Friday, March 29, 2013

How To Write Simple HTML Code For Posting Link To Your Blog

 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKaAzn8SFaDafdVdxBTcul4Ao8OJhXWjNn5kMECdYIP9WBzfFtg9Um8PmNEPMEAsxrRQzLk-PGXtFwKM2__BNRyHpj9Eak-tdwBbbNozVvh_p381LN9qYpmpzX7dFgmETKYAG4e4szCvQA/s1600/blog01.png
I have noticed most times in some blog where some bloggers try to post a link to their blog by simple click but end up just typing the blog address and readers find it difficult to click it to connect directly to the required blog address. Am writing here just two (2) easy steps to do for your link to be easily accessed by readers of other blogs like Linda Ikeji, Trendy Sturvs, and so on.

HOW TO PROTECT YOURSELF ON FACEBOOK



 https://lh5.ggpht.com/qTjFRAkS4P-5Tfrr_ovb9CbpDcM2DQopnSMqZ_lzsWVLnK-2x649xbULVXma6ulLZido=w705
Previously I wrote about Facebook Security, if you miss it then read it HERE. Recently kidnapping has been taken to facebook, read it HERE, am writing/teaching you another trick to protect yourself online (Facebook). Below are some ways to help you protect yourself and your Facebook Account from bad guys online, being online is like being in public, forget the computer or phone you are using.

Tuesday, March 26, 2013

11 Must Have Softwares For Advanced Windows Users

BELOW ARE THE LIST OF 11 MUST HAVE SOFTWARES FOR ADVANCED WINDOWS USERS
This is my #1 favorite software. