Monday, September 6, 2010
Increase Your Productivity with Microsoft Office 2010
Office 2010 is known as office web app and features Word, excel, PowerPoint and OneNote. Office starter 2010 comprises Microsoft word starter 2010 and Microsoft Excel starter 2010. Another most stunning feature of Office 2010 is that it features office mobile 2010. Here you will get SharePoint Workspace Mobile, Presentation Companion, Conversation View, and many more. Following is a list of new features in OFFICE 2010:
• Ribbon interface and Backstage View across all applications
• New animations in PowerPoint 2010
• Social connector
• The Word 2007 Equation editor will become common to all applications, replacing MS Equation 3.0
• New Smart Art templates
• Background Removal Tool
• Letter Styling
• Screen Capturing and Clipping tools
• Live collaboration functions
• Jump lists in Windows 7
• New text and image editing effects
Comprising all these stunning features, Microsoft Office 2010 is certainly an obvious choice of all the computer users. For Microsoft Office Support, you can dial 1.866.515.9918.
Friday, September 3, 2010
Enjoy Secure Computing with Router
Now let’s have a look at what router exactly is. Router is a piece of hardware which is used to route and forward information from one location to another. Large corporations employ a central computer system to act as a router. With this computer, all the computers of the company are connected to one network. This is very useful as it allows group participation and collaboration on large projects. In addition it also allows to connect all of the company's resources at one central location. Employees from different locaiton can remain connected and share files and perform communication task with this high end technology.
When it comes to internet, with a router you can send and receive data very quickly from one location to another. To upload and download also a routeris used. In short, to get connected to internet, router is required. In most of the modern router comes with added firewall feature which protect the users from hackers.
Thursday, September 2, 2010
How to use your keyboard properly?
Let’s have a look at the tips below:
You must place your keyboard at elbow level and the upper arms should be relaxed at your sides.
The position of the keyboard should be right in front of you keeping the spacebar as the centering point.
Keep your wrists straight and use a light touch for typing.
If you are working for long hours, you must relax your arms and hands while you are not typing.
You should also take short breaks every 15 to 20 minutes.
It is also suggested not to rest your palms or wrists while typing.
These are some common tips for using your keyboard properly. To fix computer problem you can contact technical support service provider at 1.866.515.9918.
Tuesday, August 31, 2010
How to Run Disk Defragmenter?
Go through the following steps to run the Disk Defragmenter utility:
1. Go to Start menu, and open My Computer.
2. Right-click on the drive that you want to defragment in the My Computer dialog box.
3. Click the Tools tab in the Properties dialog box.
4. In the Defragmentation section, click Defragment Now.
5. Disk Defragmenter dialog box will open. In the dialogue box choose the particular Volume at the top of the screen, click on Analyze option.
6. Once analyzing is done, the Disk Defragmenter will display a message mentioning whether you need to defragment the Volume or not.
7. Click Defragment to clean up your PC. Now the Disk Defragmenter utility will organize files and place them as per program and size.
If you find any difficulties, dial 1.866.515.9918 to get technical support from a computer repair service provider.
How to check for Windows updates?
1. Click the Start button and in the search box, type Update, then click Windows Update.
2. You will find Check for updates in the left pane, click on it and let Windows look for the latest updates for your PC.
3. You will get a message if any important updates are available. The message may also tell you to review important updates. Click the message and choose the important updates to install.
4. Click Install updates.
5. Next, you need to read and accept the license terms, and then click Finish.
6. If you are asked for an administrator password, type the password.
7. There are some updates that require restarting windows after finishing installation.
If you find any problem, you can consult a Technical Support service provider for getting Windows Support. You can also dial 1.866.515.9918 to talk to a Microsoft certified expert.
Monday, August 30, 2010
How to Remove Spyware?
As technology advances, hackers have also evolved their viruses and spywares to give computer users tougher and harder times. Spyware comes through the internet and have many forms like as an antivirus security suite, a toolbar, etc... While the user browses a webpage, spyware pops up and shows a face report regarding the user’s computer. People fall for this fake report and install the spyware on their computer. And they get infected unknowingly. However, like every problem has its solutions, you can also fix it quite easily. Like several other viruses, these types of viruses are removable too. But it needs some time and a lot of patience to perform this.
For spyware removal, you can consult a computer repair service provider. There are many such computer services companies that provide excellent tech support so that your computer can remain free from viruses and spyware and other malicious objects. You can also try some anti-spyware suites for removing and protecting your computer from spyware’s. Some of these are Ad-Aware Free, HijackThis, SmitFraudFix, Malwarebytes, and SuperAntiSpyware.
Friday, August 27, 2010
The Best Way to Protect Hard Drive
When it comes to checking hard drive or any other computer component, opting for technical support is the best option. Browse internet, you will find a number of computer services provider that offer tech support to the users for hassle-free computing. They also have various support plans and as per your requirements you can choose any of their plans.
Chkdsk (Chkdsk.exe) is a command which could check the volumes for problems. Defragmentation of the hard drive of your computer on a regular basis with the help of computer repair service provider is also a very good way to protect hard drive. In fact, defragmentation is a must and it should be done in regular basis. This is because, when you uninstall or remove a program file, smaller fragmented files are left behind even though the program is uninstalled. This gradually slows down the computer.
