Jumat, 24 Juni 2011

Change Windows Media Player Title Bar

Start Regedit


You can alter the title bar for the Windows Media Player


Generate a string value of TitleBar


Go to HKEY_USERS \ .DEFAULT \ Program \ Policies \ Microsoft \ WindowsMediaPlayer


Give it a value of whatever you require to appear in the title bar

End Task Not Responding Program Automatically

Normally you finish tasks the non-responsive programs by hand using windows task manager with (CTRL + ALT +DELETE) keys. Sometimes these non-responsive programs creates issue to run windows & others programs properly. You can configure your computer to manage these non-responsive programs automatically. Windows has a feature that will close all non responding program automatically. In the event you have tiny knowledge about editing windows registry then you can configure your computer for this purpose.
Follow the given steps to configure windows registry for auto finish task :




First click on Start button then type Regedit in Run option. Here locate the location to:
Go to Hkey_Current_User\Control Panel\Desktop
Here in right side panel, double-click on AutoEndTasks & here its default value is 0. Now alter it to one. Now windows will close your all non-responsive programs automatically.
Now close the registry editor & restart your computer after any changes to go in to effect.

Basic Command On Linux

For changing directory / to /etc

[root@pc1 /]# cd /etc

One step back /etc to /
[root@pc1 etc]# cd ..

Go to previous working directory
[root@pc1 /]# cd -

Go to current login user home directory
[root@pc1 etc]# cd ~

Show the contents of /etc in single color
[root@pc1 ~]#  dir  /etc

Show the contents of /etc in different colors with nature of contents
[root@pc1 ~]#  Ls  /etc

create a folder on root partition
[root@pc1  ~]#  mkdir  /disk

Create a folder in /disk
[root@pc1  ~]#  mkdir  /disk/dir

Create multiple folder in multiple directories with single command
[root@pc1  ~]#  mkdir  /etc/dir1 /var/dir2 /usr/dir3

Create multiple folder in same directory
[root@pc1  ~]#  mkdir  dir1 dir2 dir3

Copy a file in directory
[root@pc1  disk]#  cp  file dir

Copy a file from /disk/file and paste it in /disk/dir/
[root@pc1  disk]#  cp  /disk/file /disk/dir

Copy a directory with –r option
[root@pc1  disk]#  cp  -r  dir  dir2

Copy a file from /disk/file and paste it in /etc with myfile name
[root@pc1  disk]#  cp  /disk/file  /etc/myfile

Remove a file
[root@pc1  disk]#  rm file

Remove a file with forcefully option
[root@pc1  disk]#  rm –f  file

Remove a directory with out –r option and you face will an error
[root@pc1  disk]#  rm dir

Remove a directory with –r option
[root@pc1  disk]#  rm  -r  /disk

Remove a directory with forcefully option
[root@pc1  disk]#  rm  -rf  dir

Move /etc/dir1 to /disk/ with different name
[root@pc1  disk]#  mv  /etc/dir1  /disk/mydir




Rename the folder name mydir to dir
[root@pc1  disk]#  mv  /disk/mydir  /disk/dir

Rename the file name with myfile
[root@pc1  disk]#  mv file myfile

Read a file page by page with less command
[root@pc1  disk]# less  /etc/grub.conf

Read a file page by page with more command
[root@pc1  disk]# more  /etc/qrub.conf

Read first ten lines of grub.conf
[root@pc1  disk]# head  /etc/grub.conf

Read last ten lings of grub.conf
[root@pc1  disk]# tail  /etc/grub.conf

Read first 12 lines with –n option
[root@pc1  disk]# head  -n  12  /etc/grub.conf

Read last 11 lines with –n option
[root@pc1  disk]# tail  -n 11  /etc/grub.conf

Copy the contents of /etc/grub.conf in /disk/file
[root@pc1  disk]# cat  /etc/grub.conf > /disk/file

Append the contents /etc/mtab in /etc/file
[root@pc1  disk]# cat  /etc/mtab >>  /disk/file

Merging tow commands with pipe sign output of the first command is input of second command
[root@pc1  disk]# cat  /etc/squid/squid.conf I more
Count the total lines of squid.conf
[root@pc1  disk]# cat  /etc/squid/squid.conf I wc  -L

Show only spool words in squid.conf
[root@pc1  disk]# cat  /etc/squid/squid.conf  I grep  spool

Flush the contents of file

[root@pc1  disk]# cat  /dev/null  >  /var/log/messages

Get Better Print for Digital Camera

There's some guidelines for definite printing task:


1. Resolution of Image- The important factor to receive a quality print, the DPI of the an picture. DPI stand for numbers of dots of ink per inch that will appear on the page in both directions (Vertically & horizontally), for example 600X700 dpi.




