Tuesday, December 15, 2009

Watch TV on the computer

Have you ever thought of TV channels on your computer. Internet TV software allows you to watch TV shows, movies and live sports online. Now a days, it is not difficult to watch TV anywhere, so why not see it on your computer. You just need to install a tv tuner and follow the instruction and you would be surfing the channel in no time.

Here are some reasons, why you should watch TV on the computer.

• You need to spend so much on a television for your home, so why not buy a TV tuner that can give you the benefit of a TV.

• TV tuner cards add functionality; by using PVR software that is free of cost, you will be able to record shows for future playback without paying any subscription charges.

• There is no need of any dedicated DVD recorder.

With Windows 7 Internet TV too, you can see your favorite TV shows wherever and whenever on Windows Media Center for free. Windows 7 provides you with the growing amount of media content on the Internet. You have the option to select from several online TV shows and movies.

With a broadband connection, Windows Media Player is inhabited with Internet TV channels and contents which are organized in such a manner that the user can simply locate the desired program.

The Internet TV in its pre-release edition only used to provide short clips and promos but in it's final release Windows 7 has been populated with online content.

Sunday, October 25, 2009

Battcursor feature For latest Windows 7

If you do a lot of work on your laptop or when you are away from your home, the battery life is always the cause of the worry to the user. The user always remains anxious about how much battery is left and how much work can be done on the laptop.

Windows 7 provides the solution to it. Battcursor feature in the latest Windows 7 feature keeps the track of the battery life and keep the user aware of the battery status. Its power saving functions are quite impressive. Though it is a little program but offers many useful features.

The tool includes indicator to the cursor. The cursor itself turns into a floating battery meter and whenever the battery power is low, the percentage and the visual indicator will be displayed. Aero Glass style feature allows you to set BattCursor to show Windows title bar which itself alters the color to warn you when your battery is low.

The title bars will give the blue color if the battery is full or nearly full and if your laptop is running out of battery the spectrum will shift to the warning colors. By default it displays yellow for low and red for critical. You can also modify the colors and activate the Power profiles as the battery diminishes.

To keep the user aware, BattCursor also shows the current charge level. It also allows you to disable the Aero Glass and Windows Sidebar when certain level is attained by the battery to extract more life out of the battery. Power Profiles in Windows 7 feature can be automatically switched with the BattCursor. Once you enable the function, at the specified charge level your system will be changed from high performance to balanced to power saver.

Thursday, October 22, 2009

Windows 7 features – Virtual Hard Disk

Microsoft’s latest operating system, Windows 7, comes with a number of new features including relatively lesser known Virtual Hard

Disk that enables a user to install various operating systems on a single machine.

The tool, which is a file formatted to be structurally identical to a physical Hard Disk Drive, enables you to test software on

different operating systems and reduces the cost or hassle of actual hardware.

This feature which is included in latest Windows 7 allows a physical computer to mount and boot from an operating system contained

within a VHD.

VHD’s ability to directly modify a virtual machine’s hard disk from a host server supports many applications, including:

* Life-cycle management and provisioning
* Backup and recovery
* Image management and patching
* Disk conversion (physical to virtual, and so on)
* Antivirus and security
* Moving files between a VHD and the host file system

In a nutshell, following are the advantages are provided by Windows 7 new feature VHDs:

Multiple operating system support: Now you can easily install multiple operating system without making changes in Master Boot


Backup-and-Restore: Changes to the contents of a VHD (such as infection by a virus, or accidental deletion of critical files) are

easily undone.

Multi-User Isolation: Many current operating systems support having multiple users, but offer varying degrees of protection between

them (e.g., one user of the OS could become infected by a virus which infects other users, or make changes to the OS which affect

other users). By giving each user their own version of the operating system — say, by creating for each of them a differencing VHD

based on a base installation of the OS — changes to any particular child image would have no effect on any of the other child


Wednesday, September 9, 2009

Laptop Data Recovery : What The Options Are

A lot of significant data is being stored on laptops nowadays. Laptop use has augmented significantly in recent time. Increased demands for portability and handiness have been envisioned in this mobile technology.

Demand for laptops has gone up in part due to the increase of telecommuting in businesses today. Businesses often allow employees to work on laptops at residence and bring them to job.

Data loss in a laptop can end up costing the business a lot of employee hours worked. Even people who use their laptops for personal use are not happy if they lose any significant data. Moving along with a laptop all day can cause stress on the machine and raise the probability of data loss.

There are many companies that can help you with the laptop data recovery process. After you contact a company, first you will probably go through an assessment process to evaluate the degree of damage done.

A lot of companies will offer a free assessment and a quotation if they feel they can effectively perform resurgence operations. It may be a excellent idea to shop around for services to make sure you are getting the best deal. Each company may offer a different price. Some companies even have flat price.

If you are panic over a blank laptop screen or a hard drive crash, you will be happy to find out that a high percentage of the requests data recovery companies get are successful accomplished. However you still need to be prepared that some of the data may never be recovered. The only way to find out is get proactive and contact representatives from data recovery firms.

Several data recovery companies have specific departments for performing data recovery operations on laptops. You can get a lot of your data recovered and take delivery of it in a readable format, even from badly damaged storage devices.

Laptop systems are more delicate and therefore highly vulnerable to damage to their hard drives.