Thursday, August 26, 2010
Tips to Fix RunDll Errors
Before getting into the tips to fix RnDll errors, let’s have a look what these RunDll errors are? Dll files or Dynamic-link library files are operating system files same as exe files used to write smaller programs. These files does not get loaded in the RAM, instead they reside in the hard-drive itself.
In most of the cases, we get RunDll error because of virus infection. The Dll files are infected and made it corrupted. To resolve this issue, the best suggestion is to install antivirus software. Run full scan and make your computer virus free. The next thing you should do is run a registry check with registry checker software. There are many third party software in the market. You can choose any of them.
Is a Dll file totally missing? You can copy it from your operating system CD. Restart the computer your OS will do the Dll file registering. The “regserver32” command is also a very good option for registering the correct Dll file. If still the problem persists, it is better to get in touch with a technical support service provider.
Wednesday, August 25, 2010
How to Solve XP Setup Won’t Recognise The Hard Drive Problem?
I am not really saying that the propositions given above are not worth a consideration but what would you do if you see that even after trying the hard drive on a different mother-board and the same mother board but with a different power supply does not let you pin-point the problem? The hard drive works fine with a different mother board and with a changed power supply it does not make a difference. The problem is more common with the newer SATA hard drives.
The actual problem lies in the non detection or a corruption of the hard drive drivers loaded in the mother board usually with the help of a “mother board CD” or a separate driver CD which came with the computer. Look for the SATA/RAID Controller driver which will resolve the problem with the non-detected drive. Restart the computer once again, boot from the OS CD and try to install the OS on the hard drive and this time it should be detected in a proper way. One thing that I should mention here that if the hard drive is not detected during setup of the OS then it will not show up in the BIOS either.
If still facing a problem then call online technical support service provider and ask for computer help.
Monday, August 23, 2010
Quick Fix Tips to Speed up Your Computer
Make sure there is enough free space in the hard disk. In many cases, low disk space is the reason for PC slowdown. Delete old and unneeded files. You can also use a disk clean up tool which will allow you to clear caches and the temporary internet files. You should also uninstall unneeded and unused programs.
Virus might be another reason for PC slow down. Install an antivirus and run full scan on your system to check whether there is virus in your computer or not. If your antivirus software can’t heal your computer, you can talk to a professional virus removal support service provider.
Sometimes, computer can’t perform at its best due to registry errors. You must remember that computer registry is one of the most critical components of your PC. So, to sort the Windows registry issues out you must install registry cleaning software. There are many such software that are meant to clean and fix the registry.
You must remember that your computer is needs regular care to perform at its best. If you regularly clean up your PC, fixed your registry issues and use a good antivirus, your computer will always perform at its best.
Sunday, August 22, 2010
How to solve PC Restarting Problem at Boot
There could be a few reasons for which the PC keeps restarting continuously. The main problem might be that the registry has become corrupted. If an application is trying to write something in the registry and that is not happening properly due to certain reason then this happens.
So what do we do to stop it? Restart the pc and keep tapping F8 on your keyboard as soon as you see the initial beep screen or the OEM logo. This will take you to a windows advanced boot options menu. Here you need to choose Last Known Boot Configuration and hit Enter. This should resolve the issue. If the problem persists, you need to get ready for more troubleshooting.
The first thing now would be to run a system file checker using the command sfc scannow. In case this doesn’t work then run a windows repair using the OS CD. Well if that also doesn’t solve the issue which in fact it should then it’s the ultimate step.
- Click Start
- Settings (Skip on Windows XP)
- Control Panel
- System (May need to click "Switch to classic")
- Advanced Tab
- Press Settings button
- Uncheck "Automatically restart"
Friday, August 20, 2010
How to Boot in Safe Mode in Windows XP Operating System?
- If you want to start the Windows XP OS in safe mode, reboot the computer and tap the F8 key until the Windows Advanced Options Menu appears.
- When the black screen appears, use the keyboard up-down keys to select the 'Safe Mode' option.
- Hit 'Enter', and the computer will reboot in safe mode.
- Once you resolved the problem, restart the computer and start it in the normal mode.
- Close all running programs and click on 'Start' and open 'Run' dialogue box.
- Write 'msconfig' in the box and click 'OK'.
- The 'System Configuration Utility' window will be displayed.
- Select the 'BOOT.INI' option.
- Check the '/SAFEBOOT' option, with clicking on the 'MINIMAL' radio button.
- Click on 'Apply' and then 'OK.'
- Reboot the computer in Safe Mode.
Thursday, August 19, 2010
Tips to Format a Hard Drive in Mac OS X
Let’s have a look at the following tips to format a hard drive in MAC OS X.
- Open the system drive and go to Open Applications, then go to Utilities. Here you need to double click the "Disk Utility" program. You will get a window showing a list of all the drives that are currently mounted on the particular computer.
- Then you need to select the particular disk that needs to be formatted. Technically you cannot format the startup disk until and unless the computer has booted from the Install Disk. You should also keep one thing in mind that if you format the startup disk, all data stored on the disk will be permanently erased.
- Now you need to click on the "Erase" tab to the right of the list of drives.
- A new window will now display the options for erasing the hard drive.