If you are going to print simple text or picture then 300 dpi is best & for higher quality text or picture your choice for picture resolution ought to be 600 dpi. But in the event you are working with professional picture quality then set dpi up to 2400.


2. Paper Quality- Paper quality playing a vital role in printing an images. Specially printer manufactures designed paper to be used with the ink in your printer. You ought to think about some qualities in paper like page size, paper color & its weight.


3. Printer Settings - Printer setting is also important factor in picture result, but these setting  same with the all printers, for example Paper size, printing mode (EconoMode for save toner), printing quality (Best Quality, Faster Printing & Custom) & color management.

Configure File Permission in Linux

Three types of permission read write and execute, Ever file and folder have relations owner group and
others
[ Read = r write = w execute = x ] [ owner = u group = g other = o ]
[root@pc1 ~] # Ls -Ld /disk






1= nature of object [d=dir -=file L=link]
2= first permission for owner [ rwx ]
3= second permission for group members [ r-x]
4= third permission for others [r-x]
5= number of inodes contain by this listing
6= owner of listing
7= group of listing
8= size of listing
9= generating date of object
10= name of object



[root@pc1  ~] #   Ls  -L  /disk
Drwxr-xr – x   2   root   root   4096   Jan   1   1988   dir1
Drwxr-xr – x   2   root   root   4096   Jan   1   1988   dir2
Drwxr-xr – x   2   root   root   4096   Jan   1   1988   dir3
Changing permission = give write permission to other on /disk
[root@pc1  ~] #   chmod  0+w  /disk
Give read write and execute permission for group on /disk
[root@pc1  ~] #   chmod  g+rwx  /disk 
Assigning read writ and execute permission to user, group and other with single command
[root@pc1  ~] #   chmod    u+rwx , g+rwx, o – rwx  /disk 
Assigning different permission with different commands which separate with semicolon
[root@pc1  ~] #   chmod   u+rwx   /disk  ;  chmod  g+rwx   /disk  ;  chmod  0+rx  /disk 
Using number system =----- [ Read = 4 ] [ Write = 2 ] [ Execute = 1 ]
rwx=7
r-x=5
---=0 
Assigning full permission to owner and no permission for group and others
[root@pc1  ~] #   chmod  700 /disk 
Assigning full permission for owner and group no permission for other
[root@pc1  ~] #   chmod  700 /disk 
Assigning full permission to all
[root@pc1  ~] #   chmod  777 /disk 
Assigning full permission for owner and read, and execute for group and others
[root@pc1  ~] #   chmod  755 /disk 
Assigning no permission for all
[root@pc1  ~] #   chmod  000 /disk 
Assigning sticky bit permission for other
[root@pc1  ~] #   chmod  o+t   /disk 
Assigning suid permission for owner
[root@pc1  ~] #   chmod  u+s  /disk 
Assigning sgid permission for group
[root@pc1  ~] #   chmod  g+s  /disk

Secure Wireles From Hacker

The reason they secure a wireless network is to cease people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, they ought to take proper steps to save ourselves against security issues. In case you don't secure a wireless network from hackers, you might finish up without its service. The consequence might also include the utilization of our network to assault further networks. To secure a wireless network from hackers, you ought to follow these simple wireless networking tips:


1.    Strategic antenna placement:


The first thing you require to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the necessary area. You ought to not put the antenna close to a window because glass cannot obstruct its signals. Place it in a central location of the building.




2. Use WEP:


WEP stands for Wireless encryption protocol. It is a customary method for encrypting traffic on a wireless network. You ought to never skip it as that will permit hackers to get instant access to the traffic over a wireless network.


3.    Alter the SSID, disable the broadcast of SSID:


SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers can beginning connections. For every wireless access point arranged, select an exclusive as well as one-of-a-kind SSID. Also, if it is attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.


4.    Disable DHCP:


By doing this, the hackers will must decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.


5.    Disable or alter SNMP settings:


Alter the private as well as public community settings of SNMP. You can also disable it. Otherwise the hackers will be able to utilize SNMP to get significant information regarding your wireless network.


6.    Utilize access lists:


For additional security of your wireless network, & if your access point support this feature, employ an access list. An access list lets us select exactly which machinery is allowed to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now & then in order to download modernized lists to steer clear of hackers.