There are many companies online that can offer you internet-based laptop data recovery. This allows you to ship of your laptop to company’s center of operations and have it shipped back to you after the data has been recovered.

Some frequent problems that are experienced with a laptop are a hard drive crash, dead screen, etc. There are different types of laptop data recovery operations you can perform. Laptop data recovery can allow you to recover files after such events and after technical malfunctions. You may also be able to recover MS Word, Excel or Power Point files that you may have unintentionally deleted.

Laptops can receive a lot of neglect and their hard drives can get damaged. You may need laptop data recovery supports if:

  • You dropped your notebook and it no longer turns on.
  • An unwanted e-mail has downloaded a Trojan or virus on your laptop.
  • You accidentally deleted some significant company files and you want them retrieved in a urgency before your person in charge finds out.
  • The laptop’s hard drive crashes.

Tuesday, September 8, 2009

Always back up your data before disaster strikes

One day you turn on your computer and it won’t start. Yikes! What now?
If you backed up your data, you won’t lose it no matter what the problem is. Backing up data is simple. For example, keep all your Word documents in a single Folder, then write that Folder to a plug-in USB memory stick after you update the documents. Or, write out all your data Folders once a week to a writeable CD.

For the few minutes it takes to make a backup, you’ll insure your data against a system meltdown. This also protects you if malware corrupts or destroys what’s on your disk drive.

If you didn’t back up your data and you have a system problem, you can still recover your data as long as the disk drive still works and the data files are not corrupted. You could, for example, take the disk drive out of the computer and place it into another Windows machine as its second drive. Then read your data — and back it up!

If the problem is that Windows won’t start up, the web offers tons of advice on how to fix and start Windows.

Another option is to start the machine using a Linux operating system CD and use Linux to read
and save data from your Windows disk. If the problem is that the disk drive itself fails, you’ll need your data backup. If you didn’t make one, your only option is to remove the drive and send it to a service that uses forensics to recover data. This is expensive and may or may not be able to restore your data. Learn the lesson from this guide rather than from experience – back up your data!

Encrypt your data

Even if you have locked your Windows system with a good password, anyone with physical access to your computer can still read the data!

One easy way to do this is simply to boot up the Linux operating system using a CD, then read the Windows files with Linux. This circumvents the Windows password that otherwise protects the files.

Modern versions of Windows like Vista and XP include built-in encryption. Right-click on either a Folder or File to see its Properties. The Properties’ Advanced button allows you to specify that all the files in the Folder or the single File will be automatically encrypted and decrypted for you. This protects that data from being read even if someone circumvents your Windows password. It is sufficient protection for most situations.

Alternatively, you might install free encryption software like TrueCrypt, BestCrypt or many others. If you encrypt your data, be sure you will always be able to decrypt it! If the encryption is based on a key you enter, you must remember the key. If the encryption is based on an encryption certificate, be sure to back up or “export” the certificates, as described here. You might wish to keep unencrypted backups of your data on CD or USB memory stick.

Laptop and notebook computers are most at risk to physical access by an outsider because they are most frequently lost or stolen — keep all data files your portable computer encrypted.

Friday, September 4, 2009

All About Your Recycle Bin

How to Empty your Recycle BIn

Recycle Bin is a place where you files are stored temprorarly for a time period when you deleted some from your pc computer. So, that if the files are deleted accidently it can be recovered.

As after some times a lot of files are piled up in your recycle bin eating up your storage space You should empty them periodially.

  • Select the Recycle Bin Icon available on your Desktop
  • Just Right Click and Select the option Empty Recycle Bin.
  • When ask for further confirmation click Yes.

How to Remove the Recycle Bin from the Desktop

Having some of the icons really iritates some of the time and if you don’t use the Recycle Bin to store deleted files why to carry this icon at your desktop , you can get rid of its desktop icon all together.

Run Regedit and go to:


Click on the “Recycle Bin” string in the right hand pane. Hit Del, click OK.

How to Rename the Recycle Bin

Have you thought about changing the name of your Recycle Bin to Crap Box. But you were not so here is your chance to do so..

To change the name of the Recycle Bin desktop icon, open Regedit and go to:


and change the name “Recycle Bin” to whatever you want (don’t type any quotes).

How to Increase the Size of your Recycle Bin

Have you ever experienced that you have deleted a file accidently and when you tried to recover that from your recycle bin to your astonishment it is not there in your recycle bin. Why?
Well by default the size of the recycle bin is set to certain percentage of your c: drive and if the file you have deleted is more than what it can accomadete in that case the file is deleted permanetly and you can not recover it from your recycle bin. So why not increase that size..

To Increase the size of the Recycle bin

  • Select the Recycle Bin Icon available on your Desktop
  • Just Right Click and Select the Properties option.
  • Increase the percentage bar as per your convinence.
  • Click Ok and you are done.

Thursday, August 20, 2009

Use WIFI Hotspots with Security

Wow Internet for free! Everyone's dream right? It is a nightmare if you don't take precautions and learn to secure your laptop. Identity Theft is on the rise and Using security with free public WiFi Hotspots is crucial. Follow these tips and stay safe. Well Safer, that is.