- Choose the Volume Format from the pop-up list.
- You also need to name the hard drive.
- Click the erase button.
- You will see a window which will ask you to verify the erase procedure.
- Click the erase button to start the erasing process.
- As the process is over, the drive will be shown with the name (that you have given) on the left side of the window with the list of drives. You can also see them on the desktop of the Macintosh computer as well.
Wednesday, August 18, 2010
Which is the Best Graphics Card?
Let’s see which one gives the best bang for the buck under different price tags.
1. If you have a budget of approx. $55, then you can opt for ATI Radeon HD4650. Why? It’s the best solution for budget constraint gamers. With this card, you can play games at 1280x1024performances in most games, 1680x1050 with lowered detail.
2. If you have a slightly bigger budget of approx. $75, you can check out NVIDIA GeForce Gt240. With this card, you can play at 1680x1050 performances in most games, 1920x1200 in most games with lowered detail.
3. With a budget of approx. $105, you can opt for either ATI Radeon HD4850 or NVIDIA GeForce GT250. With any of these two cards, you can play at Exceptional 1680x1050 performance in most games, 1920x1200 in most games with lowered detail.
4. With an extended budget, you can look for ATI Radeon HD5770. This card will play at Great 1920x1200 performances in most games.
5. If you happen to have a bigger budget, you can opt for NVIDIA GeForce GTX470, with which you can play at Exceptional 1920x1200 performance, Good 2560x1600 performance in most games.
6. For those with a grand budget, you can choose between ATI Radeon HD5870 or NVIDIA GeForce GTX480 which plays at a Good 2560x1600 performance in most games, or ATI Radeon HD5970 for a Great 2560x1600 performance.
Which is the best graphics card – is certainly a very tricky question. One thing is for sure; whichever card you choose, it’s going to be worthy upgrades form the existing graphics card you have. But the more you spend, the more you will thrust. Happy gaming!
Tuesday, August 17, 2010
What is Motherboard?
Motherboard is basically a printed circuit board. You will find thousands of printed circuits in it which convey information or data from one part of the computer to another. A motherboard also features numerous slots and attachments so that other pc components can be attached.
Typically, in the motherboard of a desktop computer you will find microprocessor, main memory, and other essential components. In addition, other important components such as external storage, controllers for video display are also attached via cables. However, in most of the latest motherboards now integrate some of these peripherals into it. On board graphics card is a good example in this context.
The most vital part of the motherboard is the CPU slot. There are a number of motherboard brands available in the market and you can select any of them. ECS Elitegroup and Redfox are some of the most trusted brands. You can consult a remote PC repair company to get assistance in this regard.
Friday, August 13, 2010
Android Phones, Not Immune to Malicious Objects
What it does- This Trojan has been identified in sending SMS to premium numbers (numbers which charge) without the user’s knowledge and the money gets charged from the users account which in turn is collected by the criminals.
Though a few android attacks were heard last year but this one seems to be the best one. This Trojan has already affected many cell phones and related devices according to Kaspersky resources. For virus removal support, you can ask for technical support.
Kaspersky urges that “users pay close attention to the services that an application requests access to when it is being installed. That includes access to premium rate services that charge to send SMSs and make calls.”
Jay Nancarrow, a Google spokesman, said Android applications must get permission from the user before doing things like sending text messages or making phone calls. “We consistently advise users to only install apps they trust,” Mr. Nancarrow said in a statement. “In particular, users should exercise caution when installing applications outside of Android Market.”
Thursday, August 12, 2010
How to Run Android Apps on Your Windows PC?
Now, one can experience the Android edge on home or office computers too. How? To do this , one needs to download and install the Android Software Development Kit. This Kit is even used by developers to create more Apps and utilities for the Android OS.
Once the kit is downloaded and installed a few settings needs to be configured and a virtual Android Phone will be ready on the computer. But there is a limitation- This virtual android phone can’t be used as a normal phone to make/receive calls. Moreover this virtual android is much slower than the actual one.
How do you install Android Apps on Your Windows PC? Before installing the kit, one needs to make sure that Java is installed on one’s pc. It also needs to be checked, that the installed Java is the latest version. If not then the latest java updates needs to be installed. Once the Java update is complete the Android SDK starter package needs to be installed.
The installer comes in a zip file, unzip it and install it. Once the installation is complete you are now ready to create a virtual android device. Once you are done configuring the Android , its time to access the Android Market. For further tech support, talk to a computer services company.
Wednesday, August 11, 2010
LCD Monitor Problem – Some Useful Tips
My first advice will be, check your computer with another Monitor and then check it is working or not. If the monitor is working fine that mean the motherboard and the VGA is working fine. The problem is with the computer monitor. And also it will confirm that the connection between the Graphic Processing Unit and motherboard is working fine.
Now if the External monitor is not working then the problem is with the GPU. You need to check that. Open the back panel of the laptop or if you are having a desktop then open the CPU and check the GPU. You can replace that. Hopefully, the problem will get resolved.
Another important key is the inverter which provides voltage to the LCD. Now if that has gone bad in that case you need to take the PC to the computer repair center and change the inverter. If you get a faint image then the problem is with the back light of the computer. You need to replace that as well. And it is easy fix.
Tuesday, August 10, 2010
Display Problem in Monitor, How to Fix?
