Advertise here

Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

A Faster Start Menu

Posted by Sharing Is Caring | 2:06 AM | , , , ,


Hallu all my reader,today i wanna show you all on how to tweak the windows XP registry to make the START menu is faster than the default speed. The speed of the start menu can be adjusted only by using a simple tweak registry.

The default value is 400. Set it to 0 and the delay is gone, but it will be nearly impossible to move the mouse fast enough not to activate [All Programs] if you mouse over it in route to your final selection. It's easy to train yourself to move the pointer to the right after clicking Start to avoid activating All Programs. Pick a number that suits your style and make the change, then test it until you find a good compromise between speed and usability.

Click on READ MORE below to know the registry tweak....



----------------------------------------------------------------------------------------
[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop
Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: String Value // Value Name: MenuShowDelay
Setting for Value Data: [Default = 400 / Adjust to Preference]
Exit Registry and Reboot

----------------------------------------------------------------------------------------

Read More »»

tip to use command promt easily....

Posted by Sharing Is Caring | 5:46 PM | , , ,

Hello my reader, today i want to share a tip on helping all of you in using the command prompt...as all of us know, not all of windows user is able to use the command prompt as the tech geek...soo, here i want to share a bit of trick that can help all of us in using the command prompt effectively..

ok,be ready to take your note k...

1. Drag and Drop
- Being able to open a command prompt from Windows Explorer right click context menu, to the current directory is a big time saver. But what about opening a command prompt to a file location?

Instead of hacking away at the registry to provide this functionality, the easier method is to use drag-and-drop.

After using Command Prompt Here to open the prompt to the current folder location, just right click and hold on a file, then drag and drop it on the command prompt window.
Unfortunately, drag and drop only works in XP and not Vista. Instead you can use Vista's copy file name and path as text feature as an alternative.

2. Open Windows Explorer Window From Command Prompt

-Now that you know how to open the command prompt from Windows Explorer, how about reversing the process. Like open Explorer window from the current command prompt directory.

Just type the following command at the prompt and press enter:

explorer .

NOTE: Make sure to include the dot (period) after the command.

To open Windows to the parent directory that of the current directory you are at (one folder above), just type the following command:

explorer . .

Or to open Explorer to a different directory:

explorer c:\windows\system32

3 - Change Directories The Easy Way
- Navigating around the file system from the prompt requires using the dir (directory) command to 'see' the contents of a directory. But if you are just moving forward through the current directory, there is an easier way to see folders using the keyboard.

To do this, use the Change Directory command by typing cd and pressing the space bar once, then continually press the Tab key to scroll through the list of folders.

Once you see the folder that you want to navigate into, stop and press enter.

Note: if you experience any problems on XP, see How To Enable Auto Complete in XP.


4 - Search For Text
- If you execute many commands, after a while the window can fill up with a lot text. To quickly locate text output from a command, you can easily search for it using the Find dialog bog.

Click on the icon in the title bar (of the command prompt window you are working in) and select Edit, then Find… (you can also right on the Title bar select Edit \ Find ).

In the Find dialog box, just enter the text you are looking for, click on Find Next, and the selected text will be found and highlighted.

5 - Change The Window Title
- Sometimes one command prompt window is not enough. You may have situations where multiple windows are needed to perform several tasks. At times this can lead to confusion as to which window is which.

To make it easier with identifying different command prompt sessions, you can name each window with different titles by using the Title command. All you need to do is enter the following at the prompt:

TITLE [string]

Where string Specifies the title for the command prompt window.

For example, to rename a window that is being used with the net stat command, enter the following command and press enter:

title NET STAT



Read More »»


Hallu my reader,today iwanna share a tip on how to track the IP address for email sender in Gmail and Hotmail.This tips is useful for those who wanna track down their email sender.


ok,for the first,i wanna show for the Gmail.


