Professional Documents
Culture Documents
INTRODUCTION
A desktop personal computer is a most popular mode of personal computer. The system
unit of the desktop personal computer can lie flat on the desk or table. In desktop personal
computer, is usually placed on the system unit. A Purchasing a home or business computer
can be a big and sometimes costly decision. Below is a listing of helpful suggestions for
what to look for and ask when purchasing a home or business computer new or used.
NEW vs. USED
Today there are two options to buy a computer, a new or used computer. Used computer
are some time out of date, but you can buy it with very low price as compare to new
computer, but I think branded or used computer are much stable than a new computer.
Before purchasing a computer consider if you should purchase a new or used computer.
Many individuals sell computer before they are out of date allow you to purchase a relatively
decent computer. Before purchasing a new computer from a computer manufacture look at
what is available and review the below precautions when purchasing a computer.
More Considerations
When purchasing a computer it is likely that you will have a general idea of what you may
like in the computer or how you would like to configure the computer. Below is a listing of
the various components likely to be found in a computer and recommendations and tips
when considering any of the following components.
CD-R -always
will be an important consideration to think about
CD Media
when purchasing a new computer or used computer. A CD-
writer or recorder (or simply CD-R drive) is used to write data on CD-R
disks. Usually, a CD-writer can read information from CD as well as write
information on CD, The locally produced CD-R disks are created with CD
writer. The speed of these drives is up to 52X or more.
CD-RW - You must have a CD-RW drive to write date on the CD-RW.
These drives have read and write speed is up to 52X or more but the re-
write speed is 10X or more. The CD-RW drive is advanced and more
expensive than CD-R drive. It can write data on both CD-R and CD-RW
discs and also read data from them
DVD - DVD stands for Digital Video Disk Versatile Disc. DVD-ROM is an
extremely high capacity optical disc with storage capacity from 4.7 GB to
17 GB.
Hard Drive Hard drives have and always will be an important
consideration to think about when purchasing a new computer
or used computer. Hard disk is most commonly used storage
device in personal computers and laptop computers. Most
application programs and operation systems require hard disk
for installation and operation.
Other considerations
Here are some important considerations to look at when purchasing a computer new hard
disk drive:
Speed: Hare disk speed is playing an important role when your consider a computer
speed. The accessing speed of hard disk is also very high as compare to other storage
devices. It is from 5 to 15 MBps. The platters of hard disk rotate from 3000 to 10,000
revolution per min.
Warranty: How long is the warranty and what does it cover.
Support : Is the technical support number a free number is it open 24 hours 7 days a
week.
Tips On Buying A Computer Memory.
Introduction
Here are some Information and help on buying computers components hardware and
software. This section of Computer Tips is designed to help all users to understand and
make better decisions when purchasing computer hardware and software. There are some
tips when you are ready to buy a computer for example:
BUYING LOCATIONS
The first and important thing is to consider the buying location when purchasing a computer
or computer equipment, software and hardware. There are many location to buy a computer
but We have listed here some locations you will be able to purchase computer equipment or
from and what to look out for. Please select one of the below locations you plan on
purchasing from.
INTERNET
Internet is very easier, faster and cheaper way to buy computer hardware and software.
Because a manufacturer provides you the detail information about its products, prices and
where they are available for sale. A shop provides you a list of goods available, price of each
item, that is why you can easily compare the price and quality of one company products to
other company products.
LOCAL RETAILER
If your are not interested to buy a computer using internet then Local Retailer is one of the
safest location to buy computer hardware and software. However the important issues to
find a suitable shop for this purpose. So please first verify the return and warranty policy in
case the device is not functioning or is not compatible with your computer.
Run Commands
• appwiz.cpl -- Used to run Add/Remove wizard
• Calc --Calculator
•
• Dcomcnfg --DCOM user security
• Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP
• Tracert --Traces and displays all paths required to reach an internet host
Here's a cool tip for accessing a Web page from any Windows address bar. You can
enter any string of characters in an address bar and then press Ctrl-Enter; Windows
will automatically add both "www" and ".com", and then search for the page on the
Internet. For example, if we type
computerfreetips
in an address bar and then press Ctrl-Enter, Windows will take us to the
computerfreetips
Web site at www.computerfreetips.com. Give it a try.
Are You Ready for SP2 and why you install it
Windows XP's Service Pack 2 basically a windows update and it is very necessary to secure
your windows XP from virus, worm and other security problems. Window's XP SP2 are
available on Microsoft site and ready to download without any cast. If you're ready to install
this major OS update, you can check out the info at:
http://www.microsoft.com/windowsxp/sp2/default.mspx
and find out how to get a hold of this important OS update. Download this file and install it,
after installing restart your system. If you want to check SP2 installed or not then right click
on "My Computer" then properties option for confirmation.
How you can Automate the DIR Command
If your are using same switches frequently in Command prompt then open your system
command prompt using open Run option
Click Start and open Run option then type cmd to open command prompt, here type
set dircmd=/w/o/p
then press Enter, now every time thereafter that you type
dir
the /w/o/p switches will be automatically applied and now need to type every time. If your
are interested to use single switch like /w you can use it
set dircmd=/w
and press Enter.
and same if you wants to undo these switches then you can very easily by typing
dir /-switch
For example, if you wanted to do a directory with only the /w switch, you could enter
dir /-p/-o
When you exit the Command prompt window, however, the Dircmd setting returns to its
default settings.
If you need to access lot of folders on your home computer or on the network regularly then
you can set them re-open automatically, when you will login, shutdown or restart your
computer next time. There is no need to open regularly used folders manually, just
configure the simple sitting, your computer will automatically reload all the previously
opened windows.
By default windows XP disables this option to reload automatically all the previously opened
windows, when you login on, shutdown or restart your computer.
Follow the given steps to configure your computer to reload previously opened folders
automatically after shutdown.
• To edit this feature, you will need to be logged into your computer with
administrative rights.
• First click on Start button then go to Control Panel.
• Open the “Appearance and Themes” option in control panel then click on
Folder Options.
• A small windows dialog box will appear with the title “Folder options”, click on
View tab.
• Under the Advanced setting section, scroll down to bottom and click the
“Restore previous folder windows at logon” option and then click Ok button to
save sitting.
• Now when you log off, restart or shutdown, your computer will automatically
open the previously opened folders from the same location as before.
You can set the boot time in windows XP as your wish if you are install two operating systems
on same computer, for example window 2000 with windows XP or more than two. Yow can do
this with editing Boot.ini file. Here you can also set the sequence for operating system which
operating system boot first.
First Right Click on My Computer option and then select its Properties. In next dialog box open
Advanced tab button. Under Startup and Recovery, click on the Settings button. Use the spin
box "Time to display list of operating systems" to set the number of seconds you want the
system to wait before automatically starting the default operating system. Here you will set
time in seconds and its range start from 0 and ends with 999 seconds.
After set the time, then click OK option to close the dialog box to save your change. The
next time you restart, the new time will take effect.
In windows XP you can enjoy a good feature to run CD or DVD automatically when you
loaded it into you CD drives on your computer. This is a defaults feature in windows XP but
you can disable and enable it according to your nature of work. In user interface mode there
is no option to disable or enable this feature, you must edit the registry of windows and be
careful to work registry.
Click Start button then type regedit in Run option then press Enter for next.
Here locate the location to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom
Here you can disable or enable automatically running your CD. Change the value of
Autorun to 0 for disable and change the value to 1 for enable. At the end restart your
computer for this change.
Print and Edit Through DOS Mode
If you are working at the Command Prompt your can modify and print the text file very
easily. There are different ways to print text a file while working at the Command Prompt.
Assuming the file you want to print is in your current folder, you can type here with your file
name with extension. For example
print filename.txt
and press Enter. Here .txt is the file extension. You must use the extension. Now in the
same way you can edit this file before printing with given command
edit filename.txt
and press Enter. This command opens the MS-DOS Editor to edit this file. Edit the file and
then press Alt, F, P to print it.
Toggle Keys option designed for those people who are typing while looking away from the
screen or for those who are vision impairment. When your system Toggle keys is turned on,
you will get a special sound when special keys are pressed like CAPS, NUM, SCROLL LOCK
keys.
To enable or disable your system Toggle keys, go to Control Panel using Start button. In
your system Control Panel normally the first option will be Accessibility options. Double click
on Accessibility options and check the Toggle keys box, Windows will automatically send you
a special beeps when you will press locking keys.
