. Click on "Viewing Mail".
  4. Uncheck the box "Allow executable in HTML content". 

Five Steps to Safety while surfing:


1. Ensure your Operating System is up to date and safely configured

Ø  Windows can be set to download security updates automatically and prompt you for permission to install them. http://windowsupdate.microsoft.com/
Ø  Make sure the security settings on your Web browser are at medium or high. If you are using Internet Explorer this can be done by going to Tools>Internet Options>Privacy.
Consider using a more secure browser such as Firefox or Internet explorer

2. Check your system for viruses

2. Check your system for viruses

A virus is so called because it reproduces itself by using the facilities of the host PC to copy itself to removable media and attach itself to emails, without your knowledge.. Most commonly you get one by opening an email attachment or copying (from deceptive software on the Internet or a bootleg CD) a program containing the virus, on to an unprotected PC. They take over the compromised PC and either trash your data or use your PC like a zombie to send hundreds or thousands of emails containing copies of itself, and/or spam, maybe with copies of your confidential data, to everybody in your address book.
There are many virus checking services offered free by the various Anti Virus vendors, such as

#1 BitDefender Antivirus
#2 Kaspersky Anti-Virus
#3 Webroot Anti-Virus
#4 Norton Anti-Virus
#5 Eset Nod32 Anti-Virus
#6 AVG Anti-Virus
#7 G Data Anti-Virus
#8 Avira Anti-Virus
#9 Vipre Anti-Virus
#10 Trend Micro PC-cillin Anti-Virus
These are the best 10 antivirus rating in 31 march 2011


List of some harmful virus affecting Operating system
Read carefully from these atleast one will affect your Pc,if u are not aware of virus,Beware of virus

OPRAH WINFREY VIRUS:
 Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
PAUL REVERE VIRUS
This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
POLITICALLY CORRECT VIRUS:
 Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
RIGHT TO LIFE VIRUS:
Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS
Activates every component in your system, just before the whole darn thing quits.
ARNOLD SCHWARZENEGGER VIRUS
Terminates and stays resident. It'll be back.
FEDERAL BUREAUCRAT VIRUS:
 Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
TERRY RANDALL VIRUS:
 Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
TEXAS VIRUS
Makes sure that it's bigger than any other file.
CONGRESSIONAL VIRUS:
 The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
PBS VIRUS
Your programs stop every few minutes to ask for money.
ELVIS VIRUS:
Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
OLLIE NORTH VIRUS
Causes your printer to become a paper shredder.
SEARS VIRUS:
 Your data won't appear unless you buy new cables, power supply and a set of shocks.
JIMMY HOFFA VIRUS
Your programs can never be found again.
KEVORKIAN VIRUS
Helps your computer shut down as an act of mercy.
IMELDA MARCOS VIRUS:
 Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
LAPD VIRUS:
 It claims it feels threatened by the other files on your PC and erases them in "self defense".
ORAL ROBERTS VIRUS
Claims that if you don't send it a million dollars, it's programmer will take it back.

3. Install a Firewall

A personal firewall blocks unauthorised network connections from either entering or leaving the computer. This helps protect you either from malware entering your PC, or using it to attack others.  You can download the following personal firewall from:
http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp


4. Block SpyWare and Identity Theft

"Spyware" is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, it gathers information such as email addresses, passwords, phone numbers, and credit card numbers, and relays it to advertisers or other interested parties. It is not to be confused with "Cookies" which are small files that contain a record of the last time you visited a web site; many e-commerce sites require their use to recognise returning visitors.

5. Be vigilant to protect your privacy

Ø  Identity theft can ruin your credit rating and take months of effort to recover from. Exercise caution in your business affairs.
Ø  If you receive an email allegedly from your bank, or Ebay, PayPal, FedEx, etc, asking you to verify your credit card data, it is almost certainly a scam, called "phishing".  Sometimes it is inexpertly done and the web site address is not the real address but some variation on it. For example, ebay-accounts.com rather than ebay.com; or yourbankname.kr rather than yourbankname.ie. Report such attempts to the financial institution involved.
Ø  Actually read the privacy policy and terms and conditions of a site before you give them personal data. Look for the check box that sometimes says "Allow third parties to send me emails" and sometimes "I do not want my address given away". Legitimate companies will allow you to unsubscribe from an e-mail list by replying with 'remove'. Best practice is not to send unsolicited commercial email at all. But never reply to spammers, as your reply verifies that they have found a valid e-mail address, and you’ll be on their list and everyone else's that they can sell that verified address to. 


Wednesday, 30 March 2011

Computer Basics


  What is a Computer?

computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem.

 Basic Parts

       Hardware
            1.  The hardware is the part of the computer you can touch and see. (ex. keyboard, mouse, monitor)
        Software
            1.  The software is a part of the computer you cannot touch but is very important. 
                The software is all the programming that makes the computer run; controlling
                everything that the computer does.

Glossary of Terms

The Monitor is the display screen, similar to a
 television screen.







The Computer, tower or case is the heart of the system. 
This is a box that contains all the parts that make
 the computer work.





The Keyboard is what you type on, similar to 
a typewriter





  
The Mouse is the small hand held device that attaches
 to the computer. It may have two or three buttons.  
The mouse is used to move the 
cursor (pointer) on the 
computer screen.




A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers are sometimes sold with computers, but more frequently are purchased separately. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.








The Scanner similar to a color photocopier 
is a device that captures pictures or documents,so that they can be seen or used on the computer.






The Laptop also known as a notebook computer is a small personal computer designed for mobile use. A laptop integrates all of the typical components of a desktop computer, including a display, a keyboard, a pointing device (a touchpad, also known as a track pad, or a pointing stick) and a battery into a single portable unit. 






A Hard drive is a device that holds all the information that is stored on a computer.  Unlike a floppy disk the hard disk cannot be removed from the computer but stores much more information








A USB Flash Drive (sometimes just called a “flash drive”)
 looks like a plastic tube that can be put into a slot in the 
front of the modern computer. Older computers 
will require you to insert it in a slot in the back
or you may not be able to use the drive at all
depending on the age of the computer.  
These disks hold information and can be 
used to exchange information between computers




A Floppy Disk (sometimes just called a “disk”) 
looks like a plastic card that can be put into a
 slot in the front of the computer.  These disks 
hold information and can be used to exchange 
information between computers. This type of
 data storage is archaic and obsolete








A CD-ROM is very similar to a stereo’s CD player. 
It not only plays music but can also retrieve
 information stored on CD's. It is also
 available in other formats such as 
DVD-ROM