Selasa, 14 Juni 2011

Lock Computer by Mouse

Today lets see a simple trick on how to lock your PC using mouse click.We normally use Alt+Ctrl+Del or Windows+L to lock our PCs.Instead of trying those windows keyboard shortcut keys to lock Computer, lets now tryout something new .Some might have already know this trick already
1. Right click on the desktop, point to New & click Shortcut.
2. In the Generate Shortcut dialog box, copy the following in to the 'Type the location' of the item text box:
"rundll32 user32.dll,LockWorkStation" remove quotes while typing.
3. Click Next.
4. In Type a name for this shortcut, type LOCK MY PC & Click Finish
5. Now double-click on the icon, your desktop will be locked.
Though this is a age elderly trick.It makes some difference to newbies

Step by Step to Keep Safe Online

There are some simple steps you can take to make sure your PC remains protected while you surf the Web. Following each of these guides can help protect your PC from virus, adware & other online threats.



1. Update Windows
Microsoft regularly releases free downloads to fix security issues with Windows, Internet Explorer and other Microsoft application such as Office. This guide explains the way you can get these important updates.
six. 


2.Install A Firewall
A lovely firewall such as ZoneAlarm will prevent programs from accessing the Web without your permission, and block access to your PC from intruders. This guide explains how to put in and set up a firewall.



3. Check For Viruses
Malicious virus code can infect your PC's process files & destroy your important information. This guide explains how to make use of an anti-virus program to find & remove malicious programs.


4. Remove Adware
Adware is malicious code that tracks your movements on the Web & may even affect your PC's performance. Read Remove Adware which explains how to get rid of malicious adware & adware.


5. Browse More Safely
The latest web browsers such as Web Explorer 7 & Firefox four offer security features like pop-up blockers & phishing filters to keep you safe when visiting websites. These guides describe how to put in & use these browsers.

Minggu, 12 Juni 2011

Remove Logoff Button

On the Start menu there is Log Off button. The position is beside Turn Off Computer button. If you don't want to have Log Off button, you can hide it by doing the following steps:
  1. Click Start - Run.
  2. Type "regedit" .
  3. Go to HKEY_CURRENT USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.
  4. On the right window of registry editor, right-click the empty space.
  5. Choose New - DWORD Value.
  6. Type the value name "StartMenuLogOff" and press Enter.
  7. Right-click the new key you've made and choose Modify.
  8. On the Value Data type the number "1" to hide the button.
  9. Press OK.
  10. Restart your computer.

Optimize Computer

Are you keeping on top of the general maintenance of your computer? Here are some computer tips to optimize your computer's performance:


Temp folder cleanup
The temp folder found in C:\Windows\Temp often contains files that have no reason to exist any longer. The folder is used by a large number of programs to store temporary files but unfortunately due to lazy coding the files often remain afterwards leading to a massive amount of data filling up the temp folder over time.
You can use the 'Disk Cleanup Wizard' that comes with windows to sort out your temp folder by clicking on the Start menu then clicking on Programs > Accessories > System Tools > Disk Cleanup. Select the drive you wish to clean (usually C:) and then after a while of loading a dialog box will appear with recommendations. One of my favorite computer tricks when my computer starts to get a bit sluggish.


Remove old programs
Make sure you keep on top of your installed software. The Add/Remove Programs tool allows you to do this. Click on the start menu then settings then control panel. In the window that appears double click on 'Add or Remove Programs' and a dialog will appear after a short time. Any software you do not actively use be sure to get rid of it. This will save disk space, prevent any future software conflicts and hide the fact you installed a naughty program from friends or family!


Defragment
Over time a hard disk gets a bit sluggish due to being fragmented. It occurs every time the system struggles to store a whole file (generally big files) so it slots bits of the data in between other files. To make the files whole again you have to perform a defragment. Click on the start menu then programs then accessories then system tools then 'Disk Defragmenter'. Depending on disk size it can take several hours to complete so perhaps go and watch a film while it works, something like the Matrix is good! Another one of my favorite computer tricks because it feels like my hard disk is 'purified' afterwards.

Windows Shortcut Keys

A few great shortcut keys that are great computer tricks are:


Hold the windows key and press M
This will minimize all windows in one key press! This is the same as pressing the 'Show Desktop' icon but without having to click on it. It should be noted that Windows key + D also works for this!


Hold the windows key and press L
This will lock your workstation instantly. This means that if you are in a public place or a shared machine and go for a toilet break but do not wish for anyone to sneak a peak at what you are doing, or at worst steal your files, then this will take you back to the login screen instantly. Very handy indeed!