Now restart the computer. Num Lock should come on and stay on.
Today tip will help you to delete the files and folders that are being used by
another programs and applications, for example a virus affected file. You
have tried to delete such kind of files or folders and received the any
following messages.
• Cannot delete file: the file is in use by the other program
• Cannot delete file: There has been a sharing violation
• Cannot delete file: The file is in use by another program or user
• Cannot delete file: Disk is not full or write-protected and that the file is not currently in use.
• Cannot delete file: The source or destination file may be in use
Normally, a windows restart will allow you to delete such files or folders that are being used by
other program, but if you want to manage it without restart your computer then simply you need
to download a freeware tool called Unlocker.
You can download this tool for any windows version using Unlocker link. Download it and run the easy setup.After
installation, right click on file or folder that you want to delete and select the option Unlocker. If your requested file
or folder is used or locked by other application then a small window listing of lockers will appear.
Here simply click on “Unlock All” button and now you can easily delete this file.
Suggested Reading
A Quick way to print a Document
There are many ways to prints a document, but you can print a document quickly if you put
a shortcut to the printer on your desktop and drag a document icon to it, no need to open
file for printing just drag a file to printer icon and get your print.
To do this, first click Start button, Settings, then Printers ( first make sure you installed
your printer driver). When the Printers window opens, hold down Ctrl and drag the printer
icon to your system desktop.
Now you can drag a document icon and drop it in printer icon on your desktop. Here you will
get a print quickly and with out open a file.
Today tip will help you to enjoy the quick and easy way to find lost files on your computer.
Here I recommends you, try to search a file with its file extensions (for example for word
file, type *.doc, Excel *.xls, Acrobat *.pdf, *.ppt and *.exe for executable files. If you
don't know the name of file but know that it contains a string of text then try to search for
files containing specific text, type the text you want to find from any file or folder. This is
time taking process but creates very precise result. In Look in, click the drive, folder, or
network you want to search. To save time, always select the specified drive or location
instead of whole computer.
Click Start Button, point to Search, and then click For File or Folders, a Search Results
dialog box will appear. In Search for files or folders named, type the file name or folder
name you want to find in containing text.
To specify additional search criteria, click Search Options, and then click one or more of the
following options to narrow your search:
• Boot in Time
• How to login with multiple ID's at the same time in Yahoo messenger?
• How to disable auto-start applications on windows startup?
• How to start windows programs quickly with Run Command?
• No NTFS Floppies
• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer
•
• Here in right side panel, right click to create a new DWORD value with
name NoClose.
• Windows registry
• Active Directory
• Windows registry
Follow the given steps to run System State data backup wizard:
To use this feature, you will need to be logged into your computer with administrative rights.
First click on Start button> All programs> Accessories> System Tools then click on Backup.
Now by default backup wizard will start, click on advanced mode option to change the backup settings.Here a dialog
box will appear with title "Backup Utility", select "Welcome" tab and click on Backup Wizard [Advanced] button to
create backup of windows important components.
Click on Next button to continue backup wizard.
Now select option "Only back up the System State date" on what to back up page and click on Next button.
Here click on Browse button to specify the destination for backup file and also set backup file name under "Type a
name for this backup" box then click on Next button.
Now verify your selected settings and click on Finish button to start backup process.
To use this feature, you will need to be logged into your computer with administrative
rights.
Click Start button and then click on Run option to open run dialog box.
Now type the following command in Run box and press Ok button.
regsvr32 /u %windir%\system32\zipfldr.dll
A small message will appear with title "RegSvr32" and the message is "DllUnregisterServer
in C:\WINDOWS\system32\zipfldr.dll succeeded." Click on Ok button.
Now right click on any file or folder to verify the change.
Follow the given steps to enable the windows built-in compressed folder feature:
Now again click Start button and click on Run option to open run dialog box.
Now type the following command in Run box and press Ok button.
regsvr32 %windir%\system32\zipfldr.dll
A small message will appear with title "RegSvr32" and the message is "DllUnregisterServer
in C:\WINDOWS\system32\zipfldr.dll succeeded." Click on Ok button.
Now right click on any file or folder to verify the change.
To use this feature, you will need to be logged into your computer with administrative rights.
After installing the rktools.exe setup, locate the Winexit.scr file in the following location.
Here right click no Winexit.scr file and select the Install option.
A Display Properties dialog box will appear, select Screen Saver tab and choose "Logoff Screen Saver"
entry under the Screen saver area.
Now click on Setting button, again a small dialog box will appear with the title "WinExit Setup Dialog".
Here select the "Force application termination" check box under the "Force logoff" area
and type the number of seconds in "Countdown for n seconds" box under Time to logoff area.
Now type the message that appears during the logoff countdown timer in the "Logoff Message" box
Here a small dialog box will appear with the title "Auto logoff in progress", it displays the countdown
To use this feature, you will need to be logged into your computer with administrative
rights.
Click Start button and go to Settings then click on Control Panel option. Now system will
open the Control Panel windows with different categories.
Just click on System option, a small System Properties dialog box will appear with many
options like System Restore, Remote and Automatic Updates and others.
Click on Automatic Updates tab, if it is not selected already then click on “Automatic
(recommended)” box. Then this will display the different setting to continually check
Microsoft’s website for updates.
Here you can pick a download and installation schedule or select the option “Download the
updates automatically and notify me when they are ready to be installed” in the section of
settings. Through this option you can download updates automatically and it will install the
updates immediately.
If you wait a day or two before installing an updates to make sure there are not any serious
bugs reported about the latest patch you can check it through Microsoft website. Now click
on Ok button to finish the process.
Security Alerts
• Be Careful with Attachments
• XP SysKey Trick
• Google Security
•
• Hidden User Account
• Web Bugs
• Wireless Security
• Secure Website Problems
•
• Be Careful with Attachments
•
• There have been a number of really bad viruses just within the past 6
months. We've seen the W32.Beagle, W32.Netsky, MyDoom, and so
on. Most of these viruses were transported or replicated from pc to pc-
using email attachments. These are easy to spot if you're paying
attention, simply because they are usually executable files, but not
always.
• Some attachments contain Macros (simple programs that run within
other programs, all the titles in Microsoft Office use macros). If you're
not that familiar with spotting file extensions, don't worry, that's what
I'm here to talk about today. If you are a little hazy on the whole "file
extension" thing then let's spend a few moments explaining it.
• File extensions are what tell the program how to treat a particular
piece of data. For example, most people are somewhat familiar with
.doc or a .txt file extensions these are both text documents and when
the user opens this file the Operating System looks at this extension
and then knows how to open it.
• Hackers try to use some sort of eye-grabbing ploy to get you to open
their email and activate the virus, which is always an attachment. Most
Anti-virus nowadays stops, or at least warns, you of these high risk
attachments and even take measures to protect you. However, on the
average 10-15 new viruses are created every day and I personally
wouldn't count on any program to 100% protect my pc. That's why I
scrutinize any email, if I wasn't expecting an attachment, I won't open
it until I had a chance to talk to the sender.
• Some of the more common file types used to hide viruses include:
• .scr - Windows Screen Saver - USE CAUTION if you receive a screen
saver via email. They can contain worms or viruses
.pif - DO NOT OPEN! This is most likely a virus. Clicking it will run a
program or code that can mess up your computer.
.exe - executable file - a program that contains a virus, Trojan horse,
or worm
.pps - MS PowerPoint (can contain macro virus)
.zip - Zip (compressed) file
.vbs - Visual Basic script
.bat - Executable MS-DOS batch file
.com - DOS executable command
.asp - active server page - internet script
.doc - Word document (can contain macro virus)
.xls - Excel file (can contain macro virus)
• This is in no way a complete list. Just because an attachment may
have one of these extensions doesn't mean that it is a virus, but it
should send up warning flags. Hackers use clever subject lines, and
viruses can appear to come from a friend so keep on your toes and
don't fall victim to their deceptive traps. Scan those attachments and
verify with the sender before opening.
•
• Back Up Your Data
•
•
•
• Just about everybody has important data on their hard drive, from
digital pictures to important documents, emails, earmarked websites
the list goes on and on. In my experience people are pretty lax about
backing up their PCs, and I think this really is an area that deserves
attention. With a good back up set you can bounce back from a fatal
hard drive crash and be up and running with all the your pictures,
documents, downloads, email and favorites before you know it. Having
important files stored on removable media is also a good safety
precaution in case you get a virus or Trojan horse.