(1) SIGN IN TO YOUR GMAIL……

(2) CHECK MAIL…

(3) TO SHOW THE EMAIL HEADERS AND FOOTERS

(4) CLICK ON THE TRIANGLE GIVEN NEXT TO THE REPLY TAB, CLICK SHOW ORIGINAL

(5) SEARCH FOR THE IP ADDRESS

(6) SEARCH FOR RECEIVED FOLLOWED BY THE IP ADDRESS IN BRACKETS……..

(7) RECEIVED FROM [100.236.45.63] BY web5236.mail.” — “yahoo.com (EXAMPLE)

(8). IF THERE ARE MORE THAN ONE RECEIVED OUT OF THE PATTERN CLICK THE LAST ONE…..

(9) TRACK THE IP (INTERNET PROTOCOL)


now,for the Hotmail...


1.SIGN IN TO YOUR HOT MAIL ACCOUNT……

2.CLICK MAIL ON THE TOP OF THE WINDOW………

3.CLICK TO OPEN THE MAIL THAT YOU WANT TO GET THE IP OF…….

4.TO SEE THE HEADERS OF THE MAIL IF NOT VISIBLE…DO THE FOLLOWEING 5 POINTS IN RED…



(1) CLICK THE OPTION TAB ON THE TOP RIGHT

(2) IN THE MAIL OPTIONS, CLICK GENERAL PREFRENCES.

(3) ROLL DOWN TO THE MESSAGES WHERE THERE ARE HEADER OPTIONS

(4) MAKE THAT SURE THE HEADERS OF ALL THE INCOMING MESSAGES ARE SELECTED

(5) CLICK SAVE………

(6) CLICK CHECK MAIL…OPEN UP THE MAILS..



5.MAIL HEADERS MUST BE VISIBLE NOW……..

6.IF THERE IS A HEADER STARTING WITH X-ORIGINATING-IP. THE IP BESIDE IT IS THE IP OF THE SENDER.

Read More »»

Automatically refresh ur screen

Posted by Sharing Is Caring | 2:57 PM | , , ,

When you are working on your local computer and want to refresh any changes in your system automatically. For example some times you are watching sports results, online Stock Exchange rates and any changes to your hard drive but these changes are not usually refreshed until you press the F5 key on your keyboard.

To refresh your screen automatically you should edit your system Registry. But the best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.

Follow the given steps to change the updates automatically.



*First click on Start button then type Regedit in Run option.
*In Registry Editor panel go to the path:
*HKEY_LOCAL_MACHINE / System / CurrentControlSet /Control / UpdateMode

*Here in right hand side panel edit the DWORD value to be between 1 and 5.
*Now restart your computer after any changes to go into effect.

Read More »»

Protect Your PC now...!!!(Useful)

Posted by wanjModernist | 3:47 PM | ,

The Internet is a tool for people to communicate, learn, and shop. Unfortunately, the Internet can also be used to commit criminal activities. Although, there is no fool-proof method to prevent online crime, our recommended solutions and Internet safety tips can help secure and protect your privacy and your computer data.

Step One: Use Antivirus Software
Viruses can get into your computer at home or at work and cause extensive damage to your computer. Viruses can even help a criminal steal your identity and put your personal information to use for illegal purposes.

We recommend installing an antivirus program, keeping it up-to-date and scanning your system on a regular basis.

Step Two: Install a Firewall
In addition to your antivirus software, you can use a firewall to guard your computer against hackers and unwanted inbound and outbound Internet traffic. One of the easiest ways a virus can enter your system is through a broadband connection.

With a broadband connection, your computer is open to the Internet whenever it is turned on. We recommend installing a firewall to safeguard your financial documents, personal information, photos and online communications.


Step Three: Update Your Operating System
Your Microsoft® Windows® operating system can also protect you from viruses, hackers and other online threats. You can receive automatic updates from Microsoft to protect your computer and keep your operating system current at the same time.

To update your Microsoft operating system and other applications, visit the Microsoft Windows Update site. The program will locate security gaps and automatically download and install the necessary patches for you.

