Friday, December 26, 2008

Web Hosting - Ten Basic Tips

0 comments

Web Hosting - Ten Basic Tips

Introduction
This page contains a testimonial of my extremely poor experiences with a particular web host, drawing upon these experiences to highlight ten basic rules for choosing a web host. The aim of the page is to help prevent you from making the same mistakes I did.
So what is a web host? A web host is a company which provides a valuable service on the Internet: the physical storage and distribution of website pages on behalf of website owners. Basically they provide the hardware and software, and website owners provide the information. For a certain fee, the web host agrees to rent website owners space on their server, and the accompanying bandwidth they provide for Internet users the world over to download web pages from their server.
I threw this page together as another resource on TweakGuides.com to help out potential webmasters in perhaps choosing a web host more wisely than I first did. A wrong choice can have terrible consequences for your website and its reputation. Keep the following in mind if you're considering purchasing web hosting services on the Net.

Ten Basic Rules

Suffice it to say, Oktagone.net is the web hosting company which kicked off the creation of this page. Their absolute lack of professionalism, and the (almost irreparable) damage they did to TweakGuides.com still makes me angry, and it's been quite a while since I escaped their clutches! We will use Oktagone to neatly demonstrate what makes a truly terrible web host.
The basic story goes like this: I was looking for a web host in April 2004 for my new site TweakGuides.com. As with most websites, things start out small, so I didn't want to invest in a dedicated server package costing hundreds of dollars per month. I just wanted some cheap but reliable shared web hosting (that is my site would be on the same server as many other websites, lowering costs). Oktagone was recommended to me because they were cheap and supposedly reliable. Basic Rule Number One - Never rely on one or two pieces of advice when purchasing hosting services. Aside from the fact that people may not really know what they're talking about, nothing replaces decent research when choosing a web host. Some unscrupulous hosting companies even resort to joining forums under pseudonyms and then giving their own services glowing testimonials to con unsuspecting potential customers (though I am not suggesting Oktagone.net did this).
So I joined Oktagone in April 2004 and instantly noticed the unprofessional setup - they had no formal billing system. You had to PayPal your monthly fee to them, without any way of checking your account balance, the actual service you had purchased, when your next bill was due (or overdue) etc. In fact at one point I upgraded my service (and paid extra) yet still got the old service for a month or two until I noticed the difference in my bandwidth allowance. Basic Rule Number Two: - Never rely on a web host which can't even automate or administer the most important aspect of a business: billing and payments!

Then there were the outages...long and short. Sometimes only a couple of hours, sometimes a day or two. Basic Rule Number Three: - Never ever rely on a web host which has "mysterious" outages frequently, always promising that it is "just a glitch". Your website relies on a smooth and consistent presence on the Internet to be successful. Would you frequent a supermarket or a bookstore which had odd trading hours and/or which regularly closed down without any word of why? Unreliable web hosts can cause irreparable damage to your website's traffic. Of course if you actually earn revenue from your site, this can be even worse - you will lose income, sometimes for days a time, and you won't be able to do a thing about it since the web hosting company controls if and when your site comes back online.

After many months of problems with Oktagone, there was a relatively stable period during which my site flourished. I topped 200,000 unique visitors a month, millions of hits and a reputable presence on the Internet. I thought things were good because I didn't have any hosting problems to damage my growing reputation. I now know this was the calm before the storm. Oktagone had a final blow lined up for my site: Oktagone was actually a reseller - that means they bought services from another company, and resold it at a profit. It turns out Oktagone did not pay their own bills for two months in a row, so the main company simply shut down all their servers. I suddenly found my site was offline and inaccessible without a single word of warning, without any explanations. It remained offline for around two days, until which time I found this thread on the WebHostingTalk Forums, detailing the debacle which had befallen all of Oktagone's US-based customers. Within a day of the thread appearing, Oktagone sent out an official email saying that the problem was due to a "power outage in New York", and that a technician was on the way to resolve problems within 36 hours. Needless to say this was a blatant lie, and Oktagone's owner later admitted - when confronted with the facts by the reseller on WebHostingTalk Forums - that he had simply not paid his bills and the servers had been shut down.

So some more things to note: Basic Rule Number Four: - If your host goes down for more than 24 hours, start getting very worried. This is not normal, and if you have had no warning, and no explanation, it is even worse. At this point start shopping for another webhost immediately. That is precisely what I did on the 2nd day. Basic Rule Number Five: - If you do receive a story about why your site is down, try to corroborate it with other people on the same host. Use the WebHostingTalk Forums for example to search for and/or post a question on whether the web host is down and why. Don't trust the web host to tell you the truth about the situation, and don't just sit and wait. Basic Rule Number Six: - Once your site is down for several or more days, don't wait - switch your host. Simply put, if your web host hasn't taken steps to protect against long outages by having appropriate emergency backup systems, then you need to get away from them ASAP. In Oktagone's situation, their outright lying was bad enough, but the fact that they left some of their customers offline for over two weeks (!) means that I will never trust them again, especially given they still maintain the same owner.

I was very lucky to get away from the situation relatively unscathed. I shopped around for, and quickly found another cheap (but more reliable) host called HostingOnNet.com. I was able to do so thanks to some simple precautions: Basic Rule Number Seven: - Always back up your website regularly to your own PC. I made daily backups of every page, picture and file I uploaded to my site onto my hard drive, so my backup was literally up-to-date and readily accessible. Others hosted on Oktagone were not so lucky, and had to rely on the generosity of the reseller to turn the servers back on for a while so they could backup their data. Incredibly, during this period Oktagone actually went out of their way to prevent customers backing up their data, which was thwarted by the reseller which owns the servers.

However one of the most important tips is a common mistake made by people new to web hosting: Basic Rule Number Eight: - Never register your domain name through your web host. This is the single biggest problem Oktagone customers ran into. Those that had also purchased their domain name through Oktagone couldn't switch to another web host with their existing domain names. Why? Because the Oktagone Domain Name Servers were offline, meaning that the addresses to which the domain names pointed to couldn't be changed! This meant that some sites were down for a week or two or more with no recourse whatsoever. Luckily I had registered TweakGuides.com through another domain name seller than my web host (Godaddy.com), a very smart thing to do and strongly recommended.

Ok so what happened in this situation. What was the permanent damage through all this melodrama? For starters I had a lot of concerned people trying to contact me during what was a peak period in my site's usage wondering what had happened. Yet of course because my site was physically offline, they couldn't email me. I couldn't put up any form of notice to tell them why TweakGuides.com was now inaccessible. Two days of this was bad enough, but two weeks would have broken my site's back. Some unscrupulous people had already tried during earlier outages to rip off my guides and host them on their own sites with the explanation "TweakGuides.com is no longer online, so we are 'archiving' their guides." Gee, how generous of them - all without my permission of course. I lost a few dollars as well because I'd paid in advanced, and despite assurances of getting a refund, to date Oktagone has not returned a cent, nor responded to my emails politely requesting a refund. This is despite the fact that I did not use one day of the months' hosting I paid for, and that they had already said they would pay me a refund (in principle) on the WebHostingTalk forums. Another telling sign of what kind of people run these sort of businesses, and my Basic Rule Number Nine: - Never pay in advance for hosting, even if it entails a large discount. You may find you lose all your money if/when the host goes down forever, and/or if they decide simply not to refund you. Consumer protection agencies may help you recover your money, but for small sums below a few hundred dollars you're going to spend more money trying than the amount you'd ever get back. Pay for your hosting by the month, and do it through a Credit Card so you can always cancel the payment if need be, or turn to the Credit Card company's fraud protection mechanisms to prevent losing large amounts of money.