In laptop computers, the monitor size ranges from as low as 8 inch to a mighty 17 inch; while in desktop computers, the monitor size ranges from 14 inch to a whooping 32 inch or more.
But like all other electronic devices, monitors too can get bad due to course of time or due to user ignorance. One of the most common problems that you might face with the monitor is related to bizarre patterns or lines in them. This problem usually crops up if the display cable that connects the monitor to the computer goes bad of if there is some wrong setting in the monitor display menu or the desktop settings menu in the control panel.
Try to fix the problem by searching and rectifying the causes. If everything fails or the monitor is broken or is found out to be a manufacturing problem, it is better to consult the manufacturer of the monitor for further support.
Friday, August 6, 2010
Outlook doesn't display zip files, How to Fix?
In this article we have discussed about the steps which will help you to resolve ‘outlook doesn’t display zip files’ issue and before we do so we need to know why it happens. When we send an attachment, outlook sees this folder as a folder while windows operating system sees these folder as an ordinary file and folder. And the problem occurs.
To resolve this problem, you need to restart outlook and compressed folders also need to be disabled. You can do that from the start option type the command:
a) regsvr32 /u zipfldr.dll
regsvr32 /u cabview.dll
To restore the feature again follow the command
b) regsvr32 zipfldr.dll
regsvr32 cabview.dll
This will help you to resolve the issue. The process certainly is very simple and easy to follow.
Thursday, August 5, 2010
How to Work Out Printer ERROR 50.4?
While printing in laser printers we might face such an error message like Error 50.4 with all stuck up. There are many other printer problems. You might actually have to switch off and then switch on the printer but still the error messages might reappear on the display. Different error messages, be it a plain text or a number like the one we are discussing here is very significant to the understanding of the printer-fault.
In this case, it is the fuser of the printer, the mechanism by which the toner melts on the media is the reason of the printer problem. Thinking how can the fuser go bad? It is mostly due to the line voltage. After long usage, the wire windings in the fuser go bad and there might be a sudden spike in temperature in the fuser.
The necessary thing to do at this point of time is to change the power source. Try a different wall outlet and remove spike busters or power strips that could be present in between. Connect the power supply plug directly to the wall outlet.
It is a possibility that even after changing the fuser the problem still persisted not letting you print anything. The problem in such a case is an f.e.t. transistor on the circuit board of the printer and that is again something you cannot fix if you are not very technically savvy and have soldering equipment handy. You might have to replace the printer by calling the manufacturer if it is within warranty.
You can talk to a remote tech support provider for getting help.
Wednesday, August 4, 2010
Hard Drive Noise, What to Do?
If you hear any weird noise while the drives are working, you should not overlook it as this may lead to a hardware problem resulting in the malfunction of the drive. Some examples of weird noise from the hard disc drive and cd/dvd drive are:
• Sounds like claking/metal tapping
• Sounds like studding access data
• Sounds like metal moving around
• Buzzing Sound
• Clicking Sound
• Whizzing Sound
• Screeching Sound
• Grinding Sound
• Tickling Sound
Tuesday, August 3, 2010
Mouse Pointer Moves Too Slow or Too Fast?
Usually we use 2 – click button mouse. There is a certain mouse which has 3 click buttons too. But the 2 click ones are the most popular. One is the left click and the other is the right click. The left click is used mostly while the right click is used for special functions. The left click is used mainly for pointing and selecting purpose while the right click is used for getting an alternate menu related to that content.
But what is a mouse pointer then? When we move a mouse we see an arrow which helps in pointing…that is the mouse pointer.
Its movement can be controlled from the control pane. In the control panel page choose mouse and open it to get a properties page. In it under pointer options one can reduce or increase the speed of the pointer.
In case, the pointer is very slow or very fast it can be controlled from the mouse pointer properties page.
If changes in the mouse properties page don’t resolve the issue then one might need to look into the mouse drivers (if there is any driver then). One can go ahead and uninstall the mouse drivers from the add/remove programs page. Once done, restart the pc and then try to look for an updated driver from the manufactures website.
One last step which can be done is unchecking the “enhance mouse precision” option under the pointer options in mouse properties page. For further tech support, one can talk to an expert.
Monday, August 2, 2010
How to Recover Data from External Hard Drive?
Data recovery from external hard drive is not so difficult and there are many computer services company that offer data recovery support. It is also not uncommon to see the usage of software for external hard drive data recovery. Many try to recover the lost data of their external hard drive with these softwares which might be challenging and time consuming as well.
External hard drives might be damaged for various reasons such as mishandling, improper disconnection of the drive, unexpected shutdown of system, power surges or failure, etc. sometimes, data could also be deleted accidentally. Computer repair companies have expert technicians who are experienced in external hard drive data recovery and they are talented enough to recover data from various types of external hard drives such as FireWire, USB (Universal Serial Bus), eSata, etc.
Since there are a number of tech support providers that offer data recovery services, it is always suggested to scrutinize their expertise and charges before selecting any one of them. You can also browse internet to learn about the track record of the particular company.
Friday, July 30, 2010
How to Install RAM in Computer?
To install RAM do the following:
* You also need to place the RAM in the slot properly.