In addition, we recommend that you activate Microsoft Windows Automatic Update for the latest security patches to avoid potential threats in the future.

Step Four: Install and Use Antispyware Software
Spyware programs can get into your system from a free web download, by visiting a Web site or clicking on an online advertisement. The spyware program then secretly gathers information about your computing habits and sends the information to the company that created the program. Once the company has your information, the spyware can affect your computer by:

* Changing your homepage to a particular Web site
* Producing unwanted pop-up ads—even when your browser is not running
* Causing your browser or system applications to close or crash
* Stopping your ability to connect to the Internet
* Slowing down your computer at start-up or reducing the performance of your system

If you are experiencing one or more of these symptoms, your system may be infected with spyware.

The best way to remove spyware is to purchase and install an antispyware program. We recommend purchasing an updated product with built-in antispyware capabilities. You may also want to adjust your browser security settings to medium or higher and only download software from trusted sources.

Step Five: Practice Internet Safety

The Internet has made it easy for us to perform activities online such as shopping, banking and communicating with others. At the same time, transmitting information online can also put us at risk for identity theft and fraud. To ensure that the information you provide is not used maliciously, it is important to take some basic precautions.

We recommend that you invest time to learn what you can do to protect you, your family and your data from cyber threats. We have listed suggested topics from Microsoft's Web site to help you enjoy online activities while still practicing internet safety:

Security at Home—Protect Your Personal Information—Watch a video and read about protecting your personal information to avoid identity theft and other kinds of fraud while surfing the Internet.

Help Protect Yourself While Enjoying Online Activities—Learn how to protect yourself while still enjoying everything the Internet has to offer.

E-Mail and Spam—How to Reduce the Risks of Threats—Watch a video and learn how to reduce the risks of e-mail threats including spam, viruses, identity-theft schemes and hoaxes.

Protect Your Children's Privacy and Safety—Safety tips, articles and a video to help keep your children protected while they surf the Internet.

Step Six: Backup Your Important Files

Have you ever wondered what you would do if a virus deleted files on your system? What if your hard drive failed or a power surge during a lightning storm destroyed your hard drive? If you start thinking about what you would do after a problem occurs, it's probably too late. Your Internet favorites and bookmarks will be gone, e-mail addresses, family history and pictures, your thesis and your final report? All lost.

Is there anything more important on your system than the information you invested time in creating? So, why risk losing it?

We recommend you add additional storage media and a software backup application to your system. Then you can automatically backup and save your data as part of your regular computer maintenance routine. Taking this preventative measure can reduce your stress level when your important information is suddenly gone. We can assist you to select the best options to fit your time, budget and experience level.



Read More »»

7 Tips to Avoid Spam (Junk Email)...very useful

Posted by Sharing Is Caring | 5:01 PM | , , ,


Spam is named after an old Monty Python skit which took place in a diner where everything on the menu had spam in it. A chorus keeps chanting a song about spam, drowning out conversations. Years later, this reminded someone of how email in your inbox can get lost in all of the junk mail, so they called it spam and the name stuck.

It can be hard to avoid getting your email address on somebody’s list. It’s not uncommon for many people to receive 50 to 100 pieces of spam in a single day – I know some people who get over 300 a day! And the problem is growing worse.

Fortunately there are ways for people to reduce the amount of spam they get. Here are a few tips:

* Never try to unsubscribe or ask to be removed. Those emails may include a link or a reply address to unsubscribe, but 95% either simply don’t work, or you're just telling the spammers that they have a live one.



* Never order anything advertised in spam, visit the website, or in any way respond to the ad. Spammers send out millions of emails at a time, and it costs them almost nothing. Every order or click through to their website just encourages the spammers to send more and more.

* Try to avoid entering your email address on websites as much as possible, and if you do, consider getting a second email account with Yahoo mail or a similar service. That way, you can enter that address instead of your main email. Most websites offering contests, joke lists, free greeting cards, etc. harvest and sell your email address.