The whole experience was very unpleasant, and for a site like TweakGuides.com which is still firming its reputation around the Net, one which I would have gladly done without. I hope the information above helps you decide on an appropriate web host. I personally did a fair bit of research before finding another host after Oktagone, although being placed in a pressure situation (i.e. my site was already down for two days) didn't help. My final rule is simple Basic Rule Number Ten: - Don't wait until something bad happens - if you're not happy with your current host, start researching for a better host straight away. Even if you decide to stay with your current host, at least you will have some options in case some emergency comes up and you have to switch at short notice. Never make the decision in a pressure situation as you're likely to just switch to another poor quality host.

Well, that's pretty much it from me. I got to tell my story, and hopefully provide ten basic tips at the same time! Hope you found it handy.


Update on Oktagone: People who have been unfortunate enough to recently sign up with Oktagone are still running into terrible problems, including loss of income. I strongly recommend you steer completely clear of Oktagone Hosting. As you can see, if you find negative accounts of web hosts from the past, chances are they haven't changed much in the intervening period - once a bad host, always a bad host.


Update on my Hosting

Due to the growing popularity of my site, and the demands it places on a host, I now use Virtual Private Server hosting. I tried DEHE.com for a few months, and unfortunately their setup wasn't stable. Site load - and hence responsiveness - would fluctuate noticeably for no apparent reason, and then there were several outages which although due to hardware failure, were just too much for me to deal with. Although the support was good, and the owners were genuinely trying to resolve problems, it became embarrassing to explain to my readers why the site was constantly slow or offline, so I left DEHE.com after a few months.

Now I am hosted by EuroVPS who have provided a much more stable server configuration - no doubt due to their greater experience and skills with VPS technology. My site load is consistent, even though I am now getting the most traffic I've ever had. The site never becomes totally unresponsive or extremely slow, and their support is very professional and resolve problems quite fast. Though they are not the cheapest around, they are definitely worth the money. Remember, Cheapest is not always the best choice. You get what you pay for, so if having a stable presence on the Internet is important to you, spend a few extra bucks or you may find you get more problems than you bargained for.
newer post

StartBtn Renamer

0 comments
Rename StartBtn of XP
http://i1-news.softpedia-static.com/images/news2/Secret-Way-To-Rename-The-Start-Button-2.png

DESCRIPTION
"StartBtn Renamer" is a simple utility for renaming the [Start] button under Windows XP. With this freeware tool, you can change default label of the [Start] button with your own text. This is great when you want to tease your friends or when you intend to have a greater variety in Windows...
"StartBtn Renamer" [also] is Open Source. This means that the source code of the program is presented with it, so that you could change it according to your own taste and wish, therefore you can add more possibilities on it (Any commercial use of this source code, without permission of the author is forbidden).
For more information about the Open Source theory, visit OpenSource.org.

HOW TO USE
Simply run the standalone program "StartBtn.exe" and then type your desirable label in the "New Label" field. By pressing the key, or clicking on the "Rename It" button, the [Start] button will rename with the new Label.

You can also rename the [Start] button by running the file "StartBtn.exe" from the MS-DOS command prompt. To do this, you must go the directory which you have been installed the application, use this sysnax to run the program.
  • Usage:
    StartBtn.exe NewLabel
    which NewLabel parameter is the new label for the [Start] button.

  • Example:
    StartBtn Begin
    Changes label of the [Start] to "ICT ZONE".

    This can be most useful when you want to rename the [Start] button at the Windows startup.
  • Download
    Download StartBtn Renamer
    newer post

    Monday, December 22, 2008

    Slax - your pocket operating system

    0 comments
    Slax is a modern, portable, small and fast Linux operating system with a modular approach and outstanding design. Despite its small size, Slax provides a wide collection of pre-installed software for daily use, including a well organized graphical user interface and useful recovery tools for system administrators.The modular approach gives you the ability to include any other software in Slax easily. If you're missing your favourite text editor, networking tool or game, simply download a module with the software and copy it to Slax, no need to install, no need to configure.If you are a beginner or you're just too busy to make it yourself, follow a few steps to build your own customized operating system by using web-based interface here.You can collect portable slax operating system for CD or flash drive.
    To download slax , Click Here
    newer post

    Saturday, December 13, 2008

    Run Command

    0 comments
    ..::: All Run Command Here :::...

    Some useful Run commands
    SOME USEFUL RUN COMMANDS !!!
    To access the RUN command prompt click START menu then click RUN

    These are Some below

    Add/Remove Programs - appwiz.cpl
    Administrative Tools - control admintools Automatic Updates - wuaucpl.cpl
    Bluetooth Transfer Wizard - fsquirt
    Calculator - calc
    Certificate Manager - certmgr.msc
    Character Map - charmap Check
    Disk Utility - chkdsk Clipboard
    Viewer - clipbrd Command Prompt - cmd
    Component Services - dcomcnfg
    Computer Management - compmgmt.msc
    Date and Time Properties - timedate.cpl
    DDE Shares - ddeshare
    Device Manager - devmgmt.msc
    Direct X Control Panel (If Installed)* - directx.cpl
    Direct X Troubleshooter - dxdiag Disk
    Cleanup Utility - cleanmgr
    Disk Defragment - dfrg.msc
    Disk Management - diskmgmt.msc
    Display Properties - desk.cpl
    Display Properties (w/Appearance Tab Preselected) - control color
    Dr. Watson System Troubleshooting Utility - drwtsn32
    Driver Verifier Utility - verifier
    Event Viewer - eventvwr.msc
    File Signature Verification Tool - sigverif
    Findfast - findfast.cpl
    Folders Properties - control folders
    Fonts - control fonts Fonts Folder - fonts
    Free Cell Card Game - freecell Game Controllers- joy.cpl
    Group Policy Editor (XP Prof) - gpedit.msc
    Hearts Card Game - mshearts
    Iexpress Wizard - iexpress
    Indexing Service - ciadv.msc I
    nternet Properties - inetcpl.cpl
    IP Configuration - ipconfig /all
    Java Control Panel (If Installed) - jpicpl32 Aug 31 Sourish
    Keyboard Properties - control keyboard Local Security Settings - secpol.msc
    Local Users and Groups - lusrmgr.msc
    Logs You Out Of Windows - logoff
    Microsoft Chat - winchat
    Minesweeper Game - winmine
    Mouse Properties - control mouse
    Mouse Properties - main.cpl
    Network Connections - control
    netconnections Network Connections - ncpa.cpl
    Network Setup Wizard - netsetup.cpl
    Notepad - notepad Nview
    Desktop Manager (If Installed) - nvtuicpl.cpl
    Object Packager - packager
    ODBC Data Source Administrator - odbccp32.cpl
    On Screen Keyboard - osk Opens AC3 Filter
    (If Installed) - ac3filter.cpl
    Password Properties - password.cpl
    Performance Monitor - perfmon.msc
    Performance Monitor - perfmon Phone and Modem Options - telephon.cpl
    Power Configuration - powercfg.cpl
    Regional Settings - intl.cpl
    Registry Editor - regedit
    Registry Editor - regedit32 Remote Desktop - mstsc
    Removable Storage - ntmsmgr.msc
    Removable Storage Operator Requests - ntmsoprq.msc
    Resultant Set of Policy (XP Prof) - rsop.msc
    Scanners and Cameras - sticpl.cpl
    Scheduled Tasks - control schedtasks Security Center - wscui.cpl
    Services - services.msc
    Shared Folders - fsmgmt.msc
    Shuts Down Windows - shutdown Sounds and Audio - mmsys.cpl
    Spider Solitare Card Game - spider SQL Client Configuration - cliconfg
    System Configuration Editor - sysedit
    System Configuration Utility - msconfig
    System Properties - sysdm.cpl
    Task Manager - taskmgr
    Telnet Client - telnet
    User Account Management - nusrmgr.cpl
    Utility Manager - utilman
    Windows Firewall - firewall.cpl
    Windows Magnifier - magnify
    Windows Management Infrastructure - wmimgmt.msc
    Windows System Security Tool - syskey
    Windows Update Launches - wupdmgr
    Windows XP Tour Wizard - tourstart
    Wordpad - write