Thursday, July 29, 2010
Tips to Configure Error Reporting in Windows XP
Typically, in case of an error, a dialog box is displayed prompting to report the problem to Microsoft. If you click on the send report option, technical details about the problem are sent to Microsoft over the Internet. An Internet connection is required to use the feature. You can also cancel this clicking on don’t send option.
How to access the settings for the reporting feature? The process is stated below:
* Click Start.
* Right-click My Computer, then click Properties.
* Click the Advanced tab.
* Click Error Reporting.
How to configure the error reporting? In Windows XP operating system, error reporting option is enabled by default. You can disable it clicking “Disable error reporting.” If you want to report only the critical errors, select the “But notify me when critical errors occur” check box. Option is also there to report errors only for chosen programs. To avail this, click “Choose Programs” option and click “All programs in this list”. To select error reporting for specific program, click “Add” and select the program with browse option.
Wednesday, July 28, 2010
How to Deal with Virus?
So the big question is how to deal with virus? Using a powerful antivirus software is a very good choice. There are many antivirus software available in the market which help you to protect your data and private information. To hack your computer, viruses and spyware take help of system bugs or errors. And these antivirus software resolve all kinds system problems swiftly and safely.
Since there are many antivirus software available in the market, it is very hard for an individual to choose the best one. AVG, Norton, Avast, Avira, Microsoft Security Essentials, Macafee, Nod32, trendmicro, Symantac, etc. are some of the top names in this regard. You can start with their trial versions. If you are satisfied, then you can buy them. There are many PC repair companies which also offer Virus removal support.
Tuesday, July 27, 2010
Increase Virtual Memory in Windows XP for Better Performance
Windows XP is a multi tasking operating system and to run multi tasks, a virtual memory is created when there is a shortage of RAM. To create this virtual memory, a part of hard drive is used. Now the question is how to increase the virtual memory. You can ask for remote tech support to sort this problem.
Following are the steps to increase virtual memory:
1. Click Start, and then click Control Panel.
2. Click Performance and Maintenance, and then click System.
3. On the Advanced tab, under Performance, click Settings.
4. On the Advanced tab, under Virtual memory, click Change.
5. Under Drive [Volume Label], click the drive that contains the paging file that you want to change.
6. Under Paging file size for selected drive, click to Custom size check box. You can enter the amount of memory you would like to reserve for Virtual memory by entering the initial and maximum size.
7. Click Set
8. When you are prompted to restart the computer, click yes.
You must remember one thing. There is always a minimum and maximum limit of the virtual memory. It is very important to choose a correct virtual memory. The minimum limit of virtual memory is 1.5 times of the Ram size and the maximum limit of virtual memory is 2 times of the actual RAM size.
Monday, July 26, 2010
How to Turn Off Autorun in Windows XP
Do the following:
1. Click on Start button in Windows and open the Run dialogue box.
2. Write gpedit.msc in the search box.
3. You will find Administrative Templates under Computer Configuration.
4. Expand Administrative Templates.
5. Click on System.
6. You will find Turn Off Autoplay on the right hand pane.
7. Double click on Turn Off Autoplay option.
8. Under Turn Off Autoplay properties select the Enabled option and select the drive that you want to Turn off autoplay.
9. Click on Apply and Ok.
If you need technical support in this regard, talk to a PC expert.
Thursday, July 22, 2010
Ultra Low Power Athlon II X2 270u Hits Market In Quarter 3
Also it has a 2MB cache and is compatible with AM3 motherboards. It is expected that Athlon II X2 270u will hit the market in quarter 3 of 2010.
Are you thinking, what would be the price of Athlon II X2 270u? The price of this product is in higher side. AndAthlon II X2 270u will be available in the market at $150.
Do you need technical support to resolve any computer related issues? You can talk to a help desk specialist.
Tuesday, July 20, 2010
No Sound in Windows XP, What to do?
If there is a sound card installed, go to video and game controllers category, and check whether the card is showing or not. You can run the Diagnose and fix sound playback issues. If you find the hardware devices are not detected or not working, fix it.
If the issue still persists, you need to update drivers. First, update the operating system of the Windows. Then install software from the device manufacturer. For more help regarding sound problem in Windows XP, you can talk to a computer help provider. There are many remote computer repair companies that assist you to resolve these types of issues.
Internet Safety Tips
In many cases, it is seen that the users forget to log out from their account. This could be a dreadful mistake as your personal and confidential information could be revealed to another user. So, whether it is your home computer or public computers, if you login don’t forget to logout of that account when your job is done.
New users use simple passwords like “password” or “123” so that they can remember it. But remember that it increases the risk of your account to be hacked. So, it is strongly recommended to use passwords having alpha numeric and special characters.
Can’t you remember the URLs of the sites? You don’t require remembering them. Bookmark pages and your browser will remember them.
Sometimes you may get emails stating that you have won a prize. Don’t get fooled by these types of mails. Don’t open emails from unreliable source. More importantly, never open the attachments from these types of sources as they may have viruses.
For more assistance on internet safety and computer help, you can talk to an expert.
Monday, July 19, 2010
Antec’s 1200W PSU, a Popular Choice
With new gaming titles coming up round the corner, gaming enthusiasts are looking for new high-end graphics card for their gaming purposes. But some of the new graphics card requires additional power to run efficiently. A normal power supply won’t be able to handle the extra power required by the new graphics card. For this reason, it is important to upgrade the existing power supply unit of the computer with a bigger one, which will be able to handle these tasks effortlessly and efficiently.
This is where Antec’s new power supply unit comes into view. This new PSU has a rating of 1200W and has an 80mm fan inside it. This new PSU comes in two forms. One is a normal one, while the other one is an OC version. This is for those who want to do heavy over clocking in their computer. For any assistance on PSU or other computer help, talk to a PC expert.
Following is the specifications and list of connectors for this PSU:
Thursday, July 15, 2010
Wireless Network - the Best Way to Remain Connected
To enjoy home wireless network, first you need to choose the equipment. There are many internet stores where you can get these equipments. You need to buy a Wireless router as well as a computer with built-in wireless networking support. You can also opt for a wireless network adapter. Remember, a Broadband Internet connection is also a must. The function of a wireless router is to convert the signals that come across your Internet connection into a wireless broadcast.
While setting up wireless router, you will be temporarily disconnected from the internet. To connect the wireless router, you need to set the cable modem. Then you need to attach the wireless router to the modem. During this time, ensure that the modem is connected to the Internet. Once everything is done, the computer will be wirelessly connected to your router.
Setting up wireless network might listen to very complex, but actually the process is very simple. If you find any difficulty during Wi-Fi Set Up, you can talk to computer help providers who offer tech support.
How to Add Borders in Objects and Pictures in a Word Document?
Now select the color, style and line weight of the border. Now click the object Effects button to further enhance the border. For example you can put a shadow effect or a refection.
Now learn how to add borders to a table.
Open a word document and select the table in which you want to add borders. Now go to Tables Tools Design tab in the Table Styles group and click the arrow next to Borders. Then select the placement of borders. For instance you can add borders around every cell of the table or just outside it. If you want to try out more options then click on Borders button. You will find a dialog box that says Borders and Shading, now select the portion where you want border and choose the other border attributes. Then select “OK”
Wednesday, July 14, 2010
How to Use a Memory Card?
Memory card are available in various shapes and formats as they are made to suits different capacities. According to computer repair experts you should not end up buying a wrong memory card therefore your primary source of information should be device user’s manual on which the memory card is used. You also need to back this up with some sources from the internet.
While choosing a memory card you need to match the memory card or format the device. Specific portable device requires a particular memory card. You should only use the type of the format mentioned in the user guide of the device. Usually you cannot tell that this is the kind of memory you actually need. For example the formats like Memory Stick Duo, PRO- HG Duo and PRO duo all have the same size and shape. You also need to take a note of storage capacities and speed. Now prepare the memory card that you need use with the device. You need to format the new memory card if using it for the first time. Be careful to insert and remove the card properly so that you do not damage it.
Tuesday, July 13, 2010
Are You Aware of Apple iTunes Accounts Hack?
Apple confirmed the same too that 400 iTunes users had their accounts hacked in the weekend. This was done by a Vietnamese developer Thuat Nguyen to increase his apps rating in iTunes.
So what the developer did actually? Nguyen gamed the App Store ratings in the Books category, by purchasing his own apps using hacked iTunes accounts. At one point, the developer's apps occupied 42 of the top 50 apps sold in the Books section, and users reported purchases of up to $1000 with their accounts. The developer gained access to hundreds of accounts, used those accounts to buy his apps, and then watched as those apps were artificially inflated on the "top sellers" list of the App Store.
Apple says that these 400 users count to 0.00003% of users daily. However Apple has urged users to change their password immediately. It has also been requested to these users who think their accounts have been compromised to call their banks and cancel these credit card accounts. According to Apple the ITunes server cannot be compromised and haven’t been too. Apple says these users fell pray to phishing.
After this, Apple has announced that the CVV numbers will be asked for sure as that will prove that the users are actually with the credit cards.
Wednesday, July 7, 2010
How to Change Local Area Connection Settings in Windows?
• Click on “Start”
• Now go to “Control Panel”
• Click on “Network and Internet Connection”
• Click “Network Connection”
• Select the connection whose settings you want to change
• Under “Network Tasks”, click on “Change settings for this connection”
• Local area connection properties dialog box will open up
• From here do the necessary changes by selecting the desired option
• Click “Apply”
• Click on “OK” to save and exit
Tuesday, July 6, 2010
DUAL SCREEN EBOOK LAPTOP – A COMPETITION TO IPADS?
Here comes the dual screen ebook laptop – a completely new definition of laptop from Toshiba. A slim and light weight gadget, this can give a stiff competition to iPads. Although it is difficult to predict the magnitude of its success at this point, however it has all the features and characteristics to make it a grand success.
To start with the specifications, this neat piece of slim machine weighs only 819 grams and it is more like an iPad on a Windows platform. It opens vertically like a book and double spread pages on the internet can be read comfortably. It fully capitalizes on the facility of dual monitor, meant for viewing for large and spread out contents. The second screen incorporates the virtual keyboard for the input of data. So a physical keyboard is non-existent. It consists of two 17.8 centimeters dual mutitouch display. The screens have a LED backlight and the processor used is U5400 from Pentium. It has 2 GB of primary memory (RAM) and 62 GB of SSD (solid state drive) as the secondary storage device. It is better than a normal hard-drive because it doesn’t have any moving parts, which are present on the normal hard-drives. It is completely based on semiconductor-based electronics. It is silent and has a lesser access time and latency time. According to Toshiba, a simple sweep of the hand is enough to drag and drop content from one screen to the other. According to Toshiba, you can actually chat face to face with its high speed mobility features.
However, we have to see what sort of configuration is necessary for dual screen monitor viewing on the “display properties” page of the Windows operating system. Is there any display glitch? The time will tell.
Monday, July 5, 2010
Gigabyte GV-N470OC-13I - A review
Following are some of its features:
* It is powered by NVIDIA GeForce GTX 470 GPU 2
* Supports PCI express
* DirectX11
* Open GL 3.2 Support
* 1280MB GDDR5 memory and 32 bit interface
* Supports Nvidia Pure Video Technology
* Dual link DVI support
* 3-way NVIDIA SLI support
* NVIDIA PhysX Technology
* NVIDIA Cuda Technology
* HDMI 1.3a Support
* 7.1 digital surround sound
* RoHS Compliant
* Compatible with Windows 7
* Certified for Windows Vista
* High-Bandwidth Digital Content Protection (HDCP) support
* Shader Model 5.0
* 40nm Technology
* Interactive ray Tracing
Well the only fair part with this card is the competitive price. So, it’s just time to tell whether this card will stay or get perished.
Saturday, July 3, 2010
ISPs and Internet Connection Speed
Friday, July 2, 2010
All that You Need to Know About Recycle Bin
If data is deleted and is laid in recycle bin, then the data can be restored by right-clicking on the file in the recycle bin and then choosing ‘Restore’. Once you do that, you will find the deleted file back to its location.
On the other hand, if you want to completely clear the recycle bin of its contents, then just right-click on Recycle Bin and Choose ‘Empty Recycle Bin’. This will clear the contents of the recycle bin.
By default, in windows XP, the size of recycle bin is 10% of the size of your HDD. That means, if you have a HDD of 50 GB then you will have a recycle bin space of 5 GB.
Now if you want to increase the size of the recycle bin, then right click on the recycle bin, go to properties and then General. Here you can change the size of the recycle bin.
Thursday, July 1, 2010
MAC OS X WITH A VIRUS DETERRENT
Although it is an appreciable step towards securing the computer OS against malicious software but it is still in the rudimentary form and it does not protect against a lot of other MAC related malware no matter how less in number they are. The illustration given below is the security alert that you might expect from the OSX.RSPlug.A malware embedded in the FlashPla.dmg if you visit some untrustworthy sites.
Tuesday, June 29, 2010
Wireless and Routers
Now we have workgroup-level 802.11n wireless routers from Buffalo Technology, D-Link Systems, Edgecore Networks and Netgear. These devices were extremely easy to set up, often requiring only the setting of an IP address to get the local computer and wireless client to communicate to each other. They all had basic router functions, such as port forwarding and a firewall. And without exception, each router had all the latest security features, such as Wi-Fi Protected Access, WPA2 and WPA2-PSK certification, in addition to Wired Equivalent Privacy 64-bit and 128-bit encryption.
Now a number of tests have been conducted comparing each of these routers.
- It was found that each of the routers performed best over a particular distance.
- Each of the routers has different strengths and is best suited for a particular implementation, also depending on the number of users and how far they need to communicate.
- The routers were also compared according to the ease of setup and making changes to the settings.
- Lastly these were compared according to their prices.
Let us discuss them one by one.
The Nfiniti Wireless-N Essential High Power Router and Access Point (WHR-HP-G300N):
It is from Buffalo Technologies, it is the smallest and lightest router in this series. At a half a pound and an inch wide, an administrator should be able to easily find a place for the Nfiniti.
It has 10/100 ports for the local-area network and wide-area network connections. The practical limit for the Nfiniti is only 100 megabits/sec. This is because the wireless traffic eventually must go out of one of the wired ports. However, the radio performed well within that constraint. It came within 3 percent of that limit with a single user going from Ethernet to wireless and within 1 percent when sending packets the other way. It did just as well in the 10-user test as in the mixed 802.11g and 802.11n test, and it lost no significant bandwidth. It had a top performance at a distance of 80 feet and an effective throughput of 6.91 megabits/sec.
The Nfiniti’s retail price of $70 is a good one, considering its radio’s power and overall ease of use. It would do well for any workgroup that has AOSS devices to connect or has a mix of 802.11g and 802.11n users.
D-Link’s DIR-825 Xtreme N Dual Band Gigabit Router:
It is from D-Link Systems and comes in a bright white case. One unique feature of D-Link is the SharePort, a USB port in the back that can be connected to a printer or external drive for access without the need of a computer. This feature is pretty useful in a workgroup environment.
D-Link has two independently controlled radios to support the 2.4 GHz and 5 GHz bands. When both are operational, the router can optimize bandwidth use by various kinds of traffic.
It is fastest at 40 feet, churning out an effective transfer rate of 13.96 megabits/sec. D-Link has set the list price for the DIR-825 Xtreme N Dual Band Gigabit Router at $200.