•
• There are a couple of different ways to back up important data, from
the casual copy and paste to running complicated scheduled backups.
There is no wrong way, as long you have a copy of everything you
need.
• You can save the data on a couple of different types of media (floppy,
ZIP, CD-R/RW, DVD+R/RW, Flash memory, even dat drives) but for
home use I really recommend either CDs or DVDs, floppies are just to
small, Zips, although bigger than floppies are still small (100-200MB),
and they're old and kind of expensive. Flash memory can store data
but it's not really something you want to save data to and store away
unless there is no other option. DAT tapes are more for the corporate
end of things and are overkill in most homes. CDs are cheap, hold a lot
of data, work on any PC and are easy to store.
• If you use CD-RW, or DVD-RW you can actually save money by setting
up a "round robin" with your backups. To do this, you need at lest 3-4
of the same backup set, take the oldest and erase it. Now use the
blank disk for the new backup, the next time you do a backup use the
oldest disk in the set and so on and so forth.
• As for the methods of backing up, I find it's easiest when all my
intended files and folders are organized in structured manner and not
scattered all over my hard drive. This is a good way to insure that you
don't forget anything important by hunting for a bunch of individual
files. An easy way to stay organized is to create a descriptively labeled
folder structure and try to be diligent about saving your data to it's
designed folder.
• Another good practice is to test your backups, don't just take the
burning software's word for it. After a backup, explore the disk and
randomly go through files and open them up to make sure that they're
complete and not corrupt. Learn from my experience, waiting for a
complete system failure is not a good time to check the validity of your
backups. This is a good way to get yourself in a lot of trouble as well ?I
know if didn't back up the pictures or movies of our kids I wouldn't be
able to live with my self.
• Once you have all your ducks in a row, it's time to back up. There are
a number of ways to do this as well. The easiest is to open you
burning program and select data CD and go through the folder then
explorer and grab the folders you want to back up. When you select a
folder you should see it in the "burn" selection window, once you done
with your backup selection choose "burn".
• If you have Windows XP you have the luxury of being able to open up
the blank CD or DVD in Windows Explorer and copying and pasting the
desired folders right onto the disk and select "Write files to CD" and
Windows will do the rest for you. This is nice but not all of us have XP,
and I personally still like to use my third-party software.
• Most burning software has their own backup services, and there
are a number of third-party back up titles out there. The nice
thing about using these types of software is the options. Things
like compression, backup jobs, and incremental backups. These
are nice features especially when you have some backups that
you want to insure are up to date. For instance, you can create
a "Back up Set" which is basically a saved and named list of
folders and files that you want backed up. This makes the whole
process so easy?you can create a backup set and once a week
or so your can run it and it will either create a new back up or
save just the changes to the backup. These are two options that
are usually found in backup programs. If you use "backup sets",
it's important to keep the files organized, and in all the correct
folders. You can also schedule Backup Jobs, which are basically
backup sets that are scheduled to run at predetermined times,
and intervals (i.e. once a week Friday at 6:00).
•
•
• Beware of fake security warnings!
•
•
•
• Sometimes you'll be surfing the web and a window pops up that looks like a
legitimate warning from Windows. Before you click, read carefully and you'll
find that it's just a pop up ad trying to entice you to a product site by clicking
"Yes". I've even seen some with a shield that resembles the new SP2
Security Center logo.
• Just click the X at the top of the window to close it and go on your way.
•
• How to download the youtube videos on hard disk?
• Using this tip, you can easily download the youtube.com
movies and save on your computer hard disk. Actually all
videos are saved on youtube in flash video format, so you
can simply play these videos on the website and can't save
directly to your computer. But there are many tools are
available in the market to download these videos on the
hard disk, but here you can do this using a website. You
can convert also the downloaded videos from youtube into
any common video format, for example, windows media
video file (wmv), windows video file (avi) and movie file
(mpeg).
• Follow the given steps to download videos from youtube on
your computer:
•
This week I'll be discussing the first line of defense between you and the
Internet firewall. A firewall isn't going to stop you from getting a lot of
viruses out there, unless it's the kind of viruses that proactively scans
systems for open ports like the 32.Sasser that has recently stepped onto the
virus scene. Where firewalls really come into play is in the area of Internet or
Network access.
• There are two basic types of firewalls: hardware and software.
• A common hardware firewall is a routers. In a small network it sits in-
between your PC and modem. These firewalls feature the ability to hide your
PC from others on the Internet by assigning you private IP addresses through
a process called NAT (Network Address Translation) or DHCP (Dynamic Host
Configuration Protocol).
• I may have lost some people there who are not familiar with IP addressing.
This can get confusing rather quickly. To put it simpler: a router will take the
Internet address that your ISP has doled out to you and give the PCs the are
connected to the router a generic private IP address (not valid for the
internet). The other primary job is to close ports (these are numbers that are
associated with certain jobs, for example most email clients and servers use
SMTP port 25 and POP3 port#110) ports can be a vulnerability as seen in the
past and a hacker can have an easy time getting into your PC with ports wide
open to the world. When hackers try to scan your network for known
vulnerable ports the Firewall simply drops the packets because they contain
data that no PC on the network requested.
• Software firewalls are a little bit different and they have good points and bad
points. First let me start by saying that it is always better to have a firewall
then not to. The main difference between the two styles of firewalls is that
one is an external device that runs on it's own hardware. The software
firewall is an application that runs on your PC. This is the one down side I
believe because it's one more application running on your PC while you're
trying to surf the web and can cause resource overhead and slow things
down in older PCs. In concept the firewalls really are the same, except that
one of the biggest differences is a software firewall doesn't have any address
translation services (i.e. NAT or DCHP).
• Software firewalls do have some really great features however. For instance,
a software firewall is great for someone who is new to this area of PCs and
wants to learn more. I say this because most of these firewalls have a
reasonably easy to understand interface different from the more "Techie"
looking router interfaces.
• Software firewalls also have a feature for Internet access that I think is very
informative, for example in most of the software firewalls I have come across
when a program tries to access the internet the firewall will pop up and ask
you if you want this action to be allowed every time, prompt every time, or
deny Internet access to the program. Most software firewalls will also notify
you when someone from outside is hitting your firewall and a lot of times you
get the IP address of the party on the other end of the actions. Both of these
features can be used to further protect your PC, in some cases you might
even be able catch a hacker trying to get into your PC by getting their IP
address and then asking there ISP what this IP address is doing pinging your
IP address.
• I've actually helped one of customers do this they called me up and said that
there firewall kept making noises and popping up with windows saying that
there was some activity on here firewall. She said that this had been going
on for a couple of days. Well we opened up the interface and looked at the
log describing what the activity was and from whom it originated. There were
a bunch of pings hitting her firewall, but the software gave us the IP address,
and from there we opened up a command line and pinged the IP address
back and it came up with their ISP's domain name. She called that ISP and
talked to them about this address and what has been going on. I wouldn't be
surprised if he was kicked from his Internet service.
• McAfee has very similar features: it scans my incoming and outgoing mail
and it pops up to let me know when there's a threat in my email. The pop up
window in McAfee also has the name of the potential virus with a link to more
information concerning the virus in question.
• This is nice and because you can see the threat without going though the
procedure of clicking the paperclip for the name of the virus like in the before
mentioned Norton antivirus. However, you can view the virus information by
clicking on the paperclip like you do with Norton if you didn't catch the virus
name in the initial pop up and would like view information on it.
• Both McAfee and Norton have virus information sections of their website. This
is a good place to take any information that you have gathered on the virus
or threat, and plug it in. This can give you a really good idea about what's
going on in your system and over time make you a virus expert.
• In it the Greeks give a giant wooden horse to their enemies, the Trojans,
supposedly as a peace offering. But after the horse is inside the city walls,
Greek soldiers sneak out of the horse's hollow belly and open the city gates,
allowing their soldiers to enter and capture Troy.
• Similarly, what is known as a Trojan horse is a destructive program disguised
as a simple application or useful program. The program contains additional
hidden code which allows the unauthorized collection, exploitation,
falsification, or destruction of data. Though lumped in with viruses, it doesn't
propagate itself like a virus does.