    Ref: http://forum.polbd.com/viewtopic.php?id=74
    newer post

    Thursday, November 27, 2008

    Speed UP your Computer

    0 comments
    Speed UP your Computer

    http://zaicomp.com/wp-content/uploads/2011/05/The-8-Ways-To-Speed-Up-Computer.jpg
    Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
    1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
    2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
    3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
    4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
    5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
    6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
    7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
    8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
    9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
    10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
    11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
    12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
    13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
    14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
    15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
    16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
    17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
    18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
    19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
    20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
    21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
    22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
    23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.
    Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.
    newer post

    Tuesday, November 25, 2008

    Protect USB Pen-Drive

    0 comments
    USB Pen Drive Protector
    Do you use a Pen-Drive for transferring data across different systems in your office/network, then there is a high possibility of virus infections for transferring across with the pen-drive as a medium.Here are collection of freeware tools that you could as your first line of defense before using your pen drive on other systems.

    USB Write Protector –This freeware application prevents write access to a USB drives. This will protect USB drives from viruses, malwares, spywares etc.Using this tool you can just copy data from your pendrive to the system but not copy data into the pen drive from the client system.Its only 190 KB and works with XP with SP2.


    HomePage Download
    newer post

    protect PEN DRIVE from Virus

    0 comments
    How to protect PEN DRIVE from Virus


    Now a days pen drive has become as mendatory to have wather you are having PC ar not , Early days pen was only thing which we you to carry but know time has changed along with that we carry Pen Drive.
    What is Pen Drive? Now this questions come into our mind. Actualy pen drive is a device which contain a chip (memory) which store all the data in it or we can call removable Hard Disk of Computer.
    This is used to transfer data from one computer to another.

    But Now big problem is that It is also becoming dangerious for the PCs , because in large amount it is affected by the virus. This virus is very hurmful it can damge all the data's of computer or some virus's are so dangerious it can damage Hard Disk also.
    Don't be panic, Here I am going to show you how you can save or protect your PEN DRIVE from Virus. Just simply follow this steps in your computer and you will ammaged to see it.


    Ok Let us try to solve it

    Just insert your pen drive in the USB port, now a autorun window(usually it includes Open to view Files andTake no action options) will open to choose the program that will run your pen drive but just ignore it by clicking the Cancel button right after the OK button

    Then --------
    STEP 1.
    Open your Computer or Laptop, Click on START then go to RUN then type CMD now check the letter of your pen drive (eg. H:)

    STEP 2. In the command promt now type H: and press ENTER

    STEP 3. Now Type dir/w/o/a/p and press ENTER, now you will get list of file. Check this file for "Autorun.inf, new folder.exe, bha.vbs,explore.vbs, info.exe, ravon.exe,ravon.exe, mntdrcore.exe,rvhost.exe or other exe file extention.

    STEP 4. If you found any of the above file then run the command [attrib -h -r -s -a*.* ] in comman promt and then press Enter

    STEP 5. Now Delete each file one by one using del file name eg. del autorun.inf .

    STEP 6. Now scan your pen drive from any anti-virus, Now you will find that your pen drive does't get affected from virus.
    newer post

    Friday, November 21, 2008

    DAP Premium 8.7 Free

    0 comments
    Download Accelerator Plus Premium 8.7

    Download From Here

    Download Accelerator Plus (DAP) is the world's leading download manager, allows you to download up to 300% faster* with increased reliability, resume support and errors recovery. It searches for mirror sites that most effectively serve your downloads through multiserver connections for optimal utilization of dial-up or broadband connections. DAP automatically recovers from shutdowns, lost connections, and other errors. It is fully integrated into Netscape, Internet Explorer, and Opera, Mozilla/Firefox and offers a toolbar for Internet Explorer with a links catcher and a highlighter, providing the best possible performance from ANY Internet connection (dial-up, cable, DSL / ADSL, T1 etc.), allowing a Faster and more Reliable download experience. It features auto-hang-up after downloading, proxy settings, scheduling, and a unique AlwaysResume service.

    Features:
    - Preview pane
    – Preview downloads of Music and Video files
    - Download list
    - Advanced management of downloads queues, priorities and statuses
    - File Information pane
    – Advanced information of downloaded files and sources
    - Completed downloads list
    – Separate list of completed downloads
    - DAP Drive integration
    – Save downloads and Upload files to DAP Drive web storage
    - Media Center Tab
    – Conveniently manage your media files
    - Superior Usability
    – New interface with flexible design options
    - Integrates with all browsers
    – Internet Explorer, Netscape, Opera, Mozilla/Firefox

    Download Accelerator Plus registered version includes:
    - Zip Extract
    - download & extract specific files from zip archive
    - Removal of the Banner Advertisement within the application
    - DAP Skin Selection
    - Management of site passwords and other relevant info (unlimited)
    - Tray icon minimization while downloading
    - Prioritized technical support
    - Extreme acceleration speed
    - for faster download rate

    Only with DAP Premium:
    - Extremely faster
    - x10 connections per download!
    - Absolutely no advertisements!
    - Totally customized download experience!
    - Shredder to totally eliminate files you don't need!
    - Trace Cleaner -keep your privacy after browsing!
    - Preview & extract zip files while downloading!
    - Cool new look, more comfortable management features!
    newer post

    Tuesday, November 18, 2008

    Hack Windows XP Password

    0 comments
    “Hack Windows XP Password”

    Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.

    There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.




    Steps to Hack into a Windows XP Computer without changing password:

    1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

    2. Download DreamPackPL HERE.

    3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.

    4. Use any burning program that can burn ISO images.

    5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.

    6. Press “R” to install DreamPackPL.

    7. Press “C” to install DreamPackPL by using the recovery console.

    8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)

    9. Backup your original sfcfiles.dll by typing:“ren C:WindowsSystem32sfcfiles.dll sfcfiles.lld” (without quotes)

    10. Copy the hacked file from CD to system32 folder. Type:“copy D:i386pinball.ex_ C:WindowsSystem32sfcfiles.dll” (without quotes and assuming your CD drive is D:)

    11. Type “exit”, take out disk and reboot.

    12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.

