Showing posts with label COMPUTER TIPS. Show all posts
Showing posts with label COMPUTER TIPS. Show all posts

02 January 2014

How To Disable the Automatic Restart on System Failure in Windows 7

Windows 7 is configured by default to restart immediately after a Blue Screen of Death (BSOD) or other major system problem. This reboot usually happens too fast to see the error message on screen.
Follow these simple steps to disable the automatic restart feature for system failures in Windows 7.
Important: Unable to boot completely into Windows 7 due to the BSOD? See Tip #2 at the bottom of this page for help.
Difficulty: Easy
Time Required: Disabling the Automatic Restart option in Windows 7 usually takes less than 10 minutes

Here's How:

  1. Click on the Start button and then on Control Panel.
    Tip: In a hurry? Type system in the search box after clicking Start. ChooseSystem under the Control Panel heading in the list of results and then skip to Step 4.
  2. Click on the System and Security link.
    Note: If you're viewing the Small icons or Large icons view of Control Panel, you won't see this link. Simply double-click on the System icon and proceed to Step 4.
  3. Click on the System link.
  4. In the task pane on the left, click the Advanced system settings link.
  5. Locate the Startup and Recovery section near the bottom of the window and click on the Settings button.
  6. In the Startup and Recovery window, locate and uncheck the check box next toAutomatically restart.
  7. Click OK in the Startup and Recovery window.
  8. Click OK in the System Properties window.
  9. You can now close the System window.
  10. From now on, when a problem causes a BSOD or another major error that halts the system, Windows 7 will not force a reboot. You'll have to reboot manually when an error appears.


    BSOD (Blue Screen of Death)

    Definition: Abbreviated as BSOD or BSoD, the Blue Screen of Death is the popularized name for what is technically called a STOP message or STOP error. It's the blue, full screen error that often displays after a serious system crash. The text on the Blue Screen of Death may list any files involved in the crash including any drivers that may have been at fault and often a short, usually cryptic, description of what to do about the problem.


    courtesy:http://pcsupport.about.com

05 March 2012

"The Windows Installer Service Could Not Be Accessed" error message when you install a program in Windows XP


To resolve this issue, follow these steps:
  1. Log on to your computer as an administrator.
  2. Click Start, and then clickRun.
  3. In the Open box, type cmd, and then click OK.
  4. At the command prompt, typemsiexec.exe /unregister, and then press ENTER.
  5. Type msiexec /regserver, and then press ENTER.
  6. Verify that the SYSTEM account has full control access permissions to the
    HKEY_CLASSES_ROOT
    hive in the Windows registry. In some cases, you may also have to add Administrator accounts. To do so:Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs.

01 March 2012

The Advantages and Disadvantages of Internet


The advantages of Internet
Following are the advantages provided by the Internet:
1) Information The biggest benefit offered by the Internet is information. It functions as a valuable resource of information. You can find any type of information on any subject with the help of the search engines like Yahoo and Google.

03 February 2012

To Speed-Up Computer by editing Registry

Is your Computer running too slow?


Have you installed many unwanted softwares which are slowing down your PC?

Here is the solution for you!

If the computer is running slow this may be that it is low on memory. The first thing a person will try to do is to uninstall some of those computer software that are not in use. The truth is that unless the program is removed from the registry then the computer may assume it is still there. The computer registry is very important in the overall operation of the computer, it is recommended that a backup be done on the system before attempting this.

Instructions
Go to the start menu and click on run.

From here type in regedit.exe and then press enter key. This will open the registry of the computer now it is possible to look for the specific program to be edited.

30 January 2012

Increase the speed of your internet by 10 to 20%

Increase the speed of your internet by 10 to 20%


Microsoft/Windows uses about 20 % of the available band with for their purposes like windows update default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection.

You can get it changed by using

Go to

Start----------------------Run

type gpedit.msc and click ----------ok

Then it s open Group policy editor



Click ------ Local Computer Policy

------------- Computer Configuration

------------- Administrative Templates

------------- Net work





-------------- QoS Packet Scheduler





Then double click on Limit Reservable Bandwidth

In this it shows as not configured, But while we look in to the explain tab we can see that “By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”

Then click on Enable reserved bandwidth, then set it to zero.

19 June 2011

A Basic Guide to the Internet


The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.

COMPONENTS OF THE INTERNET


WORLD WIDE WEB
 

The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.


E-MAIL

Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.


TELNET

Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP

FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.


E-MAIL DISCUSSION GROUPS

One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.


USENET NEWS

Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.



Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.


FAQ, RFC, FYI

FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSENGING

Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE

MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

Courtesy :  
http://dipakbchho.blogspot.com

14 June 2011

3 Simple Things To Do To Avoid Virus Infection On Windows Computer

  Viruses are malicious programs that can run down your entire system and leak your private data into the wrong hands. What about you system’s performance after been infected by viruses? How right can a computer perform in the presence of viruses? Your computer cannot be as right as it ought to be when there are viruses in your computer. The performance of your computer will deteriorate as soon as it is infected with viruses and by this time you fall on the brink of losing the entire documents and files on your computer.