Step 1 : When purchasing your laptop make sure you have WIFI capability as well as security systems such as SpySweeper, Antivirus Security, and popup blockers. Having a good backup system in place or an online backup such as Carbonite is excellent for restoring lost data in event of laptop hijacking.

TIP: Run virus scan once a day and back up your computer weekly.

Step 2 : Next, when using your WIFI in public, choose a location that requires registration. It may be appealing to sit and sip coffee but if the location is open to the public with no registration, you are at risk for hackers to access your information.

Limit your banking and personal information to the home computer. That way your information is secure while using you laptop in public which lowers the chances of identity theft.

TIP: The location should offer unique login codes to use WIFI.

Step 3 : Password protect your computer, your internet login, and your important files. Do not keep a password file on your computer listing all your passwords. Change your passwords fairly frequently. Ask if they support Wireless Client Isolation. On your computer remember that anyone can be listening in. You cannot deter that but you can use safer methods such as encryption, which is set up on the wireless router. So you need to ask the WIFI Hotspot if they have encyption enabled. This will show up as a key in the connection box.

TIP: Look for Encryption key in Hotspot's connection box

Step 4 : If you must access banking and financial spots make sure you are accessing the correct url. In the URL address box look for https:// s indicates secure. Note also the secure padlock in lower right hand side of browser.

TIP: Look for secure websites

Step 5 : While you are at the WIFI hotspot, make sure to seat yourself so that people aren't easily able to see your screen.
Make sure to close out browser windows when idle. Do not leave your laptop unattended even for a couple of seconds.

Take precautions to have your laptop or case is easily identifiable by you.
Read the article on preventing laptop loss at the airport.

Tuesday, August 18, 2009

How do you get rid of antivirus 360?

An affirmation to start: 1) Do not copy your documents elsewhere as this will only spread the Malware, do NOT use your Email until this is cleaned and DO NOT REFORMAT unless it is your last resort.

Now for the main part: Malware is one of the worst kind of viral infection, deeply rooting itself in your system (some even hide in your router's firmware). Virus scanners (which are mostly blind to it) and the Restore Point Utility are not good things to use against such invasion for this reason alone.

So DON'T take chances with it !!!

virus removal
There are two different programs that might be referred to as the Antivirus 360. There is the Norton Antivirus and there is a rogue anti-spyware program Antivirus 360? Antivirus 360 is not a good program!

See the related link to Spyware-techie.com for information about the spyware Antivirus 360 and removal information. You should read that and remove the rogue program right away!

Here is more information about how to remove the spyware Antivirus 360:

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs Spybot

3 Run Superantispyware

Use Mozilla Firefox or the Google chrome browser for browsing unsafe websites

Wednesday, August 12, 2009

How to bypass a parental control?

computer security
A few days ago, my dad put some type of program or used his administrator account to block any downloads on my account. I do know how to change his password in "run" but i did not tried that but some how manage to find a way out to get away with that.

Here is some of the steps i came along..

Step 1 : Get the name and password of a friend who has an unblocked account. On the logon screen, scroll down to where you would enter your screen name, and select guest instead. Log on with the name and password of your friend

Step 2 : Access a different web browser. If your AOL account lets you, try to open Firefox or IE, and access the web through these browsers. Make sure to use AOL every once in a while so your parents see an AOL activity report.

Step 3 : Use a web proxy. These are websites that let you view and/or access websites from an independent server (i.e., it's not connected to your original AOL account). Some proxies only allow you to view a page; others allow you to access pages with username/password accounts. Keep in mind that it is very difficult to watch video through proxy servers. Web proxies like Open Silence and Mowser (see Resources) work with AOL.

Step 4 : Use a different computer, such as one at a library with Internet access.

Friday, July 17, 2009

Trend Micro warns of new worm for Symbian OS

Symbos_Yxes.B spreads via SMS. He holds a valid certificate from Symbian. After an infection, he steals serial number and participant ID and sends the data to a server on the Internet. Trend Micro has a new worm for Symbian OS and warned of the spread by SMS. The Symbos_Yxes.B-called malware can be manipulated via a website on a mobile phone that will unlock a user supposedly legitimate application as Symbian ACSServer.exe information source file (SIS) to download offers.

The malware bypasses an important safeguard for the mobile operating system. Symbian OS only allows the installation of signed applications. The certificates are issued by Symbian Signed, which is now part of the Symbian Foundation. Symbos_Yxes.B has, like the previous variant A, has a valid signature. After installing the malware steals, who is himself "Sexy Space" called, information like the serial number and IMEI Subscriber Identity IMSI, and sends them to a server on the Internet. In addition, the worm sends out SMS messages to the contacts of a user to continue to spread. The text of the SMS, he also receives from the server.

"In other words, there seems to be a botnet from mobile phones to act," wrote Trend Micro spokesman Jonathan Leopando in a blog entry. Worse, however, that the Variaten A and B of Symbos_Yxes have a valid signature that really meant
was detected pests. "There may be a random act, but the incident is not just strengthens the confidence in the signature system."

Wednesday, July 15, 2009

Microsoft Office 2010: The Technical Preview in test

Microsoft Office is almost widespread as Windows. But when the users have an upgrade fatigue set, and Web-based competitors want a piece of cake. Office 2010 are currently only available to selected users as a Technical Preview. A public beta will only appear in a few months. Office remains the de facto standard for office productivity among both businesses and consumers. However, companies like Google and others are trying to challenge Microsoft with free Web-based versions of applications similar to Word, PowerPoint and Excel, which make up the core of Office.