    13. Click the top graphic on the DreamPack menu and you will get a menu popup.

    14. Go to commands and enable the options and enable the god command.

    15. Type “god” in the password field to get in Windows.You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.

    Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.

    newer post

    Monday, November 17, 2008

    Shutdown Computer with a Phone

    0 comments
    Shutdown your Computer with a Cell Phone

    It is real. See the video and try..........


    newer post

    How To Speed Up XP

    0 comments
    Speed Up XP
    Here is video clip. See it do the works which is given here to do. Your computer will be speed up....
    <
    newer post

    Monday, November 10, 2008

    iPHONE-3G

    0 comments

    Apple - iPhone - Features - 3G:
    3G technology gives iPhone fast access to the Internet and email over cellular networks around the world. iPhone 3G also makes it possible to do more in more places: Surf the web, download email, get directions, and watch video — even while you're on a call.


    iPhone 3G uses a technology protocol called HSDPA (High-Speed Downlink Packet Access) to download data fast over UMTS (Universal Mobile Telecommunications System) networks. Email attachments and web pages load twice as fast on 3G networks as on 2G EDGE networks. 1 And since iPhone 3G seamlessly switches between EDGE, faster 3G, and even faster Wi-Fi, you always get the best speeds possible.


    iPhone 3G meets worldwide standards for cellular communications, so you can make calls and surf the web from practically anywhere on the planet. And if you're in an area without a 3G network, iPhone connects you via GSM for calls and EDGE for data.
    iPhone already gives you mobile multitasking. But 3G technology lets you multitask in more places — without connecting via Wi-Fi. Since 3G networks enable simultaneous data and voice, you can talk on the phone while surfing the web, checking email, or using Maps. All from your 3G cellular network.

    iPhone 3G delivers UMTS, HSDPA, GSM, Wi-Fi, EDGE, GPS, and Bluetooth 2.0 + EDR in one compact device — using only two antennas. Clever iPhone engineering integrates those antennas into a few unexpected places: the metal ring around the camera, the audio jack, the metal screen bezel, and the iPhone circuitry itself. And intelligent iPhone power management technology gives you up to 5 hours of talk time over 3G networks. 2 That's some of the best in the business.
    hasEML = false;




    ReplyReply All
    JSifyForm("forward_bottom645704434");


    Move...My Mail
    newer post

    Tuesday, November 4, 2008

    McAfee's focus as a one-stop shop

    0 comments
     


    The Web site Dictionary.com defines the word focus as "a central point, as of attraction, attention, or activity." This is an apt description of McAfee's inaugural customer event, McAfee Focus.

    McAfee customers received the message that the company is focused in three areas:


    1. Growth through acquisition. McAfee is intent on becoming a one-stop shop for governance, compliance, and risk management. To this end, the company purchased outside firms like Reconnex, SafeBoot, and Secure Computing. Look for McAfee to continue this trend by buying companies in areas like application security, identity management, IT operations management, and security management.

    2. Product integration. McAfee has two areas for integration: the endpoint (i.e., one agent for security, encryption, network access control, etc.) and its management platform Enterprise Policy Orchestrator (ePO). McAfee wants to surround its customers with broad functionality AND central command-and-control.

    3. Industry relationships. In the past few weeks, McAfee announced partnerships with Commvault, HP, Intel, and VMware. The goal? Make McAfee a development nexus for anything related to security integration.


    These initiatives come right from the playbook of McAfee CEO, Dave DeWalt, a veteran of the software industry. The results of this game plan seem good so far: McAfee reported record revenue of $410 million (27 percent growth) in the third quarter.

    So will this focus and aggressive behavior continue? I expect McAfee to back off the gas pedal a bit to feel its way through muddy economic waters but the company will also capitalize on deflated market capitalization values to acquire more companies and a softening job market to grab top talent. In this growing global recession, McAfee may be one company that is able to swim against the tide.
    newer post

    Inside Windows 7's new desktop

    0 comments
    LOS ANGELES--The differences between Vista and Windows 7 are subtle--sometimes so subtle that they can go unnoticed.

    This point was exacerbated by the fact that the build that developers were given a chance to take home last week doesn't have the new taskbar that represents the most visual difference between Windows 7 and today's Vista desktop.

    Microsoft went to the trouble of shifting all the computer kiosks at the Professional Developers Conference over to Windows 7 on Tuesday. But because the version lacked some of the key visual features, some attendees didn't even notice they were running the newer Windows.

    But Microsoft felt that keeping the user interface features out of the developer build was critical to keeping the features a surprise at the conference. The company's earlier M1, M2, and M3 builds all leaked out, said Chaitanya Sareen, a program manager in the Windows unit.

    As the conference was winding down on Thursday, Sareen and another program manager--Rebecca Deutsch--offered an in-depth look at the changes Microsoft made to the desktop as well as the rationale for them. To get the best understanding of the changes, check out the two embedded videos (apologies for the lack of tripod).

    The new taskbar is, in many ways, more akin to Mac OS X's dock than it is to what most Windows users have seen at the bottom of their screens for years.

    With Vista and all its recent predecessors, there are a host of different icons at the bottom of the screen, with one group representing favorite items, another representing open program windows and a third representing notifications and items that launch at start-up.

    Window 7 aims to do away with most of that redundancy in favor of one collection of large icons that live at the bottom of the screen. The icons represent applications chosen by the user and live there whether an application is running or not.

    The large icons serve several purposes. The icon can, of course, be used simply to switch to or launch an application. It is also home to what is known as a "jumplist," sort of like a mini start menu for each program that can contain a series of actions, a link to recent documents, or even a series of controls that let a user take an action without switching to the program itself.
    "This is the one button to rule them all," Sareen said. A left click opens the windows while a right click or the swipe of a finger on a touch-sensitive machine brings up the jumplist.

    When a program is open, the icon also allows a user to preview that application's open windows. Clicking on a thumbnail naturally brings that window to the front. Hovering over the preview, though, temporarily previews that window as if it were in front, but doesn't actually complete the change--a feature Microsoft is calling "Aero Peek."

    The idea came as the company tried to solve a riddle: what was the perfect size for a thumbnail window? For things like graphical Web pages or a pair of photos, a small representation might do the trick. But when one is trying to, say, flip between two similar Word documents or e-mails, it gets harder.

    "The perfect size of the thumbnail is the actual size of the window," Sareen said. And that's how Aero Peek was born.

    The goal with that feature and others, Sareen said, is to find ways to remove some of the things that make computing harder, what he calls "paper cuts." They aren't bugs, so much as things that are needlessly complicated or nonintuitive.

    "We kind of went on a war against paper cuts," he said.