Many people have been hacked and have loosed their paypal and email accounts to hackers due to the presence of viruses and spywares on their computer. Some viruses that seem to look harmless are the most dangerous; some viruses pose as antivirus and upon installing them on your computer you then begin to experience difficulties with your computer: such as applications mysteriously ending while in use, your browser directing you to harmful sites etcetera, etcetera. I shall be explaining some few tips on how to protect your computer against virus attack.

Install an up to date antivirus

Antivirus programs are developed to protect your system against virus attacks of all forms. Antivirus programs neutralizes any virus or spyware that gets into your computer; an antivirus can clean your computer if there are viruses on it and also disarm those that come along with files that are copied from flash drives and attachments from your email box. When you are installing an antivirus, you should make sure the antivirus you are installing is a well trusted and widely used by many computer users. You can easily purchase an antivirus program in the market while you can also get it for free if you care to use the free ones.

Keep your antivirus updated regularly

After installing an antivirus on your system, your system might still be visited by viruses if the antivirus you are using is not regularly updated. For your antivirus program to perform well for you, you have to update it regularly and frequently run a system scan. The fact that an antivirus is installed on your computer does not mean a virus can’t find its way into your computer, you can only assume that you are fully protected when you antivirus program is kept updated regularly.

Download from trustworthy sites

When downloading files and applications from the internet to your computer system make sure the sites you are downloading from are trustworthy sites. If you want to know the rank or the quality of websites you are downloading from you can install alexa toolbar on your web browser by visiting

09 May 2011

How to Protect your Data ?

It's a human tendency to lock your home whenever you go out; it makes you feel protected. But what about data what you have saved on your computer? Do you lock it when you transfer it from your computer? Given the threats lurking online - hackers, phishers, identity thieves and the like - you would do well to encrypt your data of you are using the internet to share crucial information with others. This ensures privacy and prevents it from getting hacked. Even if someone succeeds in stealing an encrypted file, he or she will be unable to misuse it unless the key to decode the content of that file is also stolen alongside. Then there are the monetary transactions online and the personal information shared on the Internet. To protect users, the file encryption process is a crucial part of an efficient computer security system. File encryption or data encryption is a process of transforming your confidential information into an unreadable format which cannot be accessed without the correct password or key. Though there are third-party encryption software available like TrueCrypt in the market, you can also use the lesser known, built-in feature of Windows to secure your files. Here to go about this.

How to Encrypt a File? 

1. Right click on a file you want to encrypt. Click the 'Properties' option at the bottom of the context menu.
2. Click the 'Advanced' button located under 'General' tab in the 'Properties' dialog box.

3. Click the 'Encrypt Contents to Secure Data' option and click 'OK'.

4. If the file is in a folder you will be prompted with an 'Encryption Warning' message. If this is the case, click the 'Encrypt the File Only' option and click 'OK'.

Tips

  • You can use EFS (Encrypting File System) to encrypt files on Windows XP, Windows Vista, Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise. The filesystem should be NTFS; it won't work on FAT32.
  •  Select the certificate of the user whom you want to add (to the access list of the encrypted file), and then click OK. You can do this by clicking Properties -> Advanced -> EFS settings.

  • To decrypt a folder, use the same process, only disable the document property encryption by clearing Encrypt Document Properties check box.
  • Rename your file with a completely different filename and a different file extension. For example, change filename.doc into general.jpg or filename.xls into birthday.mp3; If file extensions (.doc, .png, .mp3, etc.) are not visible go to: Tools -> Folder Options -> View, and uncheck hide extensions for known file types. Some computer savvy individuals may be able to crack the file.
  • You can encrypt your files using strong AES-256 encryption feature of 7-zip, which is a free file compression utility which you might be using already to compress/zip multiple files into one smaller file to be send across internet.
After encrypting the files, you should back up your certificates because there is no other way to recover encrypted files with a corrupted or missing certificate. It is critical that you back up the certificates and store them in a secure location. Here's how to back up your certificate : 

1. Open Microsoft Internet Explorer. On the Tools menu, click 'Internet Options'.

2. On the 'Content' tab, in the Certificates section, click 'Certificates'. Click the 'Personal' tab.

3. Select one certificate at a time until the 'Certificate Intended Purposes' field shows 'Encrypting File System'.

4. Click 'Export' to start the Certificate Export Wizard, and then click 'Next'. Click 'Enable Strong Protection', then click 'Next'. Type in your password.

5. Specify the path where you want to save the key, and then click 'Next'. You can save the key to another location on the hard disk, or on a removable media