Hold alt then press F4
This is quite a common one but should be mentioned here anyway. This key press will close your current window. If your screen is getting cluttered you can go on a 'close rampage' by holding down the F4 key as well! Good times!


Hold ctrl then press F4
The junior brother of alt F4. Instead of closing the whole window this will close internal windows within the current program. For example if you have multiple windows open in one instance of Microsoft Word this will close them one at a time. The best part is this works for the tab browsing that has come in to play in recent browsers. The key press closes the active tab you are viewing! This is one of the best computer tricks I find when browsing as it is really effective for FireFox for closing tabs.


Hold alt and press tab
This will cycle between programs on your computer. This feature isn't that useful until you install this nice little Microsoft tool which will show a thumbnail of the program your about the switch to. If you don't wish to activate the selected program keep holding down alt and press tab again to cycle to the next one!


Hold the windows key and press break
A lesser known shortcut but still useful! This one will open the System Properties dialog window which displays your RAM etc.
Hold the windows key and press E
This will open 'My Computer' in explorer style mode. This is very handy if you want to access your files and disk drives from anywhere without having to find the icon on the desktop or start menu.


Custom Shortcut Keys!
Another lesser known trick is setting up your own custom key presses. This works for a per-program basis. To setup a shortcut key to your favorite program first you need to right click on the shortcut icon you commonly use and then press on properties. Click on the Shortcut' tab and there will be a text field called 'Shortcut key'. Simply click in that and enter the key press you wish to use. Press OK and that key press is permanently associated with that program. This is very handy for many things such as opening word or opening your favorite game!

Protect Computer From Virus

Any best anti-virus we use and the latest update did not guarantee freedom from computer viruses, because viruses are always developing and updating anti-virus [most of] just keeping track of the virus itself (so when the virus has spread, the possibility of anti-virus can detect only a few days later). But without anti-virus computer much more vulnerable to virus

For most users, perhaps this article was used and not new anymore, but for ordinary users / layman may be useful to prevent virus entry / transmitted to your PC. Given the development of such viruses rapidly. This is possible because of the source code that explains how the virus that published in general, which may mean more than just information exchange, but beyond that the possibility of developing their own lots to create viruses and fishing programmers to experiment.

Some things that need to be prepared to prevent virus entry / transmitted to the computer is:
  1. Use anti-virus and always updates at least once a week, if online then enable the auto update antivirus
  2. Disable autorun facility on our computer, so that the CD-ROM or flash that we enter into the computer does not directly run the file in it. For those who do not know, you can see how here
  3. Show all windows file extensions, including the file system windows. Here's how: In Windows Explorer open the Tools menu> Folder Options and select the tab view then remove the check on the option "Hide extensions for known file types"
  4. Check each flash is included, whether there autorun.inf file, if any try to see it, if it refers to a file .exe, .dll or .scr odd / hidden, immediately delete the file or scan with antivirus
  5. This is probably very important: If the computer is used by many people, ask that users be careful before running a file, do not just look at his icon, but to see the extensions. For example file with the icon ms word, excel, images, mp3 etc. but have .exe,.scr, .vbs , .bat extension or not in accordance with iconnya, please watch out
  6. Use the tools / programs such as autoruns to see the file / whatever programs running when windows is activated. If there is a strange program immediately ask people who know better

Maintenance The Computer

There are a few tips to consider in connection with the use of computers make it more secure and durable of which is:
  1. Provide UPS, voltage is often up and down or even sudden death will affect less well on the PC, especially PC that had long, will cause damage to the Power Supply, damaged hard drive, even Motherboard. Especially in the hard disk, hard drive needs to stability while working, when a sudden power failure, there was pressure that can cause scratches his track recording, the cause having a bad hard drive sector. Bad sector can only be seen if we check through ScanDisk. Bad sector can not be charged to operating system files and store data, which will reduce the capacity of the hard disk itself. Therefore, in trying to provide the UPS or the external battery as a safety in case your computer loses power it remains alive for some time, so there was a chance to shut down the computer according to the procedure.
  2. For UPS with no stabilizer, use a stabilizer so that computer and your UPS is more durable. 
  3. Always clean your computer periodically from the dust. Besides pleasing, clean computer will also minimize possible entry of dust into the computer. Imagine if the damaged computer just because of dust.
  4. Computer away from magnetic fields can interfere with work performance.
  5. For the sake of data security and computer system, make sure existing Antivirus and always updated.
  6. Make sure your software and operating system is also maintained.

Protect Computer

Following I will only share a few tips or tricks about Protect your computer. for those of you who bought a brand spanking new computer, this may be useful.