    The company is also trying to reduce all of those annoying notifications that pop up along the right hand side of the computer. Developers can still write code that makes them appear, Deutsch said, but with each one that pops up, users have the option of disabling all such warnings from that program. The idea is to use social engineering to convince developers to bother the user far less often.
    newer post

    Core Security finds critical Adobe Reader hole

    0 comments
    Core Security finds critical Adobe Reader hole


    A critical security hole in Adobe Reader could allow an attacker to take control of a computer, according to Core Security Technologies.
    The vulnerability affects version 8.1.2 of Reader, Core Security said in a statement issued on Tuesday to coincide with Adobe's planned release of a security update to fix the vulnerability.
    An attacker could put malicious code in JavaScript embedded in a PDF and spread that via a Web site or e-mail. Once the file is opened, the code could manipulate the program's memory allocation pattern and trigger the vulnerability to execute arbitrary code with the privileges of the user.
    Damian Frizza, a CoreLabs researcher, discovered the vulnerability in May while he was investigating a similar vulnerability in a different PDF viewer application called Foxit Reader. Core Security immediately reported the new hole to Adobe.
    Adobe representatives did not return a call seeking comment on Monday.
    The complexity of desktop software increases the chances of applications having bugs that result from the implementation of the software, said Ivan Arce, chief technology officer of Core Security.
    "We've seen similar vulnerabilities in JavaScript engines in Adobe software in the past and in other applications," he said. "It's difficult to avoid implementation bugs like this one."
    The fact that both PDF Readers have the same bug indicates that even though vendors are building products with different technologies and code bases, they ought to check for such bugs in their applications when rival software is found to be vulnerable, Arce said.
    Elinor Mills covers Internet security and privacy. She joined CNET News in 2005 after working as a foreign correspondent for Reuters in Portugal and writing for The Industry Standard, the IDG News Service, and the Associated Press.
    newer post

    Yahoo signs up BOSS search partner

    0 comments


    Delver, a search start-up that personalizes search results by paying attention to a person's social connections, has signed up for Yahoo's BOSS (Build Your Own Search Service).

    BOSS lets larger search sites use Yahoo's search results, tailored in any way desired but stripped of any Yahoo branding, in exchange for showing Yahoo ads or sharing revenue. Delver plans to mix those results in with its own technology, which shows results drawn from publicly visible parts of social sites such as profiles, blogs, bookmarks, and videos. Smaller sites and academic projects can use BOSS for free.

    "Leveraging Yahoo Search BOSS allows us to keep focusing on social-graph ranking and indexing, while providing our users with a solution that intelligently mixes social results with traditional Web results," Delver Chief Executive Liad Agmon said in a statement Tuesday.
    newer post

    Saturday, November 1, 2008

    Modify XP System Properties logo

    0 comments
    Modify the Windows XP System Properties logo

    The Windows XP System Properties logo is often changed by computer manufacturers. Hardware vendors use this general system information dialog to brand your computer with their own logo and support contact information.

    In this tip you can learn how you can insert your own logo in the system properties dialog and complete it with your own contact information.

    To invoke the system properties dialog, click the Start button, right-click "My Computer" and select "Properties".

    This will open up your general system information dialog. On our Fujitsu-Siemens Amilo Pro laptop, the Windows XP System Properties logo looks like this :






    If you want to put your own graphic in there, you should create your image in a .bmp graphic file. It's also a good idea to create this bitmap image with the same background shade of gray (RGB: 192, 192, 192) used in the Properties dialog. Otherwise, you risk letting Windows make its own judgments regarding color contrast and background shading.


    The next thing to consider is the image size. The system properties dialog only offers enough real estate for an image of about 180 (wide) x120 (high) pixels. Make sure that you can fit your logo in this area.

    Once you have created your logo and saved it as a .bmp file, copy it over to the system32 subfolder of your Windows system folder. If you don't know where your system folder is :

    >>Click the Start button and select "Run"
    >>In the "open" field, enter "cmd" (without the quotes) and click ok
    >>Windows will open up a dos command window
    >>In the command window, type "set system" (without the quotes)
    >>Look for the line that contains "SystemRoot", this is where your system directory is (generally, the Windows XP system folder is c:\windows)

    Now that you know where your system folder is, copy your logo image file over to the system32 subfolder of your system folder. Then rename your logo image file to oemlogo.bmp

    Additionally you can create a new file in this same folder and name the new file oeminfo.ini

    In this file you can enter your contact information like in the example below :

    [General]
    Manufacturer=Windows Help Central
    Model=ShowCase

    [Support Information]
    Line1=" "
    Line2=" For support, sales, upgrades or questions:"
    Line3=""
    Line4=" Some text to demonstrate the XP System Properties logo"
    Line5=" Windows XP Tips and Tricks "
    Line6=" yadayada"
    Line7=""
    Line8=" +1 (888) 888-888 (voice)"
    Line9=" +1 (888) 888-889 (fax)"
    Line10=""
    Line11=""

    Save and close the file and you are ready. From now on, if someone opens up the system


    properties dialog, your own Windows XP System Properties logo is in there.



    And if someone clicks the "Support Information" button :

    newer post

    Bypass XP Password

    0 comments
    How to Bypass a Windows XP Password Without any Programs

    newer post

    Make your own icons

    0 comments

    It's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.


    Now add type, color, or do whatever you'd like to your image. I like to shrink photos (headshots work best) to 32x32 and simply paste them into my Paint document. When you're finished, open the File menu and click Save As. Use the dialog box to choose where you want to save your file, then give it a name followed by ".ico" (without the quotes), and click Save. (The extension ".ico" tells Windows that it's an icon file.) You just created an icon! Now you can change any shortcut or folder to your own icon—just browse to it on your hard drive.
    newer post

    Friday, October 31, 2008

    THE DETECTIVE TRICK (Mobile Spying)

    0 comments
    Mobile Spying Tricks

    Now you can spy on anyone using your cell phone. Just do the following.
    1. Activate the "Automatic Answer" in the headset profile of your cell phone and set the ringing volume to "Mute"
    2. Short-circuit the left middle and right pins on the bottom of the mobile phone with all connections touching each other this will activate profile "Headset".If you cant do this just keep your earphone connected to mobile.
    3. Now place it under a table in a room and call it. Now you can use your phone for checking out what people are talking about in a room. Just call on your phone.
    4. The phone receives the call without ringing and you can listen to what people are saying.
    newer post

    Increase RAM virtually

    0 comments
    Increase RAM virtually
    1. To boost performance of your PC or to increase RAM virtually,
    Right click on My Computer Icon on Desktop

    >> Go to Properties
    >> Go to Advanced
    >> Go to Performance - Settings
    >> Go to Advanced
    >> Go to Virtual Memory

    - Change Keep the initial size same as recommended and maximum size double of it then restart your system. It will improve speed of windows and you can play some games which require higher RAM.


    2. To Minimise all the application and running windows press the "Windows + M " key together
    newer post

    Lock a Folder in Windows XP

    0 comments
    Lock a Folder in XP

    To Lock a folder in windows XP without any software. Follow the steps Below.