• One of the worst kinds of Trojans is a program that claims to rid your
computer of viruses but instead puts them on your computer. Another
common type will open a security hole for a hacker to get into your system
and do all kinds of nasty stuff
• You can prevent getting a Trojan Horse by having up-to-date anti-virus
software, not opening unsolicited attachments, and scanning freeware and
shareware you download before you unzip.
Search
pub-6827212458 1
ISO-8859-1 ISO-8859-1
GALT:#9A2C06;G en
Bottom of Form
Database Tips
what is database?
A database is a collection of related data stored in an efficient and compact manner. The
word “efficient” means that stored data can be accessed very easily and quickly.
Similarly, the word “compact” means that stored data takes up as little space as possible. In
the above definition of database, the phrase “related data’ is used. It means that a database
contains data or information about a particular topic such as:
• Database of employees that contains data of employees of an organization or
department.
• When you visit your local library, there may be a computerized database containing
details of the books in the library. There will be a computerized index, which allows
you to find a book based on its title, its author’s name etc.
• Related Articles
Database Backups - Hot Backup vs. Cold Backup
Data and information are as important for an organization as blood in human body. In case
data and information become unavailable due to any reason, all the working of the
organization stops and it becomes unmanageable loss. In order to avoid such big loss,
Database Administrator (DBA) must take backup of his database frequently according to the
nature of the database. Normally full backup are done after one week but incremental
backup are done on daily basis. Backup can be defined as second copy of original database
produced by backup facilities provided by DBMS or operating system. This second copy or
saved copy of original database is produced on separate storage media such as magnetic
tape, external hard disk and on CD-drives. These should be placed in a separate and secure
location, where unauthorized persons do not have any access. The best way, you can store
your database backup online using Internet and you can access this backup any time, from
any location using Internet. There are two important types of backup.
Hot Backup
You can say hot backup is dynamic or active backup. Hot backup is taken when database is
running and data is being updated, added, or read by its users but doesn't handle running
transactions. Only database management system (DBMS) facility can be used to take hot
backups. Make sure that hot backups should only be done during low working hours. Hot
backup is taken in environments where database needs to remain online 24-hours a days
and 7-days a week, because they do not require downtime as in cold backup.
Cold Backup
Cold backup is taken when database is offline, not accessible for updating and users cannot
do anything on the database.. DBMS as well as operating system facilities can be used to
take the cold backup. Normally, cold backup is taken at the end of a working day or at
weekends when database comes offline. Cold backup is suitable in environments where
database is not running 24-hours a day. Instead, there are sometime intervals when it
remains off.
Backups can be taken manually through the DBA or these can be taken automatically by
configuring the DBMS. In case of automatic backups, you must specify day, time, and
location on storage media where DBMS will take the backups. These settings are required
when configuring the DBMS.
• Analysis
• Design
• DBMS Selection
• Implementation
• Maintenance
Database planning
The database-planning phase begins when a customer requests to develop a database
project. It is set of tasks or activities, which decide the resources required in the database
development and time limits of different activities. During planning phase, four major
activities are performed.
• Review and approve the database project request.
• Prioritize the database project request.
• Allocate resources such as money, people and tools.
• Arrange a development team to develop the database project.
Database planning should also include the development of standards that govern how data
will be collected, how the format should be specified, what necessary documentation will be
needed.
Requirements AnalysisRequirements analysis is done in order to understand the problem,
which is to be solved. It is very important activity for the development of database system.
The person responsible for the requirements analysis is often called "Analyst".
In requirements analysis phase, the requirements and expectations of the users are
collected and analyzed. The collected requirements help to understand the system that does
not yet exist. There are two major activities in requirements analysis.
• Problem understanding or analysis
• Requirement specifications.
Design
The database design is the major phase of information engineering. In this phase, the
information models that were developed during analysis are used to design a conceptual
schema for the database and to design transaction and application.
• In conceptual schema design, the data requirements collected in Requirement
Analysis phase are examined and a conceptual database schema is produced.
• In transaction and application design, the database applications analyzed in
Requirement Analysis phase are examined and specifications of these
applications are produced. There are two major steps in design phase:
• Database Design
• Process Design
DBMS
In this phase an appropriate DBMS is selected to support the information system. A number
of factors are involved in DBMS selection. They may be technical and economical factors.
The technical factors are concerned with the suitability of the DBMS for information system.
The following technical factors are considered.
• Type of DBMS such as relational, object-oriented etc
• Creating applications.
Operational Maintenance
Once the database system is implemented, the operational maintenance phase of the
database system begins. The operational maintenance is the process of monitoring and
maintaining the database system. Maintenance includes activities such as adding new fields,
changing the size of existing field, adding new tables, and so on. As the database system
requirement change, it becomes necessary to add new tables or remove existing tables and
to reorganize some files by changing primary access methods or by dropping old indexes
and constructing new ones. Some queries or transactions may be rewritten for better
performance. Database tuning or reorganization continues throughout the life of database
and while the requirements keep changing.
Different File Type from Storage point of view
File organization is a technique for storing and arranging data on secondary storage devices
so that it can be retrieved easily when needed. It includes the physical order and layout of
records on secondary storage devices. The techniques used to write and retrieve data to and
from the storage devices called it access methods.
There are main three type of files from storage point of view.
• Sequential files
User-Defined Procedures
In addition to the passwords and usernames, users can define their own procedures for
security. For example, a user can add some secret questions in the procedure, in order to
secure his account. Now, whenever the user logs in, he has to give procedure name along
with his password. The procedure will ask the answers of the given secret questions and on
submission of correct answers the user is given access to the database.
Encryption
Data encryption is a technique in which highly sensitive data is encoded (converted into
unreadable form) before its storage or transmission over a network. The encoding method is
kept tightly protected by the DBMS. The encoded data decoded (reverse process of
encoding) for authenticated users only. Thus unauthorized users cannot read data and
sensitive data is automatically encoded by DBMS. For example, in ATM system the pin code
provided by the customer is encoded (encrypted) before its submission to the database
server. A DBA can also manually encrypt data when needed.
Authentication schemes
Illegal access to computer resources is becoming a serious problem in the modern world.
Passwords and usernames cannot identify the actual person who is logging on the computer
system. Password can be leaked out or stolen therefore; it is not a secure method to block
illegal access. Alternatively, some systems are using other authentication schemes for this
purpose. These authentication schemes include signature dynamics, fingerprints and retina
prints etc. Smart cards are normally used for the implementation of these schemes. For
example, fingerprints are permanently stored on the smart card and whenever user wants
to log in, he is required to insert his card into a card reader. He is also required to scan his
fingerprints. Now if saved fingerprints on card and his actual fingerprints match with each
other he is given access otherwise access is denied.
Record Locking and Deadlocking
Record locking mechanism is the most common method to implement the concurrency
control in DBMS. Locking means record must be locked (i.e. access disallowed) for other
users, when any user opens it for update.
Suppose in the above example, as soon as an opens his account through his ATM card. The
record is locked for person B, when A completes his transaction, the balance is updated to
2000 $ and record is unlocked. Now when B opens his account, the system will show the
balance of B cannot overdraw 2000 $ and thus it.
Deadlock
Record locking mechanism may create an undesirable situation where two or more users are
waiting for the completion of each other's actions. This situation is called deadlock. In order
to explain the concept of deadlock, let's take an example. Suppose there are two users Jone
and Tony. They are working in a multi-user environment and try to access a common
database table "student". Jone accesses record number 3 and exclusively lock it. Similarly,
Tony accesses record number 6 and he exclusively locks it. Now Jone needs to read record
number 6 before releasing record number 3 and Tony needs to read record number 3 before
releasing record number 6.Both are waiting for each other's actions, which will never occur.
A deadlock has been created and working of both the users has been stopped. More users
may get involved in this deadlocked situation. A deadlock situation may also arise in real
world. Suppose two trains approach each other from opposite sides on a single track. Each
train wishes other one to get back to make way for it. But this will never happen. A
deadlock has happened.
Controlling Deadlock
There are different methods to control the situation of deadlock. The most common method
is Deadlock Prevention. In deadlock prevention it is required that all the needed records are
locked in the beginning of a transaction. No record is locked afterwards until the completion
of the transaction. If at the beginning of transaction, some records (which are needed) are
already locked, and then the transaction must wait to start until all the needed records are
released. Another method is Deadlock Resolution in which DBMS takes its responsibility, to
solve the deadlocked situations. Users don't need to take any action.