This router would be good for a closely grouped set of users who have a variety of media they access wirelessly.
SMCWBR14S-N3 Barricade N:
It is from Edgecore Networks and can adequately meet a workgroup’s basic wireless needs. The Barricade N has 10/100 ports for its local-area network and wide-area network connections. Its top performance was at a distance of 60 foot, producing an effective throughput of 10.68 megabits/sec.
The Barricade N SMCWBR14S-N3 from EdgeCore Networks has a list price of $60. It would perform decently for a workgroup that has basic routing needs at close distances and doesn't have too much traffic at once.
Netgear ProSafe Wireless-N VPN Firewall (SRXN3205):
It is from Netgear and they are all packed inside a sturdy metal case that you can mount on a wall or rack. The ProSafe’s antenna array has, in addition to the two dipole antennae, a patch antenna in between. That allows the ProSafe to boost the signal in the direction the antenna faces, which can be especially useful if your implementation has long-distance users in roughly the same direction. When combined with the dual radios in the 2.4 GHz and 5 GHz frequencies, you end up with a formidable broadcast device, especially at greater distances.
In addition to router and firewall functions, the ProSafe also have extensive virtual private network capability, both for IP security and Secure Sockets Layer. Its best performance is at 100 feet with an effective throughput of 3.16 megabits/sec.
Netgear is selling SRXN3205 for $259. That is a good price for a router that has all the capabilities and power of the ProSafe. It would do well in an environment with many users who are at moderate to long distances from the router.
Friday, June 25, 2010
What is Storm Worm?
The Storm Worm began infecting mostly private computers in Europe and U.S. in 2007. In that year this worm virus accounted for 8% of malware infections globally. The virus spread through e-mails as an attachment. When an attachment is opened, the malware installs the wincom32 service, and injects a payload, passing on e-mail to destinations encoded within the malware itself. According to some antivirus company reports, it may also download and run the Trojan.Abwiz.F trojan, and the W32.Mixor.Q@mm worm. The Trojan disguises on the spam with names such as "postcard.exe" and "Flash Postcard.exe," with more changes from the original attack as it mutates. Some of the known names for the attachments include:
- Postcard.exe
- ecard.exe
- FullVideo.exe
- Full Story.exe
- Video.exe
- Read More.exe
- FullClip.exe
- GreetingPostcard.exe
- MoreHere.exe
- FlashPostcard.exe
- GreetingCard.exe
- ClickHere.exe
- ReadMore.exe
- FlashPostcard.exe
- FullNews.exe
- NflStatTracker.exe
- ArcadeWorld.exe
- ArcadeWorldGame.exe
- with_love.exe
- withlove.exe
- love.exe
- frommetoyou.exe
- iheartyou.exe
- fck2008.exe
- fck2009.exe
Wednesday, June 23, 2010
Bluetooth Technology: Know How it Works
Bluetooth technology is a popular technology these days and has found its use in different ways like mobile phones, hands free headsets, printers etc. The wireless technology works on different international standards and 802.11 happens to be the most common of the wireless IEEE standards. The Bluetooth is based on the 802.15 IEEE standards and is used for short distance wireless communication based on a Personal Area Network (PAN) which is actually the adhoc mode of connection, in other words it is a wireless connection without the involvement of a router in between devices. We should not confuse it with the normal 802.11 wireless. It supports upto eight devices in the Bluetooth network. It supports a data transfer of 24 Mbit/s for the version 3 type Bluetooth device and the class1 type supports upto 100 meters of distance for transmission. The PAN, SPP, DUN, HID, HCRP are the Bluetooth profiles supported in Windows XP,
However we have seen that Bluetooth devices need maintenance as well. A Bluetooth icon should always be there for an active Bluetooth device connected to the computer. If the Bluetooth device does not get detected then make sure that the option “Turn discovery on” check-box is checked in the Options tab when you click the Open Bluetooth Settings tab after right clicking the Bluetooth icon in the system tray. “Allow Bluetooth device to be connected to this computer” and “Alert me when a Bluetooth device wants to connect to this computer” are the options in the same “Options” tab that needs to be checked. Removing the Bluetooth device should remove the entries in the device manager which can be reloaded in a proper way. A Bluetooth device uses 500 milliamps of power when connected to a USB port and that makes it necessary for the proper power distribution at the ports otherwise the device will fail to get detected. Make sure that a cordless phone or a true Wi-Fi set-up or microwave ovens are not emitting radio waves which can hinder the proper functioning of the Bluetooth device. Double click the Bluetooth icon in the control panel and see whether the Bluetooth device is listed under the Device tab or not. From here we can click on the Add button to add a Bluetooth device to the computer. For devices to get detected the two devices should “pair” properly. When two devices pair properly they exchange passwords and device information properly. Troubleshooting can be done at the device manager level or in the registry as well but it is better to contact a technician for that.
One point to note is that even if a PAN is used for connectivity an APIPA (automatic Private IP Addressing) address is taken up by the computer that is an IP starting with 169.x.x.x. It uses TCP /IP for communicating and all this happens without the presence of any router !! The peripheral other than the computer, for example a Bluetooth printer should have a similar IP address. Make sure that the printer is configured first for Bluetooth and then you can run the Bluetooth installation wizard from the control panel of the computer.