    1. Make a Folder in C drive rename it as "abc" without quotes.
    2. Now open Command Prompt from Start Menu.
    3. Type "attrib +s +h C:\abc" without quotes and press enter.
    4. This command will Make your folder invisble and it can not be seen even in hidden files and folders
    5. To make it visible again type "attrib -s -h C:\abc"
    6. You can lock any other folder also by changing the location C:\abc to address of your folder.
    newer post

    Windows Tricks : Changing Startup and Log-off screens

    0 comments
    Changing Startup and Log-off screens

    Startup Screen
    1. Create a 320x400 bitmap in the root directory and name it LOGO.SYS
    2. You can use LOGOW.SYS file in the Windows directory as a starter

    Logoff Screens
    1. There are many system file that constitutes Lofoff screen.
    2. They are actually bitmaps 320x400 that just have a different extension
    3. The hidden file in the root directory LOGO.SYS is the startup logo.
    4. There are two files in the Windows directory.
    5. LOGOW.SYS is the Wait while Shutting down ... screen.
    6. LOGOS.SYS is the You may now shut-off or Reboot screen.
    7. Make two new image files of your chice in Paint and name it as LOGOW.SYS and LOGOS.SYS and replce the actual windows file by this two.
    8. But make sure they should be of the same size
    newer post

    Thursday, October 30, 2008

    The Benefits of Hyper-Threading on Core i7 Processors

    0 comments

    Sometime next month, computer enthusiasts will finally be introduced to Intel's highly anticipated Nehalem-based Core i7 processors, which, among other things, are said to deliver a new level of performance, over the capabilities of Intel's current Core 2 offering. There have been many leaked and confirmed details regarding the technical specifications of Intel's next-generation desktop processors, but one of the most interesting features has to be the Hyper-Threading Technology, which has been enabled on AMD's processors for quite some time now.

    window.google_render_ad();
    Looking to find out just how significant the new technology will be to the performance level of Intel's new processors, the guys over at Vr-zone have posted a set of benchmark results, meant to reveal the difference in performance when the Hyper-Threading is turned on, in comparison with that of when it isn't enabled. As it turns out, this new feature (at least on Intel's Core processors) does deliver a slight boost in performance, but only for multi-threaded applications.

    In order to make sure they used only the latest and best, the test platform was made of an X58 platform, a Core i7 processor, and an HD 4850 X2 graphics card, pieces of hardware that you aren't likely to find in shops these days. The software platform included the 3DMark Vantage CPU benchmark, Crysis Warhead, Far Cry 2 and CineBench 10. At a first glance, the figures might indicate that enabling HT on Core i7 can negatively impact the performance results of gaming applications. However, that's only because Crysis Warhead and Far Cry 2 aren't all that fond of multi-threads.

    On the other hand, 3DMark Vantage and CineBench 10 managed to improve their performance while the Hyper-Threading technology was turned on, recording a boost of 34.1% and 16.6%, respectively. Basically, unless you are not dealing with a multi-threaded gaming application, Core i7's new feature won't really help with your high-end gaming.
    newer post

    Windows Vista Run with 0 (Zero) RAM

    0 comments
    Windows Vista Run with 0 (Zero) RAM

    That's right! Windows Vista can run using a total of zero system memory. Well, bear with me, it will all make sense in the end. When it first introduced Windows Vista, Microsoft faced criticism because of the system requirements associated with the new platform. And the truth of the matter is that Vista is nothing short of a resource hog. The latest operating system from the Redmond company will eat right through CPU cycles, and will swallow every last bit of Random Access Memory you can throw at it. Vista will hesitate little to consume all the resources at its disposal in order to deliver the high-end performance level and user experience synonymous with the Wow.
    The system requirements for Vista are divided according to SKU. There are the recommended minimum hardware requirements valid for Windows Vista Home Basic and Starter editions, and then the standard is raised when it comes to the Home Premium, Business, Enterprise and Ultimate SKUs. According to Microsoft, Vista can go as low as an 800-MHz 32-bit (x86) or 64-bit (x64) processor and 512 MB of RAM. But this does not mean that users cannot feed some 3.5 GB of RAM into 32-bit editions of Vista and up to 128 GB in the 64-bit versions.
    But as you can see from the screenshot included at the bottom of this article, Vista can function with zero RAM. I know, it does sound illogical, but then again... And no, it is not an example of my Photoshop skills at work, it is a genuine screenshot from Vista. It has become a sort of a reflex for me to go for either Ctrl + Alt + Delete or for Ctrl + Shift + Esc, when Windows freezes. And this is exactly what happened. With the small mention that Windows Task Manager had a small surprise for me. Windows Vista was apparently using no RAM and no CPU. No handles, no threads, processes, up time or page file. No kernel memory, paged or not paged. And a total of zero RAM both cached and free, out of my 2 GB of physical system memory. Now I know that asking Vista to run on zero RAM is a tad too much from Microsoft, but they could have lowered the bar to something more acceptable than a minimum of 2 GB. Because if you think Vista will run smooth with 512 MB of system memory or 1 GB under all scenarios, and whatever workload you throw at it, you are sadly mistaken.
    newer post

    Slow Shutdown

    0 comments
    Slow Shutdown


    Some people have noticed that they are experiencing a really slow shutdown after installing Windows XP Home or Professional. Although this can be caused a number of ways, the most clear cut one so far is happening on systems with an NVidia card installed with the latest set of drivers. A service called NVIDIA Driver Helper Service is loading up on start up and for whatever reason doesn't shut itself down properly. The service isn't needed and can also increase the amount of memory available to your system. Here is how to disable it.


    1: Go into your Control Panel

    2: Select Administrative Tools and then click on Services

    3: Right click on the file "NVIDIA Driver Helper Service" and then select STOP.

    4: To stop this loading up every time you boot up your PC Right click it again and select properties - then where the option "Startup Type" is shown - make sure it is set at Manual like we have shown in the image below.
    newer post

    NTFS vs. FAT

    0 comments
    NTFS vs. FAT

    To NTFS or not to NTFS—that is the question. But unlike the deeper questions of life, this one isn't really all that hard to answer. For most users running Windows XP, NTFS is the obvious choice. It's more powerful and offers security advantages not found in the other file systems. But let's go over the differences among the files systems so we're all clear about the choice. There are essentially three different file systems available in Windows XP: FAT16, short for File Allocation Table, FAT32, and NTFS, short for NT File System.

    FAT16
    The FAT16 file system was introduced way back with MS–DOS in 1981, and it's showing its age. It was designed originally to handle files on a floppy drive, and has had minor modifications over the years so it can handle hard disks, and even file names longer than the original limitation of 8.3 characters, but it's still the lowest common denominator. The biggest advantage of FAT16 is that it is compatible across a wide variety of operating systems, including Windows 95/98/Me, OS/2, Linux, and some versions of UNIX. The biggest problem of FAT16 is that it has a fixed maximum number of clusters per partition, so as hard disks get bigger and bigger, the size of each cluster has to get larger. In a 2–GB partition, each cluster is 32 kilobytes, meaning that even the smallest file on the partition will take up 32 KB of space. FAT16 also doesn't support compression, encryption, or advanced security using access control lists.

    FAT32
    The FAT32 file system, originally introduced in Windows 95 Service Pack 2, is really just an extension of the original FAT16 file system that provides for a much larger number of clusters per partition. As such, it greatly improves the overall disk utilization when compared to a FAT16 file system. However, FAT32 shares all of the other limitations of FAT16, and adds an important additional limitation—many operating systems that can recognize FAT16 will not work with FAT32—most notably Windows NT, but also Linux and UNIX as well. Now this isn't a problem if you're running FAT32 on a Windows XP computer and sharing your drive out to other computers on your network—they don't need to know (and generally don't really care) what your underlying file system is.