Database Development Process
The database is the fundamental component of the information system of an organization.
In a computerized environment, the information system includes the resources such as
data, DBMS software, computer hardware and storage media, the people who use and
manage the data, the application programs. The database development is very important
and creative activity. The database development process consists of two activities. The first
activity involves the design of the data contents and the structure of database. The second
activity is related to the design of database applications. The two activities are closely
related to each other. For example, by analyzing the database application, we can identify
the data items that will be stored in the database.
Designing and developing an effective information system, is most important activity.
Therefore, in order to build an effective database and related applications, the development
team thoroughly understands the data of an organization. To do this, the team builds a data
model that identifies the data to be stored in the database and defines their structures and
the relationships among them. There are two strategies for developing a database.
• Top-down approach
• Bottom-Up approach
A system consists of components in the form of hierarchy. The Top-down approach starts
from the highest-level component of the hierarchy and proceeds towards lower level of the
hierarchy. Similarly, the Bottom-Up method uses the same approach as Top-Down method
but Bottom-Up approach starts from the lowest level component of the hierarchy and
proceeds towards higher level to the top-level component. Information system architecture
is a conceptual blueprint for plan that expresses the desired future structure for the
information system in an organization. An organization needs information system
architecture and a methodology that supports for developing that architecture. Information
engineering is formal methodology, which is used to create and maintain information
system. It is a top-down methodology.
An organization needs a methodology (related series of steps) and related set of tools to
develop the information system architecture. Conceptually a methodology includes a set of
instructions. A variety of tools are required to support the development of information
system. CASE (Computer-Aided Software Engineering) tools provide automated support for
some portion of the system development process.
Hardware Tips
• How to connect home computer from Remote location?
• CD-ROM Troubleshooting
• How to block any installed application from lunching on your computer? New
• How to log off, restart and shutdown, connected computer from one location?
• Monitors Troubleshooting
• RAM Troubleshooting
Graphic Card
The graphic card is one of the most important pieces of hardware in your PC. Without it, your super
monitor with all the bells and whistles is just a junk box.
Make Directional Input
Most video cards come with simple frame capture programs, but you'll have to do some programming if
you plan to integrate video capture with other operations on your computer, such as adding text data as an
overlay or changing video-in channels on the fly. In this case you'll need good programming libraries in a
language with which you are familiar for the video card. Some companies include libraries with their
cards, but most charge extra. Most often libraries, when available, are for C or BASIC, and sometimes
Pascal.
Choose Between 24 bit and 32 bit
For True Color mode, some graphic cards offer 24 bit while some offer 32 bit. Which is the best? When
True Colour mode was first suggested, it utilizes 32 bit which was very pleasing to the eye, they realize
that 24 (with less coolers) won't look much different since the human eye can only take about a certain
amount of colors. On the other hand, 24 bit will run faster compared to 32 bit because it uses less colors.
So if your card utilizes 24 bit, don't worry, it isn't bad.
Always Use The Latest Drivers
Yes, it is important to make sure you always have the latest drivers. The latest drivers will offer you better
performance, more utilities and more compatibility (usually for DirectX or Direct3D). Take the effort to
check you card manufacturer's site to look for the latest driver updates.
CD-ROM
The maximum a floppy disk can contain is 1.44 MB. To play a game with around 200 MB you are stuck
with 100 over diskettes. The CD-ROM is a revolutionary invention that allows up to 625 MB at one time.
However, it is read only, which means you can't store in anything.
Buttons Fun
Although most CD-ROMs comes with only 2 buttons, do you know you can also skip, play previous track
and play the next track as well with a proper combination? Check properly on your instruction manual for
additional functions. You just might be surprised what it can do.
Clean Thoroughly
It is important to clean the CR-ROM at least once every month. Get a CD lens cleaner. If possible, choose
one with an alcohol solution drop. This should ensure that your CD-ROM will always be able to read
properly.
Clean You CDs
It is just as important to clean your CDs often. Why? Because if you have a speck of dust on the surface
of one of your CDs, once spinning at high-speed in the drive, the speck of dust is enough to produce
scratches on your precious CD.
Running In DOS
One of the common problems with CD-ROMs is unable to access it under DOS. This might be because
the protected-mode CD-ROM driver isn't available. You'll need to add the real-mode device driver,
usually included with your CD-ROM drive, in CONFIG.SYS and load MSCDEX.EXE, which is
available in the Windows\Command folder. You should also make sure both files are on your startup
disk.
Run List
Like those cool expensive hi-fi systems, you can customize the run list of your Audio CD, only not with
the CD-ROM itself. Use Windows' CD player to customize the run list and you can have your CD
running in any track order you like.
Read Ahead
The read ahead buffer is useful to speed up things. Go to Control Panel, System. Click on the
Performance tab. Click on the File System... button. On the File System Properties, click on CD-ROM.
Make sure you have the fullest cache. Even if you have a CD-ROM with less than Quad speed, just move
ahead. You'll be surprised to find your CD-ROM running faster.
How to backup of your computer installed drivers?
You can easily create the backup of your computer installed drivers (just the particular or all drivers)
and use it to troubleshoot any driver problems. This backup will be very useful when you will
format your computer window due to any reason. There is no need to search the drivers from
internet or drivers CD, just import the driver backup and within five minute, you will complete
the driver installation process. You can move this backup from one computer to other computer
for installation.
To complete the all process, we will use a simple tool called DriverMax. Using this tool, we
can easily export the backup of any specific or all drivers and then import it for reinstallation
later or elsewhere. You can free download (with free registration code) this tool for windows
XP and Vista also. Download it and run the easy setup.
After Installation launch DriverMax, the first screen you will get with title "DriverMax -
Version" and options "Export drivers, Import drivers and Installed drivers report". Just click
on "Export Driver" option to start backup process.
Now after welcome screen, system will take few seconds to create the list of
all installed drivers and then show you all installed drivers list.
Here you can select any specific device driver or click on "Select all" button to create the backup of
entire installed drivers.
Press the Next button and in next screen you can select the export type
(simple backup or in zip format) and then choose the backup location
(always choose drive other than C drive).
Again press the Next and system will take some time (depend upon the size
of your drivers) to finish exporting the selected drivers.
Click the "Open extraction folder button" to view the backup files or press
Close button to finish it.
Now you can use this backup files (using import option) to restore drivers
backup or move to any other computer. Copy the Following link to download
it.
Hard Drive
Your hard drive, or also called hard disk, is a gigantic diskette in your computer. It is one disk big enough
to store you Operating System, games and programs. Without it, your PC is just an empty shell.
Check Your BIOS
Better beware of older systems with large hard drives. If you have an older motherboard, your BIOS
might not recognize hard drives larger than 2.1 GB. Hopefully, your BIOS is EPROM which means
although read only (noticed the ROM?) it can be edited by authorized editors. Nearly all newer
motherboards support that. All you need to do is to go online, go to your motherboard manufacturer's
website and try to download a flash BIOS update. Install it and it should be done.
Are You FAT Enough?
If you have a large capacity hard drive with more than 2.1 GB, you might have a problem. Windows 95
itself will only recognize a partition with not more than 2.1 GB. You need FAT32. With FAT32, you can
have one large capacity hard drive without partitioning. You will also save some space with FAT32. In
short, larger hard drives require FAT32.
Consider Partitioning
Although you can have one big fat hard drive as one partition, you should consider partitioning as well, if
you have a big hare drive. Partitioning is the method of dividing an area on a disk into smaller portions of
lesser capacities that can be recognized by the operating system. Picture this: your hard drive is a cake. It
is easier to eat a cake divided into pieces than to eat it whole.
Partitioning enables you to achieve greater efficiency and functionality from high-capacity disks (2.1GB
or greater). You can create partitions by using FDISK on a system running in MS-DOS mode or by using
a third-party disk utility. Remember that after partitioning, all data will be loss so be careful.
You can set aside a small partition for backup purposes. In case you should decided to format, just format
the partition you use to store Windows. Your data in the backup partition is still there. But be careful! If
you format a FAT32 partition with a FAT16 formatting utility, your partitions with data in it will all be
loss! So never install DOS after formatting Windows. Because DOS utilizes FAT16, your FAT32
partition will all be gone.
Access Time or Seek Time?