Office product manager, who pointed out that the Technical Preview, not all for the final planned features, and some still not working correctly. The current release is meant to provide feedback for the developers. In fact, we come again to the areas which still need some fine-tuning. One can only advise against this, the Technical Preview in production environments only. The quality of the upcoming Office package is not yet at the level of the 7th beta of Windows Office 2010. Unlike Windows, both variations on the same disk should come under 64 bit. However, Microsoft did demonstrate the online suite at the conference during a keynote by Microsoft Business Division President Stephen Elop, who said a technical preview would be available in August, followed sometime after by a public beta.

Sunday, July 12, 2009

Srware plans Iron Chrome browser for Mac OS

The Chrome-based browser version Iron broadcasts differently than the original version, no usage data to Google. Iron Srware used for a newer and JavaScript rendering engine, making the browser a little faster than the original works. According to Managing Director Stefan Ries, Srware plans a Google Chrome Engine based version of Mac OS Iron available. This was announced in Ries e-mail. Currently, Iron Srware browser for Windows. The company offers Iron as a portable and installation version.

Google's Chrome Engine offers over the competition, especially in matters clear speed advantages. Particularly fast in the browser JavaScript code to work. Already at the start shows the Google browser, it requires few resources. Especially on slow PCs Chrome starts much faster than the competition. Chrome sends the other hand, a lot of data to the Google headquarters. This is the browser in the criticism of data protection advised.

Srware with Iron provides a chromium-based browser version, the data into account. Unlike the original is not unique client ID is generated, by which the user can theoretically be identified. There is also no set time stamp, which provides information about when the browser was installed. Incorrectly entered addresses will not like to Google Chrome. It also includes an Iron Adblock, which the browser is not Google has to offer. For Iron Srware used a more recent rendering and JavaScript engine as Chrome, so the browser Srware in practice works a little faster. In fact, could be in the Iron benchmark almost always say before Chrome. Users, the development of the free browser wants to support can be via Paypal Srware a donation to you.

Wednesday, July 8, 2009

MessageLabs warns against short URLs in spam e-mails

Nowadays, There are plenty number of short URLs in the spam e-mails. These kinds of spam messages with links abbreviated as increases from 0.5 percent to 2.5 percent. The increase indicates an automated generation of short URLs out. MessageLabs has warned the users against a strong increase of the short URLs in spam e-mails. The proportion of unwanted messages that contain a condensed link, either in the last week of at least 0.5 percent to two percent.

Short URLs make it possible for spammers, the ultimate goal of a link before the addressees to hide. They will often rely on social media sites like Twitter, which the number of characters of a message limit. "Normally such an increase is an indication that a spammer has found a way to generate short URLs to automate," said Matt Sergeant, senior anti-spam researchers at MessageLabs. A botnet with the name "Donbot" did this last technique increasingly used. The botnet appears to be designed, advertising display. Many computers are badly infected from the viruses, malwares and spywares.

Kaspersky has warned against possible dangers, which condensed out URLs. Services such as tinyurl and is.gd now offer optional preview links to pages in the full URL of a target display. In addition, Finjan a "Secure Browsing" called, free plug-in for Internet Explorer and Firefox. It discovered manipulated sites that are behind short URLs hide.

Monday, July 6, 2009

HTML 5 is not making open source video codec fixed

A clear definition fails the resistance of the browser manufacturers. They fear patent and qualitative problems. HTML 5 will not open-source codec for the item "Video" set. So far, H.264 or Ogg Theora for selection for multimedia content such as videos directly in the browser without plug-in from a third party, such as Adobe Flash or Microsoft Silverlight play. One of the key features of HTML 5 is its native handling of rich media such as video and audio through the video and audio tags, which mean Web developers do not have to rely on proprietary products such as Adobe's Flash or Microsoft's Silverlight. A solid integration of Ogg Theora is loud Hickson, inter alia, the resistance of Apple failed. The company wanted the codec due to lack of hardware support and unclear patent situation is not installed in Quicktime.

Google's Chrome browser, support in the current version of both codecs, the developer writes on the website of the Web Hypertext Application Technology Working Group (WHATWG), an association of companies involved in the development of HTML 5 work. The search provider could not license H.264 for Chromium, the open-source version of the browser available. Google also doubt that the quality of Ogg Theora for YouTube videos. Opera and Mozilla in turn refused to use H.264 because of patent and licensing problems.

He voted for the definition of codecs provided paragraphs of HTML-5-specification away, so Hickson. Instead, there are no targets, as in the past with tags for the presentation of images and image formats for the "Embed" and plug-in APIs and Web fonts. Hickson suggests two possible solutions to the problem. First, could the spread of Ogg Theora as much to grow, that Apple has to give up his resistance. On the other hand, one could wait until the patents expired and the H.264 codec will become the dominant technology.

Thursday, July 2, 2009

Bing introduces real timeTwitter posts in its search results

Microsoft have taken a big step towards the Bing success. Now, Microsoft will shows the real time Twitter posts in the search results. This news will help Microsoft to keep the hype about Bing intact. According to sources, Bing is successful in grabbing the search market where as Google lost little of bit during June month. Microsoft is testing the real-time search on Bing introducing the results of "posts" facts on Twitter. At the same time, the editor opens his own account on the official site of microblogging. Microsoft announced Wednesday evening on the blog dedicated to Twitter Bing it included in its search results.