* Never sign an online guestbook. As an experiment I recently created a new email address and entered it on about five guestbooks I found with a Google search. Within 24 hours I was getting spam, and it grew to dozens a day within a week.

* Just opening an unsolicited ad while connected to the internet can alert spammers that they have a live address, so if your email application has a “work offline” option, often found in the file menu, select it before opening suspect emails, or disconnect from the internet completely.

If you use a web-based email service like Yahoo Mail, check your mail options for a setting to turn off graphics in emails, or to display mail in plain text only. This helps keep the spammers from knowing you've opened the message.

* Avoid forwarding emails to large numbers of people. Not everyone realizes that when you forward a message, the email addresses of everyone who receives the message is visible to every person who reads it. If any of the recipients is a spammer, or if one of a friend's computer is infected by certain viruses, they can harvest all of those addresses, including yours.

If you do send an email to multiple people, you can avoid revealing email addresses by entering addresses in the BCC (Blind Carbon Copy) area instead of To or CC — this will hide the list of addresses from everyone else.

If you're sending a message from somebody on to others, you should copy and paste just the message into a new email window rather than hitting the forward button — this trims the message down and protects the privacy of others.

* To deal with the spam you already receive, most email programs allow you to create “filters” or “rules” that move incoming email into a specified folder or even right into the trash.

After that, if you follow the tips above, you'll have a good chance of keeping it under control.

Author - Worth Godwin is a computer coach with a dozen years' experience helping computer users of all levels, and has also worked for many years "in the trenches" as a hardware and software tech, solving real-world computer problems.


Read More »»

www.meebo.com
www.ebuddy.com

i use web page above as replacement for my messenger because im using internet connection which is protected by a proxy.

it's easy to use,reliable,and user friendly.
feel free to try it.

Read More »»

how to Speed Up Windows XP

Posted by princecrackerModernist | 3:17 AM | , ,

Windows XP has a lot of services, some of which are not needed for normal use. To speed up Windows XP you can disable these services.

Go to Start > Run, type in ’services.msc’.

To turn off a service, double-click on it and select Disabled under Startup type.

Disable the following services:

Alerter
Background Intelligent Transfer Service
ClipBook
Computer Browser
Error Reporting Service
Help and Support
Indexing Service
IPSEC Services
Messenger
NetMeeting Remote Desktop Sharing
Network DDE
Network DDE DSDM
Performance Logs and Alerts
Portable Media Serial Number
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Secondary Logon
Server
Smart Card
Smart Card Helper
SSDP Discovery Service
System restore Service
TCP/IP NetBIOS Helper
Uninterruptible Power Supply
Universal Plug and Play Device Host
WebClient
Windows time
Wireless Zero Configuration
WMI Performance Adapter"

Read More »»

Kenalan Parasit Komputer

Posted by princecrackerModernist | 3:15 AM | , ,

Virus komputer,ia suatu nama yang cukup popular

dikalangan pengguna komputer tidak kira yang sudah berpengalaman atau yang baru berjinak dengan IT,kehadirannya sudah menjadi kebiasaan.

Bagaimana pula Adware, trojan, dialer,worm, keylogger, hijacker, cookies dan sebagainya,pada pemerhatian saya ia masih kurang dikenali terutamanya mereka yang baru mengenali dunia IT dan ada yang beranggapan ianya virus.Jadi,sudah menjadi suatu kewajaran untuk kita mengenalinya untuk membolehkan pencegahan yang lebih berkesan dapat dilakukan.

Walaupun penerangan saya nanti serba ringkas tapi saya yakin ianya pasti berguna.