If you want to buy a hard drive but are confused with the specifications of access time and seek time,
remember that the key to the speed of a hard drive is the average access time. This is the time taken to
access a single sector to the time when the drive's head reaches the sector. But beware, some ads quote
seek time that is not the appropriate measurement. Access time is seek time plus latency (the time it takes
for the chosen sector to come around to be positioned under the read/write head)
Speed, Not Space
A lot of people are confused between speed and space. If you have a Quantum Fireball with 1.2 GB and a
Quantum Bigfoot with 3.5 GB surely you should put the Bigfoot as the master and Fireball as the slave
right? Wrong! You should always consider speed as well as space. The Quantum Fireball has a faster
access time. A faster hard drive means better performance. Make sure your operating system is store in
the faster hard drive. You can use the Bigfoot to store your programs or games which makes not much
difference to the speed. With speed hungry programs or games, store them in the faster drive too. You
must know what to put where.
The status of the drives is determined by setting small jumpers that are usually located next to the IDE
connector on the drive itself.
How to solve low memory problems?
Normally this warning message shows when you run many programs same time than the
RAM installed on your computer is designed to support. Your can solve this problem by
increasing the system paging file size also called as virtual memory. Using this virtual
memory windows moving information to and from the paging file for fast processing. This
will free up enough RAM for other programs to run properly.
To increase the system page file follow the give path:
Control Panel > System > Advanced > Click on Settings (Under Performance) > Advanced
> Change
Here under Drive (Volume label), you have option to select any of your hard disk drive, but
the best choice is, select any drive other than C drive for virtual memory.
Set the double Initial & Maximum Size of your Virtual Memory. Here set initial size 700 MB
and maximum size up to 1000MB; you can change this size according to the free space
available on your hard drive.
Monitor
The monitor is a television-like box except it is used in a computer for display. You can't use the
computer at all without a monitor. The monitor is different from the television is many ways. It is flatter
compared to the television. Television refreshes the screen by interlacing while the monitor is using non-
interlaced functions. Monitors uses pixels to display, making it finer and better to display text.
Larger Resolution, Smaller Display
One thing you should know, since monitors measure by pixels, you should always set the resolution right.
A larger resolution uses smaller pixels, making everything smaller but you have a larger view. The
default is 640x480 but most prefer 800x600. For larger monitors, you can decide on 1024x800 or
1280x1024. Also remember, since there are more pixels, the higher the resolution, the slower the screen
refreshes.
Decide On A Screen Filter
Although computer screens are just 30% of the radioactivity from the TV or less, you still might want to
consider a screen filter. It helps filter up radioactivity. Never settle for a cheap screen filter. A lousy one
won't filter the screen - it just darkens it. Always make sure that it won't make everything look dark.
Some good screen filters provide a wire to clip it at the back of the casing to lose the radioactivity.
On the other hand, you should also make sure you don't need one. Here are a few points to guide you.
• Your computer (& monitor) is placed under a bright place and can
balance with the brightness of the monitor
• Your monitor is anti-glare and non-reflective.
• Your monitor produces little static and radioactivity.
• Your monitor produces clear, crisp and not-too-bright images.
• You won't have problems staring at the monitor for a long time.
If your monitor fits that criteria, you can forget the screen filter.
Blink Your Eyes!
This is not actually a hardware tip, just to let you know how important it is to blink your eyes. Your eyes
don't actually get strained staring at the monitor, just loses moisture and making the eyes dry. It has been
proven that people staring at the monitor for a long time has the tendency to blink less than the normal
rate. Make an effort to blink your eyes. If not, try eye moisture drops.
Degauss
Degauss is a very important function that helps you restore your monitor when colors are distorted or you
noticed weird colors at the corners of your monitor. This is cause by magnetization that can be caused by
jerking the monitor, shifting to a different direction or moving it across the globe (different magnetic
field). The degauss control removes magnetization from your monitor
Use the degauss control lightly. You should only degauss if you see color purity problems. Otherwise,
don't use it. Too much degaussing stresses the circuitry components and overheats the large coil around
the CRT. If possible, when the display clears up, shut down the monitor/computer for a while to let it cool
down.
Take Control
When your monitor comes, modify the factory default setting of your monitor! Get more colors or
brightness. And stretch the screen to the fullest! Although this may sound trivial, a lot of people just think
it's alright to follow the original setting, losing valuable screen space, you will be surprised to know how
much bigger you can stretch the screen. A bigger display is always better.
Sound Card
A world without sound is boring. The same goes to computers. Imagine playing quake with the beeps
from the PC speaker. The sound card is a piece of hardware to generate high quality sound. It enables
your to listen to your CD, record voices with the microphone and playing your sound files.
Don't Throw Away Your Old RAM
If you have and old PC that utilizes old 32 bit RAM, don't throw it away. If you have and AWE (advance
wavetable effect) sound card, with empty memory slots, you may plug it into your soundcard to load
more instruments. Very useful. If you want, you can go to computer junkyards or dealer with old
computers to find some old 32 bit RAM. You can get it for almost nothing.
More, more!
If you are using an AWE soundcard, you might want to get more voices or instruments. Go to your
manufacturer's website and search for sound fonts. Like fonts, they are the same instruments but produces
different sounds. The amount of sound fonts you can load at a time depends entirely on how much
memory you have.
No Sound From Mike
An ageing sound card probably doesn't supply the DC voltage needed to power a new electrets
microphone-the kind with a mini-stereo (ring-tip-sleeve) plug on the cable. If so, you'll need either an
inline battery pack to power the new microphone, or an older dynamic microphone that doesn't need DC
power. But the best bet is to throw it away and get a new one.
Back It Up!
There are different methods through viruses may be transferred from one computer to another.
• Now- a-days, most of the viruses spread due to receiving unknown e-mail messages that
contains viruses. When a user opens such an infected message, the virus is also loaded
into the computer memory. In this way, many other program files loaded into the memory
are infected. This virus is also transferred to other computers when e-mail messages are
sent from the infected computer to them. Due to these viruses, some time an auto
generated email message from your email ID sends to your friends from your side with
different virus messages. Never open unknown and attractive subject line email
messages, always scan first even if you know the sender of the message.
• Another way of spreading virus is by using Internet and other networks. For example,
when you download infected executables files or data files from the Internet or from a
shared disk on the network, viruses are transferred to your computer. It must be noted
that many software are available on the Internet with free of cost. Most of that software
contains viruses, for example free PHP or ASP scripts are the main source of virus,
always get these scripts from reliable sources. In an LAN, if a computer contains a virus,
then all the computers on the network may be infected with that virus.
• One important means of exchanging data is through the use of removable media like,
CDs, MP3 player, ipod and flash devices. So, when you copy the data from one computer
to another by using a removable media, the viruses are also transferred.
• The virus can also infect your computer by using pirated software. The software, which is
installed into your computer without license is referred to as pirated software. Some
companies may intentionally attach some virus programs into their software. This
program will only activate when it does not find some special files like license files on
your computer.
• Clear Your unnecessary backups files
• It is a good practice to make the backup of the important data. In
many computer applications you can use the auto backup option to
make the backup of a important file after specific time or set make
auto backup on save. Normally backup files take up few kilobytes of
your hard disk space but backup size depends upon the size of actual
size.
• But some time these auto backup files take up extra hard disk space
and can slow your computer performance. You can clear these
unnecessary backup files cluttering up you computer. First search and
then delete these file. Search with some common backup file
extensions, for example .bac, .bak, .bck, .bk!, .bk$. After search result
you can delete the unnecessary backup files.
• Defragmenter Program to Optimize the Placement of
Files.
• This utility program is used to re-organize the files and un-used
space on the hard disk, so that operation system can access
data more quickly and easily. When operating system stores
data on the disk, it stores the data in the first available sector
on the disk. In this case data of a file is stored on disk in a
scattered form; it is referred to as “File is fragmented”. The
fragmentation slows down the data accessing speed of
computer. You can improve the performance of your computer
by de-fragmenting your hard disk. In De-fragmentation
process, the data of each file is stored in continuous sectors.
There are many third party software’s available in market for
this purpose but you can use windows built-in utility program
called Disk Defragmenter. To start disk defragmenter utility,
first make sure all running program are closed.