    The Advantages of NTFS
    The NTFS file system, introduced with first version of Windows NT, is a completely different file system from FAT. It provides for greatly increased security, file–by–file compression, quotas, and even encryption. It is the default file system for new installations of Windows XP, and if you're doing an upgrade from a previous version of Windows, you'll be asked if you want to convert your existing file systems to NTFS. Don't worry. If you've already upgraded to Windows XP and didn't do the conversion then, it's not a problem. You can convert FAT16 or FAT32 volumes to NTFS at any point. Just remember that you can't easily go back to FAT or FAT32 (without reformatting the drive or partition), not that I think you'll want to.
    The NTFS file system is generally not compatible with other operating systems installed on the same computer, nor is it available when you've booted a computer from a floppy disk. For this reason, many system administrators, myself included, used to recommend that users format at least a small partition at the beginning of their main hard disk as FAT. This partition provided a place to store emergency recovery tools or special drivers needed for reinstallation, and was a mechanism for digging yourself out of the hole you'd just dug into. But with the enhanced recovery abilities built into Windows XP (more on that in a future column), I don't think it's necessary or desirable to create that initial FAT partition.

    When to Use FAT or FAT32If you're running more than one operating system on a single computer (see Dual booting in Guides), you will definitely need to format some of your volumes as FAT. Any programs or data that need to be accessed by more than one operating system on that computer should be stored on a FAT16 or possibly FAT32 volume. But keep in mind that you have no security for data on a FAT16 or FAT32 volume—any one with access to the computer can read, change, or even delete any file that is stored on a FAT16 or FAT32 partition. In many cases, this is even possible over a network. So do not store sensitive files on drives or partitions formatted with FAT file systems.
    newer post

    Tiny Monitor Fends off Microprocessor Bugs

    0 comments
    Tiny Monitor Fends off Microprocessor Bugs


    Researchers at the University of Michigan have developed a tiny monitor that will look for bugs in microprocessors.The researchers call the technology “semantic guardian,” reports InfoWorld. When the semantic guardian senses that something is amiss, it kicks into safe mode and slows the processor down in order to avoid a crash.Insight 64 analyst Nathan Brookwood […]
    newer post

    Tiny Monitor Fends off Microprocessor Bugs

    0 comments
    Tiny Monitor Fends off Microprocessor Bugs

    Researchers at the University of Michigan have developed a tiny monitor that will look for bugs in microprocessors.The researchers call the technology “semantic guardian,” reports InfoWorld. When the semantic guardian senses that something is amiss, it kicks into safe mode and slows the processor down in order to avoid a crash.Insight 64 analyst Nathan Brookwood […]
    newer post

    Flaw Puts Hackers Closer to the Money

    0 comments
    Flaw Puts Hackers Closer to the Money


    In the dark spirit of the day’s news, we learn that if your bank doesn’t fail, criminals could siphon off your money. And no, not those Washington or Wall Street hacks.Princeton University researchers say they’ve found four Web sites vulnerable to the cross-site request forgery (CSRF) attack, reports Dark Reading. An attack on INGDirect.com’s […]
    newer post

    Help to your friend's computer from own computer

    0 comments
    ধরূণ, আপনার বন্ধু থাকে প্রবাসে আর আপনি বাংলাদেশে। তার দরকার আপনাকে ও আপনার instant help .আপনি online থেকে এ কাজটি করতে পারেন.এজন্য অবশ্যই আপনার ও আপনার বন্ধুর কম্পিউটারে ইন্টারনেট সংযোগ এবং টিমভিউয়ার সফটওয়্যার ইনষ্টল থাকতে হবে।
    http://www.teamviewer.com/

    সফটওয়্যারটি চালু করলেYour Details অংশে ID এবং Password এর ঘর আসবে আর এ ঘরে আপনার বন্ধু যে ID ও Password ব্যবহার করতেন তা আপনাকে জানিয়ে দিতে হবে যেহেতু আপনি আপনার বন্ধুর কম্পিউটার নিয়ন্ত্রণ করবেন তাই Remote Support নির্বাচন করে Partner Details এর ID অংশে আপনার বন্ধুর দেওয়া আইডি লিখে Connect Partner বাটনে ক্লিক করুন। এরপর পাসওয়ার্ড চাইলে আপনার বন্ধুর দেওয়া পাসওয়ার্ড লিখে Log On বাটনে ক্লিক করুন- কিছুক্ষণের মধ্যে আপনার বন্ধুর দেওয়া আইডির টাইটেলে একটা উইন্ডো আসবে, যা আপনার বন্ধুর কম্পিউটারের ডেক্সটপ। এখন আপনি উক্ত ডেস্কটপের মাধ্যমে আপনার বন্ধুর কম্পিউটারের সম্পূর্ণ নিয়ন্ত্রণ করতে পারবেন। ।যেমন:File transfer,ফোল্ডার তৈরী, ডিলিট করা, ডাউনলোড করা, ছবি দেখা ,টাইপ করা, ইত্যাদি´, বিষয়টি বেশ মজার।
    newer post

    Google Becomes OpenID Provider

    0 comments
    Google Becomes OpenID Provider

    Google is joining the OpenID movement, announcing its support for the OpenID 2.0 protocol, reports CNET News. Now GMail users can sign in to sites such as Plaxo, AOL, MySpace and Zoho using existing Google account information rather than setting up a new account.Yahoo and Microsoft have jumped on the bandwagon, too.While you cannot log […]
    newer post

    Wednesday, October 22, 2008

    Clear the Internet Cache in IE 7

    0 comments
    To clear your internet cache in Internet Explorer


    1. Open Internet Explorer



    2. At the top of the screen, click on Tools.



    3.

    In the Tools menu, click on Internet Options... If you do not see the tools menu hold down the alt and t key on the keyboard.








    4.

    In the Internet Options window, find the Temporary Internet Files section. Click on Delete.













    5.

    A Delete Browsing History window will appear. Click on the Delete Files... button.





    6.
    A verification screen will then come up. Click Yes to delete the files.






    7. When this is finished, you can click Close, then click OK on the Internet Options window, this will return you to your web page.
    newer post

    Thursday, October 16, 2008

    DV-2010

    0 comments
    সঠিক ভাবে ডিভি ২০১০ ফরম পূরন করুন

    — মেহেদী আকরাম


    যুক্তরাষ্ট্রকে অনেকই স্বপ্নের দেশ মনে করে আর তাই প্রতি বছর লক্ষ লক্ষ মানুষ ডিভি লটারীর জন্য অনলাইনে আবেদন করে। কিন্তু দোকানে বা সাইবার ক্যাফেতে যারা ডিভি করে থাকেন তাদের বেশ কিছু সতর্কতা অবলম্বন করা উচিৎ। ঠিকঠাক মত ডিভির ছবি না হলে শুরুতেই আপনার আবেদন বাতিল হয়ে যাবে তাই ছবির ক্ষেত্রে বিশেষ সতর্কতা অবলম্বন করতে হবে। ডাইভারসিটি ভিসা (ডিভি) ২০১০-এর অধীনে এবারও ফরম পূরণ করতে হবে অনলাইনে। ফরম পূরণ করে পাঠানো যাবে ২ অক্টোবর থেকে ২ ডিসেম্বর দুপুর ১১টা পর্যন্ত। www.dvlottery.state.gov থেকে ডিভি ২০১০ পূরণ করতে হবে। ডিভি পূরণে সবচেয়ে বেশী নজর দিতে হবে ছবির দিকে। ছবি সঠিক না হলে ফরম বাতিল হয়ে যায়। এছাড়া আবেদনকারীর প্রদত্ত সকল তথ্যই নির্ভূল হতে হবে।