Virus komputer
Suatu nama yang cukup popular dikalangan pengguna komputer disebabkan keupayaannya mengundang pelbagai masalah kepada komputer.Dunia IT akan terus digemparkan dengan kehadirannya sehingga ia merupakan suatu kebiasaan yang tidak dapat dielakkan.Virus komputer merupakan suatu program yang dicipta untuk pelbagai tujuan dan juga boleh tersembunyi didalam sesebuah perisian.Virus komputer berkemampuan mereplika iaitu menyalin diri dan menjangkiti bahagian atau program lain dalam komputer,dokumen,boot sector dan sebagainya.Apabila kita menjalankan program yang dijangkiti,virus tersebut akan mengaktif serta melakukan salinan diri sendiri dan akhirnya akan melakukan
pelbagai kerosakan seperti membuat paparan skrin,memadam data dan pelbagai kemusnahan lagi.

Worm
Worm atau cecacing berkemampuan melakukan eksploitasi terhadap kelemahan suatu sistem operasi serta mereplikasi diri pada rangkaian komputer. Contoh Worm sasser teleh melakukan kerosakan pada sistem komputer persendirian dan korporat.Contoh lain pula ialah Worm CodeRed telah mengeksploitasi
kelemahan windows 2000 iaitu pada file idq.dll iaitu kelemahan buffer overflow Windows 2000.

Adware
Program yang memunculkan pop-up iklan atau iklan yang tersembunyi yang dimasukkan oleh pembuat program ke dalam sesebuah program, biasanya program tersebut adalah program yang freeware,shareware dan sebagainya.Jadi,pengguna terpaksa menerima iklan tersebut.

Spyware
Program intipan yang berupaya mendapatkan dan mengumpul maklumat pengguna sesebuah komputer tanpa disedarinya.Pencerobohan privacy ini boleh menguntung pihak pengintip kerana sesuatu maklumat terkumpul boleh dijual kepada pihak yang berminat atau untuk sebarang strategi dan promosi produk keluaran syarikat mereka.Program intipan ini boleh didatangi bersama secara tersembunyi melalui program berbentuk
freeware,shareware atau demo yang boleh dimuat turun dengan mudah internet.

Trojan
Program ini sangat berbahaya kerana ia memampukan penggodam komputer untuk mengawal serta melakukan sebarang perubahan kepada komputer tanpa pengetahuan pengguna komputer tersebut.Selain itu ia juga mampu mencipta,menghapus dan memindah sesuatu fail tanpa diketahui.

Hijacker
Kebolehan program ini ialah mengubah apa yang telah disetkan pada pelayar web,menukar arah carian ke laman tertentu seperti laman web lucah.Program ini juga berkemampuan mengubah haluan carian ke enjin carian yang ditetapkan oleh pembuat program ini dan yang paling teruknya ialah apa yang telah diubah oleh program ini tidak dapat diubah kembali,malah, anda mungkin tidak dapat melayari internet seperti biasa.

Dialer
Program ini berkeupayaan memasukkan fungsi sambungan ke internet,memutuskan sambungan komputer dari ISP tempatan dan kemudian ia menukar atau menghubungkan kembali sambungan anda ke ISP lain dan telefon antarabangsa.

Keylogger
Program yang mampu merekod apa sahaja yang anda tekan di keyboard anda,termasuklah perbualan email dan chat.

Cookies
Ia sebenarnya dicipta untuk disimpan pada sistem untuk membolehkan diakses kembali tapi ada juga menyalahgunakanya dengan berkongsi pada laman lain serta mengumpul maklumat seseorang pengguna yang mungkin bercirikan peribadi untuk dijual bagi perolehi keutungan.

Spam
melibatkan kegiatan e-mail yang tidak diundang kehadirannya yang dihantar dalam jumlah yang banyak dan ia mungkin kegiatan suka-suka,mengacau pemilik e-mail atau aktiviti pengiklanan yang salah iaitu tanpa kebenaran penerimanya.Ia pasti mengundang masalah kepada pengguna dari segi ruang e-mail dan masa.

rujukan
antivirus.utm.my
Majalah PC"

Read More »»

Contact Modernity

Your Name :
Your Email :
Subject :
Message :
Image (case-sensitive):

Nuffnang