• To run disk defragmenter utility, go to the Start button and
type dfrg.msc in Run option then press ok. Now here a disk
defragmenter window will appear. Select any drive and press
defragmenter button. If you have a large hard disk, this
process can take several hours. I recommend you doing this
after one month if you want to improve the performance of
your computer.
Search system and hidden files
In windows you cannot search hidden and system files, because by default search system
does not support to search hidden and system files. This is normally done to protect these
files from users to modify and delete accidentally. Many computer viruses, Trojan and
hackers hide their files in your computer, in this way making it hard to find them and then
delete them. Some key logger and password breaker software hides their files from user to
keep user password and credit card history. But you can search these hidden files (viruses,
spyware, key logger) with some modification in search system.
To search the hidden or system file, follow the giving step:
• First click on Start button then click on Search option.
• Here click on "All files and folders" then click on More advanced
options.
• In advanced options, select the Search system folders and Search
hidden files and folders check boxes.
• Now your computer configured to search all hidden and system files.
• Most commonly used Security Techniques against viruses.
• Virus detection and its removal are mode through an antivirus or with
some other security program. Different antivirus programs are
available in the market and over Internet. The most common and
famous security technique against viruses is as under:
• Virus Signature/ Virus Definition
• Virus signature is a known pattern of code of a code of a virus
program; this pattern is used by antivirus program to detect viruses
and then to remove these viruses. You should update virus definition
continuously by downloading updates from Internet. This ensures that
your antivirus is always able to detect changing viruses.
• Inoculation
• Inoculation file is separate file created and maintained by antivirus
program to record information like file size and file creation date. This
information later on is used for virus detection and removal.
• Quarantine
• Quarantine is a separate area on a hard disk. It contains the infected
files and folders that cannot be cleared or deleted by antivirus due to
some reason, for example sharing violation or unknown virus for that
antivirus.
• Recovery Disk
• Recovery disk is a removable disk that holds un-infected system
commands and startup information. In case the boot record of actual
hard disk fails, this recovery disk can be used to start the computer.
Afterwards an antivirus program can be used to remove the virus.
• Un-authorized access
• Accessing a computer system without the knowledge or permission of
its user is called unauthorized access. It is always recommended to
restrict computer resources with the help of usernames and
passwords. These are unique combination of characters to identify
users and their secret codes respectively.
• Firewall
• Firewall is a security system consisting of hardware and software to
prevent unauthorized access of a network or computer. Big companies
use a separate computer firewall software or hardware to protect their
date from unauthorized access. Firewall check outgoing and incoming
traffic and manage data access to the authorized users only.
• Biometric Devices
• A biometric device reads personal characteristics like fingerprints hand
structure, facial features, and voice recognition to authenticate a user
for any further access to a computer system or other peripheral
devices. A biometric device translates the personal characteristics into
digital code that is matched to already store user data in that system.
If the digital data matches with any of the stored data, it gives access
to the person. In case of no match, the access is denied.
• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\P
olicies\ Explorer.
• Here in right hand side panel, create the new DWORD value, Value
name “NoLowDiskSpaceChecks”.
• Now double click on that value, now set its value 1 and press OK.
• Suggested Reading
Install windows 2000 after you have installed windows XP
If you want to install two windows (windows 2000 and XP) on the same computer then the
sequence is that first install windows 2000 then windows XP. But if you have already
installed windows XP on your computer and now want to install the windows 2000 on the
same computer then after windows 2000 setup your XP windows will create problem. Follow
the given steps how to install windows 2000 after you have installed windows XP.
• First backup the NTLDR and NTDETECT.COM files in windows XP,
locate these files NTLDR and NTDETECT.COM in the boot drive
(normally in C drive root directory). Usually these files are hidden files
but you can locate to adjust your explorer options to show them. You
can search these files on your computer C drive.
• Now copy these files on USB drive or write on black CD. But you can
also save these files on other hard disk drives like D or E drive.
• After backup these files, boot your computer from bootable windows
2000 CD and run the windows 2000 setup.
• Try to install the windows 2000 to a different partition that XP is
installed. After complete the windows 2000 setup, boot your computer
into windows 2000.
• When your computer boot into windows 2000, attach the backup drive
that you used earlier for backup, now copy back NTLDR and
NTDETECT.COM to the root directory of your boot drive.
• Now, you'll be able to restart your computer and boot into windows
2000 or windows XP.
Keep Clean Your Computer
You can save your computer maintenance cost if you clean your computer on the regular
basis. This will improve the cooling and performance of the computer components. Your
computer components could damage, if you do not keep it clean on periodically basis,
because dust is the main cause to heat up your system and heat link to hardware failure.
• Never place your computer on the ground, always use computer table
or shelf for this purpose.
• To clean computer case first unplugs your system power from the
electrical outlet. Remove all cables and connectors from the back side
of your computer.
• Now blow the air around all the hardware components and keeping
away your blower nozzle 4 to 5 inches away from main board
components. You can use vacuum cleaner also for this purpose but
compressed air is the better solution to clean a system.
• At the end using lightly dampened cloth or spray any cleaning fluids on
the computer case and use paper towel to dry it.
• Never clean inside computer components or other circuit board with
damp or wet cloth.
• Always be careful to eat or drink around the computer.
Remove or uninstall Windows XP SP2
Windows XP service pack 2 is a powerful tool to fight against malicious intrusion, but if you
are experiencing problem with SP2, you can uninstall or remove it. There are many methods
to remove it, but a simple one to remove using “Add or Remove Programs tool in Control
Panel”.
Follow the given steps to remove windows XP SP2:
• First click on Start button then open Run on Popup menu.
• At the end Removal Wizard will start, click Next to finish it.
Select the item name "Disable error reporting". But it is good think to
leave a tick in the check box "But notify me when critical errors occur".
• Click "OK" to exit the "Error Reporting" window and then click "OK"
again to exit System Properties.
Use windows XP built-in pop-up blocker
In routine when you are browsing the internet and suddenly a new window pop-up dialog
box display with different messages for example "speed-up your internet ","free upload your
files or images". All pop-up messages are not dangerous for you but some unwanted pop-up
program and website that might be disturb your computer performance.
There are many free pop-up blocker software's available on different websites, but always
download it from well-known sites. You can use windows XP built-in pop-up blocker for
internet, if you are using windows XP with service pack 2, then this is best option for you,
because Microsoft claims the internet explorer pop-up blocker is smart enough to know not
to block pop-up windows that you have opened intentionally by clicking a link. To enable or
disable the pop-up blocker, open the internet explorer and click on Tools option then
manage pop-up blocker sitting here. If you want to allow a pop-up for a particular site, you
can click the Information Bar and choose whether to allow pop-ups from that site on a
temporary or permanent basis.
System Password Protection
You should always lock your computer when you leave it. A password will protect your computer from others.
There are three or four methods to lock your computer manually, but you can lock your computer automatically
using screen saver option. You can turn on automatically lock dialog box after specified time.
Follow the giving steps to set screen saver to lock computer automatically:
• First right click on your computer desktop then select the properties option.
• Now select any screen saver file then in Wait field set any suitable time to turn on screen saver.
• At the end check the Password Protected option and press OK. Now after specified time, when
your screen saver will turn on, your computer will be automatically locked.
Increase the speed of your slow internet connection
Today broadband internet connection is available in all the major cities, but in some area
people are still using slow dial-up internet connection. So don’t worry, you can enjoy your
dial-up internet connection faster than its normal speed using internet accelerator. The Web
Accelerator application designed to provide the full acceleration for your routine web sites
browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster
than normal dial-up connection. Basically this services compressing the website text data,
images and heavy graphics to open or download this data with high speed.
This technique is more useful for static websites and for email applications but don't
accelerate with secure and downloading audio or video files. Some good web accelerator
retains your system cache to reuse websites with faster speed and can also block windows
pop-up. If you are using FTP sites and downloading any program using dial-up, then web
accelerator is not for you. There are various web accelerator software are free available on
internet, visit and download it to enjoy your connection.
Increase the speed of your slow internet connection
Today broadband internet connection is available in all the major cities, but in some area
people are still using slow dial-up internet connection. So don’t worry, you can enjoy your
dial-up internet connection faster than its normal speed using internet accelerator. The Web
Accelerator application designed to provide the full acceleration for your routine web sites
browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster
than normal dial-up connection. Basically this services compressing the website text data,
images and heavy graphics to open or download this data with high speed.