    ছবিঃ ছবি উচ্চতা ও প্রস্থ উভয়ই হবে ৪ ইঞ্চি, যার রেজুলেশন হবে ১৫০ পিক্সেল। আপনি যে ছবি ব্যবহার করবেন তা অবশ্যয় ৬ মাসের পুরানো হতে পারবে না। ছবিতে ব্যাক্তির মূখ ক্যামেরার দিকে চোখ করা থাকবে এবং উভয় কানসহ বুকের উপরিভাগ থেকে মাথার চুলসহ দেখা যাবে। ছবিতে ব্যাক্তির মাথা ছবিতে শতকরা ৫০ থেকে ৬৯ ভাগ থাকতে হবে। ছবি পটভূমি হবে হাল্কা একটি রঙের। পটভূমিতে কোন দৃশ্য বা মূল ছবির ছায়া থাকবে না। ছবিতে ব্যক্তির চোখে চশমা থাকতে পারবে কিন্তু চশমার উপরে আলোর প্রতিফলন গ্রহনযোগ্য নয়। ছবিতে আলাদা কোন কিছূ আঁকা যাবে না। ছবিতে অতিরিক্ত ডট প্যাটার্ন, ফোকাস, উজ্জলতা, রঙ ব্যবহার করা চলবে না। ছবিতে ধার্মিক টুপি ব্যাথিত কোন পদমর্যাদার টুপি ব্যবহার করা যাবে না।সম্প্রতি ঢাকাস্থ মার্কিন দূতাবাস এক সংবাদ বিজ্ঞপ্তিতে দূতাবাসের পক্ষ থেকে সকল প্রতারণা এড়িয়ে চলার পরামর্শ দেয়া হয়েছে। দূতাবাসের পক্ষ থেকে ডিভি ২০১০ লটারিতে অংশগ্রহণে ইচ্ছুক প্রার্থীদের অন-লাইনে রেজিস্ট্রেশন প্রক্রিয়া সম্পন্ন করার সময় কিছু নির্দেশনা অনুসরণের পরামর্শ দেয়া হয়েছে।


    ডিভি ২০১০ আবেদন সংক্রান্ত নির্দেশনা ঢাকাস্থ মার্কিন দূতাবাসের ওয়েবসাইট htp://dhaka.usembassy.gov থেকে পাওয়া যাবে।


    মূল ঠিকানা: www.dvlottery.state.gov

    এ্যাপলিকেশেন ফর্ম: www.dvlottery.state.gov/application.aspx

    ছবি কেমন হবে (বিস্তারিত): www.dvlottery.state.gov/photo.aspx
    newer post

    পার্সোনাল কম্পিউটারে কিভাবে আপনার গোপন ফাইলটি নিরাপদে রাখবেন?

    0 comments
    পার্সোনাল কম্পিউটারে কিভাবে আপনার গোপন ফাইলটি নিরাপদে রাখবেন?
    লিখেছেন বোরহান ঊদ্দিন মুন্না

    আপনার বাড়িতে অন্যান্য ইউজারের হাত থেকে আপনার প্রয়োজনীয় ফাইলটি নিরাপদে বা লুকিয়ে রাখার জন্য এই টিপটি খু্বই উপকারী। একটু ভাবুন যদি একটি বাড়িতে অথবা একটি অফিসে অনেকজন ইউজার একই কম্পিউটার ব্যবহার করে, তাহলে এর মধ্যে আপনার ব্যক্তিগত ফাউলগুলো ১০০% নিরাপত্তার কোন ব্যবস্থা থাকে না। আপনি হয়তো বা ৩য় কোন সফ্‌টওয়্যার ব্যবহার করবেন আপনার ফাইলটির নিরাপত্তার জন্য, কিন্তু আপনার মাইক্রোসফ্‌ট উইন্ডোজ এ এর কোন প্রয়োজনই নেই। আপনি উইন্ডোজ (এক্সপি, ২০০৩, ভিসটা) এ এট্রিব কমান্ড ব্যবহার করে সহযেই আপনার ফাইল অথবা ফোল্ডারটির এট্রিবিউট (রিড অনলি, হিডেন) চেন্ঞ্জ করতে পরেন, এবং আপনার ফাইলটিকে দিতে পারেন ১০০% নিরাপত্তা।

    নিন্মানুসারে ফাইল/ফোল্ডারের এট্রিবিউট (Attribute) এডিট করতে হয়:-

    ১. এটা করার জন্য আপনার কম্পিউটারটি অবশ্যই এডমিনিস্ট্রেটরে (Administrator) লগ ইন হতে হবে।

    ২. এবার আপনা আপনার যে ফাইল/ফোল্ডারটি হাইড করতে পান তার পাথটি ভাল করে দেখে নিন। (উদাহরণস্বরুপ ধরুন আমার কম্পিউটারে D:\ ড্রাইবে borhan নামে একটি ফোল্ডার আছে)

    ৩. প্রথমে start মেনু থেকে run ডায়ালগ বক্স খুলুন, এর মধ্যে সিএমডি (cmd) লিখে ok চাপুন।

    ৪. এবার টাইপ করুন এই কমান্ডটি "attrib +s +h D:\borhan" এবং ইন্টার চাপুন কমান্ডটি এক্সিকিউটের জন্য।

    ৫. এই কমান্ডটি আপনার D:\ ড্রাইব থেকে borhan নামের ফোল্ডারটি হাইড করে ফেলবে। আপনি পরীক্ষা করে দেখতে পারেন।

    ৬. অন্য কেই এই ফোল্ডারটি আনহাইড করতে পারবে না। "Show hidden files and folders" অপশনটি ব্যবহার করে ও নয়।

    ৭. আপনি যখন ফোল্ডারটি আনহাইড করতে পান তখন আবার কমান্ড প্রম্পট খুলুন এবং এই কমান্ডটি "attrib -s -h D:\borhan" টাইপ করে এন্টার চাপুন, তাহলে আপনার ফোল্ডারটি আনহাইড হয়ে যাবে।

    (বিশেষ দ্রষ্টব্য:- আপনি যদি কোন ফোল্ডার হাইড/আনহাইড করতে চান তাহলে আপনাকে কমান্ড দেওয়ার সময় শুধু ফোল্ডারের নাম টাইপ করলেই চলবে, কিন্তু যদি কোন ফাইল হাইড/আনহাইড করতে হয় তাহলে আপনাকে কমান্ড দেওয়ার সময় ফাইলটির নাম সহ ফাইল টাইপটি লিখতে হবে। যেমন:- .jpeg , .mpeg , .rar , .doc etc)।






    Name:- Borhan Uddin

    Phone:- 00218-092-5457142

    E-mail:-
    borhanuddinm@gmail.com স্প্যামবটের হাত থেকে এই ইমেল ঠিকানা সুরক্ষিত আছে। পড়ার জন্যে জাভাস্ক্রিপ্ট অন করুন।

    Website:-
    http://www.borhan.tk/
    newer post
    newer post older post Home

    Delete this element to display blogger navbar