Now, It will very interesting that how Google is going to react about this Bing step. Users can decide which browser is better than rest of them. It is very clear that Microsoft Bing have many new features that Google does not have. For now, Microsoft has restricted the number of "twitterers" a few thousand people selected based on volume of Twitter and the number of followers. By typing the name of a person followed or preceded by Twitter, you get the latest posts and link to his account and as to set an example, Microsoft has at the same time created its own account on Twitter.

The real-time search is emerging as one of the major challenges for search engines "classic." Twitter regularly demonstrates greater responsiveness to the news front. The implementations seems more of a publicity than reality. Bing is showing
up recent tweets from well-known people. The search appears only when that person's name and Twitter in provided in the same query. This has been tweaked via Twitter's API, which doesn't differentiate it from a simple widget that shows you the most recent tweets of a twitter member. A tool which neither Microsoft nor Yahoo, or Google can not do without. The Mountain View company is currently working on a project specific search engine to Twitter would take into account the size of messages.

Tuesday, June 30, 2009

The compatibility of Windows Vista

To reassure those who are reluctant to migrate to Vista because of compatibility issues, Microsoft opened its website on a space that brings together all the Vista drivers and lists of equipment and software compatible. Microsoft has put online in
the next few hours the Windows Vista Compatibility Center, a space on its U.S. site dedicated to the compatibility of its operating system. This is a very concrete sign that shows that the problem of compatibility of Vista with older PCs, peripherals and software market is still valid. It was largely marred the launch of the OS, and was revived with the recent release of Service Pack 1, which has brought new incompatibilities.

Windows Vista Compatibility Center is supposed to offer all the resources and information to easily migrate to Vista. In addition to essential downloads drivers, and access to practical information ( "& How to Help"), some 9 000 references
compatible products should be included. This equipment requires a special Vista driver as cameras, printers and scanners, mobile terminals, adapters, etc. But Microsoft has also integrated displays, keyboards, mice and other hard drives that do not present a compatibility problem with the OS. For the Windows Vista Compatibility Center is also a commercial site on which it is possible to buy a wide range of peripherals and software for PC.

Except that this service charges a few startup problems. The home page was first posted the following message: "Windows Vista Compatibility Center is not currently available" ( "Not available"), followed a few hours after the message: "Windows Vista Compatibility Center will be launching soon, please check back! "(It will be launched soon, thank you to return").

Thursday, June 25, 2009

Microsoft launches the service Hohm

Microsoft announced Wednesday evening, Hohm a free online service that allows individuals and businesses to better manage their electricity consumption and reduce their bills. It is still in beta version, Hohm made its debut on 24th June 2009. This application is available only for US consumers. It gives a better idea of how much energy they are consuming.

So, Microsoft Hohm really helps to conserve the energy and save money. This free online service is an analysis tool available to individuals and professionals to analyze and measure their power consumption and, second, issue advice to lower the bills. Microsoft has also set up a Web site for consumers who are interested in signing up for the beta test of Hohm. Microsoft Hohm is available at "MSHohm.ORCSWeb.com". So, US custumers can order for Microsoft Hohm by submitting their email adderss at "MSHohm.ORCSWeb.com". Microsoft will send a notification to the email address when Hohm becomes available.

With Hohm, Microsoft has just mark the PowerMeter Google breeches. The amount of electricity consumed in the house can be measured by installing thiis widget on your computer. But unlike Hohm, PowerMeter requires the installation of a transmitter box to collect the information. “Microsoft Hohm demonstrates how a combination of advanced software and Internet-based services can help people track, understand and manage their personal energy usage Microsoft also intends to market this sort of intelligent at an attractive price.

Tuesday, June 23, 2009

Microsoft integrates Media Center in Windows Home Server

The editor enriches its home server OS for a Power Pack 2, which includes Windows Media Center. This update also brings support for video formats like MP4. It should be available in French at the end of April. It is designed with HP in 2007, Windows Home Server, the operating system for multimedia home server from Microsoft, has never really convinced and struggling to find its place on the PC.

To restart it, the Redmond company has put online a Power Pack 2 in English. It will be available before the end of April in five other languages, including French. The installation of this expansion pack takes place via the Windows Update and the OS needs to already have the previous Power Pack on a PC with Windows Home Server.

Main novelty of the Power Pack 2, the arrival of Windows Media Center. This feature will simplify the connection and sharing files with other PCs equipped with Media Center (XP or Vista), and allow streaming MP4 files from the server to the X box 360 or to the Media Center Extender devices, as multimedia gateways. In other words, we can say that two separate products with goals that are highly complementary to each other. They will each benefit immediately once Windows Home Server ships. Windows Home Server will be able to perform its tasks, connecting all the computers in your household, creating automatic multi-PC backup and restore, deliver a comprehensive solution for centralized storage and allow for remote access.

Power Pack 2 also adds Windows Home Server many assistants to facilitate connections between devices but also its interface outside the local network. Finally, it corrects problems encountered by users when backing up files or folders on PC LAN, and it removes previous limitations on copying media files from a PC running Vista. Microsoft has also released this Word document with details of the changes introduced by this Power Pack 2.