This technique is more useful for static websites and for email applications but don't
accelerate with secure and downloading audio or video files. Some good web accelerator
retains your system cache to reuse websites with faster speed and can also block windows
pop-up. If you are using FTP sites and downloading any program using dial-up, then web
accelerator is not for you. There are various web accelerator software are free available on
internet, visit and download it to enjoy your connection.
Windows Repair Installation
Some time windows missing the startup files due to the power failure, virus's
attack and any illegal action by user. You can solve the windows startup
problem with running the windows repair installation. Almost all windows
serious problem can be solved using windows repair function. For repair
windows XP, you should have the bootable windows CD.
• First boot your computer using bootable windows XP, CD. To
boot from CD, first change the booting order setting in your
system BIOS.
• When first blue screen will appear, do not choose any option here; simply
press the Enter button to go for next option.
• Next you will get "Windows License agreement" page, simply press F8 button
to accept this agreement.
• Now in second blue screen press the R on your keyboard to repair the
windows XP installation. This recovery function repaired the all-missing
windows features.
• In half an hour windows will complete all recovery process. This recovery
process will not disturbed your Desktop and My Document data. May be your
some windows sitting will change after completing process.
Using the Internet Tips
•
• Lost Dial-Up Connection
• How to enjoy Internet Explorer using shortcuts keys?
• Here go the General option and then click on Accessibility button on right lower of
the dialog box.
• Now change the status of checkbox marked "Ignore font sizes specified on Web
pages" and next Ignore Colors specified on Web pages", end with Ok.
• For change the font size select to View option from the top menu and go to Text size
option to change it.
When you want to read that saved page, open your browser and go to File menu and then
browse to that folder where you have saved that pages.
computerfreetips
in an address bar and then press Ctrl-Enter, Windows will take us to the
www.computerfreetips.com
Press Shift+Enter
Windows will automatically add both "www" and ".net" Press Ctrl+Shift+Enter Windows will
automatically add both "www" and ".org"
Suggested Reading
How to access the restricted or banned websites?
You can access the restricted or banned websites with the help of this tip. You may have
problems to accessing your favorite's politics, news, and sexy websites in your office and other
public places. Some time these websites banned by Government, ISP and may be by your office
network administrator. This tip is very useful, if you are using internet particularly in school,
college and office.
Follow the given points to access the banned website:
Technique 1: Search the banned website, for example www.computerfreetips.com in Google
and yahoo search engine then open the cached copy of that page to access the website. You
can get also cache link of that website, if you search in Google with keyword cache:URL
name and get cache link to access the website.
Technique 2: Another method to access the banned website using its IP address, because
you can open the website with IP address instead of actual URL name. This technique
bypasses the URL based restrictions. For example if www.myspace.com is banned in your
school, you can open it using IP address 216.178.32.51. You can search online IP
conversion tools to get IP address of any website.
Technique 3: There are some mini web browsers can help you to open the banned websites, for
example Opera Mini Browser, install it and try to open any banned website. Another Real Player
browser can successfully help you to access the banned website. This Real Player browser
bypasses the many restrictions of website banned tools.
Technique 4: There any many websites Anonymizer tools are available to fetch the banned
website. These anonymous surfing tools that protect your identity on the internet and give the
access to banned sites. As far as the service provider is concerned you are viewing a page from
Anonymizer and not the blocked site.
These tips are very useful to access the banned websites in your university, cybercaf� ,office
and other public places.
Hangs up internet dial-up connection
When you are browsing your favorite websites using dial-up internet connection, your
incoming calls can create problem with your modem if the call waiting option in your modem
sittings is enable. Your modem may be hangs up and disconnects the internet connection
frequently. Normally when you disabled the call waiting option in your modem sitting and
any body tries to call you, he will get the busy beep during internet connected. You should
always disable the call waiting option to avoid modem disconnectivity or hangs up.
• To disable the call waiting option, first click on Start button, then Network
Connections.
• Here double click on your internet connection and click on Properties button then
General.
• Under General tab select Use Dialing Rules box then click on dialing rules button.
• Here select My Location then click on Edit button. Under General tab select the
option To disable call waiting dial and put any number in next box like *32.
• At the end click on Ok button and dial your connection again.
How to enjoy Internet Explorer using shortcuts keys?
In Internet Explorer, you can use the combination of different keyboard keys to accomplish
your routine task. With shortcut keys, you can speed up your surfing without lifting your
hands from the keys; otherwise require a conventional mouse to select menus and buttons
options. Basically keyboard shortcuts keys help you to save time and you can perform any
tasks without leaving the keyboard keys.
Useful Internet Explorer shortcuts keys
computerfreetips
in an address bar and then press Ctrl-Enter, Windows will take us to the
www.computerfreetips.com
When you are browsing your internet, the website you visit placed some temporary files on
your computer. The main purpose of temporary files to save your preferences that you
specify for future reference. Normally internet temporary files are saved on C drive in
windows folder but you can change the location of temporary folder to hide your internet
browsing history from others.
If you are using Internet Explorer then follow the given steps to change the location of temporary folder.
• Open Internet Explorer, click on the Tools then Internet Options.
• Go to General tab then Settings button under the Temporary Internet Files.
• Here click on Move folder button then select new location to save Temporary files on different
drive or computer.
• Now restart your computer for this change.
How to speed up Internet Explorer 7?
Today tip will help you to increase the speed of Internet Explorer 6 to Internet Explorer 7 by
modifying the maximum number of connections per server. This should allocate the
additional bandwidth and reasonably improve internet browsing performance. Using registry
editor, you can implement this task in all windows versions with minimum effort. Make sure
before modifying your system Registry about its backup because Registry contains all
information how your system runs. This backup will help you to restore Registry in case any
problem occurs after modifying.
To use this feature, you will need to be logged into your computer with
administrative rights.
Click Start button and type regedit in Run option then press Enter for next.
Here locate the location to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings
Here in right side panel, locate the values called "MaxConnectionsPerServer" and
"MaxConnectionsPer1_0Server".
If these values are not present then in right side panel, right-click to create new DWORD
value with the name "MaxConnectionsPerServer" and "MaxConnectionsPer1_0Server" then
assign number 6 in value data for both keys.
Now close the registry editor and restart your computer after any changes to go into effect.
How to operate Gmail account using shortcuts keys?
You can operate your Gmail account using keyboard shortcuts keys instead of mouse to
navigate. Basically keyboard shortcuts keys help you to save time and you can perform any
tasks without leaving the keyboard keys. Many computer applications help you to create
your own custom shortcuts keys to enjoy even more flexibility.
Useful Gmail account Shortcut keys
Shortcut keys Action
f Press simple f help you to forward email message to next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail
a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.
Suggested Reading
Here you can select what to import and export, Select Export Favorites option then click
Next button. Next you will get option which folder you want to export. You can select the
top folder Favorites or just a specific folder.
Select "Export to a File or Address" option and give it a name and location. Click Next and
Finish it. Now you have one html file and you can move it any where with you.
Today a special tip for those who are still using any slow dial-up internet connection due to
unavailability of any broadband connection in their area. The Web Accelerator application
designed to provide the full acceleration for your routine web sites browsing. With the help
of Web Accelerator you can browse your internet 4 to 6 times faster than normal dial-up
connection. Basically this services compressing the website text data, images and heavy
graphics to open or download this data with high speed. This technique is more useful for
static websites and for email applications but don't accelerate with secure and downloading
audio or video files. Some good web accelerator retains your system cache to reuse
websites with faster speed and can also block windows pop-up. If you are using FTP sites
and downloading any program using dial-up, then web accelerator is not for you. There are
various web accelerator software are free available on internet, visit and download it to
enjoy your connection.
Mouse in Windows Environment
Mouse events are the actions that can be performed by using the mouse. Following are the
most common events triggered with a mouse.
Left Click
This event occurs when you press the lift mouse button. Windows captures this event and
performs different task. Normally this event is used to select a graphical object such as a
file icon or to press a button such as the Start button and closing, opening or minimizing an
application windows.
Right Click
This event occurs when you press the right mouse button. This event is usually used to
display a shortcut menu. The shortcut menu contains frequently used commands that are
associated with the selected item.
Up and down Dragging
This event occurs when you press the left mouse button and move the mouse while keeping
the left mouse button pressed. This event is used to select more than one item at a time, or
to drop and object into another application.