1. Keep your firewall turned on.
A firewall helps protect your computer from hackers who might try to delete information, crash your computer, or even steal your passwords or credit card numbers.


2. Keep all of your program & your operating method up-to-dat
High priority updates are critical to the security & reliability of your computer. They offer the latest protection against malicious online activities. Microsoft provides new updates, as necessary, on the second Tuesday of the month.


3. Keep your antivirus program up to date
Viruses & adware are kinds of malicious program that you need to protect your computer from. You need antivirus know-how to help prevent viruses, & you need to keep it regularly updated. Microsoft Security Necessities is a no-cost download for Windows 7, Windows Vista, & Windows XP.


4. Keep your antispyware know-how up to date
iruses & adware are kinds of malicious program that you need to protect your computer from. You need antispyware know-how to help prevent adware, & you need to keep it regularly updated. Microsoft Security Necessities will help protect against adware & other undesirable program.

Sabtu, 11 Juni 2011

Techniques Using Search Engines

If you require to search for any topic using search engine, the search engine will search with the given information & will provide a list of links of websites along brief description about each web-site.
Along with using the right search terms, the following points must be noted to search the information on the net:
Use + sign between words in the event you require to search for all words. For example, to search blogs of Web Tips, type as: Blogs+Internet+Tips
To search the exact match, write the words in double quotation marks. For example to search the Web Tips, then type as: "Internet Tips"
Avoid to make use of "and", "or" with search keywords, because these words will affect the search result.

Recover Your Crashed Hard Disc

Firstly you need to know What is Information Recover ?
# It is a method of making or restore historicallyin the past lost or damaged information.



How to Recover information from information stored on damaged media or corrupt storage tool, such as hard disc?
#You can do it by a program is used Disk recovery program which analyze & examines hard disk drive & recover & restores the information back.



Where it is applicable ?
# All popular Operating Method Windows, Novell, Linux & Mac.



What is the file systems where it is applicable?
# FAT, NTFS, Ext2, Ext3, NWFS, NSS, HFS & HFS+ etc.

In what Situation it can be information can be recovered?
#Hard Disk Drive Crash , Water Damaged , Fire / Heat / Smoke Damag, Program Failure & corruption, Power Outage, Electrical shortage, Virus Destroy & Repair 

NOTE: No technical skill is necessary. You need to buy a lovely information recovery program & use it...

Readers are requested to post some link, which are lovely according to them for DATA RECOVERY SOFTWARES...

Show The File Extension

 Do you need to know the file extension of you files in your PC ?



GO to my computer->tools->folder options->go to the view tab.
Now uncheck the 'Hide extensions for known file types'.Press apply.

Keyboard Shortcut for Ms.Excel

Use this Short Cut Keys for MS Excel operations. This short-cut will certainly save your valuable time in the coursework of operation with Excel


Ctrl + A Select all contents of the worksheet. 
Ctrl + B Bold highlighted selection.
Ctrl + I Italic highlighted selection. 
Ctrl + K Insert link.
Ctrl + U Underline highlighted selection.
Ctrl + P Bring up the print dialog box to begin printing.
Ctrl + Z Undo last action. 
F2 Edit the selected cell. 
F5 Goto a specific cell. For example, C6. Shift + F5 Bring up search box. 
F7 Spell check selected text and/or document.
F11 Create chart. 
Shift + F3 Open the Excel formula window.
Ctrl + Shift + ; Enter the current time. 
Ctrl + ; Enter the current date.
Alt + Shift + F1 Insert New Worksheet.
Ctrl + 5 Strikethrough highlighted selection. 
Ctrl + F9 Minimize current window.
Ctrl + F10 Maximize currently selected window.
Ctrl + F6 Switch between open workbooks / windows. 
Ctrl + Page up Move between Excel work sheets in the same Excel document. 
Ctrl + Page down Move between Excel work sheets in the same Excel document.
Ctrl + Tab Move between Two or more open Excel files. 
Alt + = Create a formula to sum all of the above cells
Ctrl + ' Insert the value of the above cell into cell currently selected.
Ctrl + Shift + ! Format number in comma format. 
Ctrl + Shift + $ Format number in currency format. 
Ctrl + Shift + # Format number in date format. 
Ctrl + Shift + % Format number in percentage format.
Ctrl + Shift + ^ Format number in scientific format.
Ctrl + Shift + @ Format number in time format.
Ctrl + Arrow key Move to next section of text. 
Ctrl + Space Select entire column. 
Shift + Space Select entire row.