Sunday, June 21, 2009

Spyware Removal

Spyware is a computer software program that hacks personal information of the users and send it to the third party. Spyware is installed on computer without the user permission. Spywares are mainly responsible for the malfunction and slow performance of the computer. There are many anti-spyware removal programs in the computer market but some of anti-spyware programs are generally used by the users. Spyware Doctor is a award winning spyware protection software from the PC Tools. It detects, removes and protects your computer from various kinds of spywares. It has some advanced features as compared to other spyware protection programs. You can download the trial version of Spyware Doctor from the link "http://www.pctools.com/spyware-doctor/".

There are some other important spyware protection programs which are the followings :--
1. Superanti-spyware
2. Webroot Spy Sweeper
3. PC Tools Spyware Doctor
4. Sunbelt Software CounterSpy 2.0 Beta
5. Lavasoft Ad-Aware Personal 1.06
6. Safer Networking Spybot Search & Destroy 1.4
7. Windows Defender
8. AVG Anti-Spyware
9. CounterSpy

Points To Remember :--
You need to update all these softwares before start the scanning process because it helps to get all the latest definitions of all the spywares. We need to remember the following points which prevent the installation of spywares :--
1. You need to make sure that never install the programs on computer which contains the spywares.
2. It is always recommended to have a pop-up blocker program that prevent the computer from spywares.
3. Never click on the unknown pop-ups and links.
4. You have to scan the computer over the specific time with updated Anti-Spyware program to remove the spywares.

Spyware Removal Instructions :--
Now, We are discussing all the steps that are involves during the Spyware removal process.
1. You need to download and install the Spyware removal software on the computer.
2. You should update the Spyware removal software before start the scanning process.
3. You should restart the computer in "Safe Mode with Networking".
4. You should scan the computer by using updated Spyware removal software.
5. You should remove all the infected files from the computer after completing the scan process.
6. You should restart the computer in "Normal Mode".

Friday, June 12, 2009

Turn on Automatic logon in Windows XP

In Microsoft Windows XP, We can automate the logon process by storing your password and other pertinent information in the registry database. This feature permits other users to start your computer and to use the account that you establish to automatically log on. We should not use this Windows feature if your are concerned about security because If you set a computer for automatic logon, anyone who can physically gain access to the computer can also gain access to everything that is on the computer and your password is stored in the registry in plain text.

You can use Registry Editor to add your log on information by the following steps :--
1.Click Start, click Run, type regedit, and then click OK.
2.Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
3.Using your account name and password, double-click the DefaultUserName entry, type your user name, and then click OK.
4.Double-click the Default Password entry, type your password under the value data box, and then click OK.

If there is no DefaultPassword value, create the value then follow these steps :--
1.In Registry Editor, click Edit, click New, and then click String Value.
2.Type DefaultPassword as the value name, and then press ENTER.
3.Double-click the newly created key, and then type your password in the Value Data box.
4.Double-click the AutoAdminLogon entry, type 1 in the Value Data box, and then click OK.

If there is no AutoAdminLogon entry, create the entry then follow these steps :--
# In Registry Editor, click Edit, click New, and then click String Value.
# Type AutoAdminLogon as the value name, and then press ENTER.
# Double-click the newly created key, and then type 1 in the Value Data box.
5.Quit Registry Editor.
6.Click Start, click Restart, and then click OK.

You can also use turn on automatic logon without editing the registry in Microsoft Windows XP Home Edition and in Microsoft Windows XP Professional by the following steps :--
1. Click Start, and then click Run.
2. In the Open box, type control userpasswords2, and then click OK.
3. Clear the "Users must enter a user name and password to use this computer" check box, and then click Apply.
4. In the Automatically Log On window, type the password in the Password box, and then retype the password in the Confirm Password box.
5. Click OK to close the Automatically Log On window, and then click OK to close the User Accounts window.

Wednesday, June 10, 2009

Firewalls protection against the external threats

When a connection to the Internet without a firewall, it takes no more than a few minutes and the computer has a trojan or similar threats as relevant tests show. Firewalls are an absolute must to uninvited guests away from your computers. A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.

Norton Internet Security provides comprehensive protection against the latest threats from the Internet. The program is immediately after installation in the background, optimizing the security settings and automatically protects against a variety of spy programs, viruses, worms and crime ware. It also protects the functions contained in the intelligent firewall against hackers and prevent unauthorized spying programs transmitted information.

Another round-safety tool, F-Secure Internet Security. The suite protects your PC from viruses and hacker attacks from the Internet. With the help of the integrated and excellent anti-virus software, the user is safe from viruses, e-mail. The firewall protects against attacks from the Internet. The tool also has an integrated lock time. There are some good firewall software program is available which protects your computer from external threats. Here is the list some firewall software programs:--
1. Mcafee Personal Firewall
2. Norton Personal Firewall
3. Panda Firewall
4. Comodo Firewall
5. Zone Alarm
6. PC Security Shield
7. Black Ice Defender
8. Agnitum Outpost Firewall Program

The Agnitum Outpost Firewall Program detects and blocks hacker attacks and intruders. It also offers full control of privacy, monitors network activity and those between the applications on a computer. It also prevents that Internet worms, especially in the inbox to become active. A self-protection feature ensures that the firewall direct target of an attack will. The extremely user-friendly Personal Firewall protects your PC effectively against hacker attacks, worms, trojans, spy software and other malicious code. Filtering rules to prevent or allow connections and applications that access the Internet want to be recorded and reported.

Monday, June 8, 2009

Troubleshooting of configuration errors in Windows XP

We should follow these troubleshooting stpes to get rid off Configuration errors in Windows XP :--
Method 1: Diagnostic and Selection startup modes
To perform a diagnostic startup, follow these steps:--
1. Click Start, click Run, type msconfig, and then click OK.
2. On the General tab, click Diagnostic Startup, and then click OK.
3. Restart your computer.
If the problem does not occur, use Selective startup mode to try to find the problem by turning individual services and startup programs on or off.

Method 2:-- Selective startup
Selective startup enables you to select the files and the settings that you want the computer to load when you restart the computer. Select from the following options:
1. Process System.ini File
2. Process Win.ini file
3. Load System Services
4. Load Startup Items

Method 3:-- Change individual file settings
If you know the different settings in each configuration file, you can enable or disable individual settings in the file that has the tab for that file in the System Configuration utility. To prevent individual items in a configuration file from loading when
you restart your computer, follow these steps:
1. Click Start, click Run, type msconfig, and then click OK.
2. Click a tab: System.ini, Win.ini, Boot.ini, Services, or Startup.
3. Select or clear the available settings.
4. Click OK.
5. Restart your computer.
6. Repeat steps 1 through 5 until you find the problem.

Method 4:-- Manually extract a file
If you have to fix a corrupted file, extract the individual Windows file from the CAB files. To do this, follow these steps:
1. Click Start, click Run, type msconfig, and then click OK.
2. On the General tab, click Expand File.
3. In the File to restore box, type the name of the file that you want to restore.
4. In the Restore from box, type the path of the Windows XP .cab file from which you want to restore the file. Or, click Browse From to locate the Windows XP .cab file.

Method 5:-- Return to normal startup
1. After you complete your troubleshooting and fix your configuration, return to a normal startup. Follow these steps:
2.Click Start, click Run, type msconfig, and then click OK.
3. On the General tab, click Normal startup.
4. Click OK.
5. Restart your computer.

Wednesday, June 3, 2009

Windows XP Boot and Startup Trouleshooting

Many computer users are generally facing the booting problems in Windows XP. It is mainly caused by corrupted Windows XP operating system. In this case, computer hardware appears to power up okay but the Windows XP operating system would not boot properly. There are some basic troubleshooting steps in order to get rid off booting problems in Windows. We are providing the following troubleshooting steps in case Windows XP would not boot :--

1. Use a Windows Startup Disk:--
We need to create a Windows startup disk for this method. We can create a Windows startup disk by the following steps :--
# Double click on the "My Computer" icon on your Desktop.
# Click on the 3½ Floppy (A:) icon just enough until it becomes highlighted.
# Click on the word File, which is contained in your top tool bar area.
# This will pull down a menu for you to now click on the word Format.
# Place a check mark in the box next to Create an MS-DOS startup disk at the bottom of the screen.
# Then click the "Start" button to begin creating your Startup Disk.
# Windows will display a warning that Formatting erase all data or your disk. Click on "OK" tab to continue.
# Windows will then display a progress indicator bar denoting the status of your System Disk.
# When the status bar reaches 100% your System Startup Disk will be complete.
# Close the format complete window by clicking on OK at the bottom of the screen.
# Click on the "Close" button to close the Format 3½ Floppy (A:) window.
# You should store your Startup Disk in a safe location.
You should insert Windows startup disk into the floppy drive on the afflicted system and press [Ctrl][Alt][Delete] to reboot the computer.

2. Use Last Known Good Configuration:--
This feature will allow you to undo any changes that caused problems in the CurrentControlSet registry key, which defines hardware and driver settings.

3. Use System Restore:--
System Restore takes "snapshots" of critical system files and some program files and registry settings and stores all these information as restore points. System Restore allows the rolling back of system files, registry keys and installed programs etc.

4. Use Recovery Console:--
Recovery Console can be accessed from the original Windows installation CD. It is particularly useful for repairing or replacing important operating system files.
5. Fix Corrupt Boot.INI :--
We can fix corrupted Boot.ini using "bootcfg /rboot" command. We should enter the "Load Indentifier" and enter something random as this is just a label. If 'bootcfg' asks for 'OS Load Options', enter '/fastdetect'.

6. Fix a corrupt partition boot sector

7. Fix a corrupt master boot record

8. Disable automatic restart

9. Restore from a backup

10. Perform an in-place upgrade

Wednesday, May 27, 2009

PC Optimization

We should perform "PC Optimization" tasks on our computers over the specific time. "PC Optimization" helps to increase the computer performance and reliability. It includes the various steps that should be performed in the systematic order. These are following steps that comes under the "PC Optimization" task :--1. We should create a system restore point for the safety purpose.2. We should delete all the temporary Internet files like temp, %temp%, prefetch files.3. We should optimize the browser by deleting all the cookies, history and junk files.4. We should scan the computer by using any updated antivirus program.5. We should install and download the "Anti-malwarebytes" software program on the computer.6. We should update "Anti-malwarebytes" software program.7. We should scan the computer using the "Anti-malwarebytes" software program.8. We should delete all the infected files after "Anti-malwarebytes" scanning result.9. We should restart the computer in normal mode.10. We should install and download "Superanti-spyware" software program on the computer.11. We should update "Superanti-spyware" software program.12. We should scan the computer using the "Superanti-spyware" software program.13. We should delete all the infected files after "Superanti-spyware" scanning result.14. We should delete all unwanted start-ups items by using the msconfig utility.15. We should un-install all unwanted softwares from the computer.16. We should perform the "Diskcleanup" task on the weekly basis.17. We should perform the "Defrag" task on the monthly basis.18. We should keep at least 5% free space on the 'C' drive.19. Reduce recycle bin maximum size20. Reduce size of system restore21. Turn off Hibernation.22. Turn off Indexing service.23. Disable the performance settings.
Best PC optimization tools 1. Ccleaner2. Perfect Optimizer
Best PC scan software programs1. Kaspersky antivirus2. Avira antivirus 3. Antimalwarebytes4. Superantispyware5. Spybot
Many major organization are providing some impacable software programs for "PC Optimization" which helps the users to run the computer smoothly. We can run the computer smoothly and properly by following all these above troubleshooting steps. We Should update all the security softwares on the regular basis which helps to get the latest the definitions of various viruses, spywares and malwares etc.

Thursday, May 14, 2009

iYogi Acquires Clean Machine Inc.

Larry Gordon, Founder of Clean Machine appointed as President Global Channel Sales at iYogi

New York, NY, May 11th, 2009 : iYogi, a global direct to consumer and small business remote technical support provider, today announced it’s acquisition of Clean Machine Inc, a provider of remotely administered PC security and performance management services. Clean Machine will operate as a separate brand under the iYogi services umbrella along with the recently lunched Support Dock (www.supportdock.com) and its comprehensive range of 24/7 technical support services for computers, printers, MP3 players, digital camera, routers, servers and more than 100 software applications. Larry Gordon, Founder of Clean Machine is appointed as the President of Global Channel Sales for iYogi.

computer repair,help and support

iYogi will integrate technology and innovation that Clean Machine Inc. has developed for delivering an enhanced service experience by proactively managing the health and security for PC's and Apple Computers. This acquisition also broadens iYogi's access to key markets through Clean Machine's existing partnerships. Larry Gordon's past experience and successful track record will accelerate iYogi's expansion through his focus on global alliances.
Commenting on the acquisition of Clean Machine Inc., Uday Challu, CEO & Co-founder of iYogi, said,

"This acquisition will help iYogi to enhance our customer experience and extend our market reach to the millions of consumers that are challenged by the increasingly complex technology environment. Clean Machine's proactive maintenance and management of PCs in home and small business environment will be our launch platform for building the next generation of managed services for consumers."

"We are delighted to have Larry spearheading partnerships and global alliances for iYogi. His incredible experience in marketing, sales and building global alliances will help forge partnerships with retailers, multiple service operators, software publishers, original equipment manufacturers (OEM) and other such companies that are at the frontlines for managing tech support issues for consumers and small businesses",
added Challu.

With more than 20 years of experience, Larry Gordon has played a variety of strategic roles in marketing, sales and building alliances. Larry was the Executive Vice President at Capgemini and Kanbay. He was also VP of Global Marketing for Cognizant (Nasdaq: CTSH), a leader in global IT services and Director of Marketing for New York based Information Builders.

"I am excited to join a company that shares a common mission to Clean Machine in creating a global brand for delivering the best technical support to consumers and small businesses. We also share a common approach of utilizing highly skilled talent with leading edge tools, thereby delivering services at incredible price-points, with high margins for our partners",
said Larry Gordon, the newly appointed President of Global Channel Sales at iYogi.


Headquartered in Gurgaon, India with offices in New York, USA, iYogi provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. IYogi's 24/7 phone and remote technical assistance, spans across a comprehensive range of technologies we use every day from a wide range of vendors. Utilizing its proprietary technology iMantra , and highly qualified technicians, iYogi delivers amongst the highest benchmarks for resolution and customer satisfaction. iYogi is privately held and funded by SAP Ventures, Canaan Partners, and SVB India Capital Partners. iYogi was recently awarded the Red Herring Global 100 Award, recognizing it as one of the 100 most innovative private companies driving the future of technology. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.net.


Clean Machine Inc. is a NJ-based and incorporated company that helps consumers and small business owners easily manage and protect their computing environments safely and cost effectively. The company is has a unique, powerful and inexpensive PC concierge service. Specifically, each customer is assigned a highly-trained tech concierge who remotely examines their computer system on a scheduled and very secure basis. The PC concierge will immediately fix software-based problems and prevent new threats to the customer's computing environment including offensive pop-ups, browser redirects and slow performance, and then provides a detailed report. Clean Machine's proprietary Radar(TM) technology (Remote Access Detection Audit and Repair) allows its expert technicians to remotely resolve any problems, eliminating the need for customers to go through the frustrating process of speaking with a tech support expert, and still having to do the work themselves. In other words, the Clean Machine PC concierges do it all. For more information on Clean Machine please visit www.pccleanmachine.com.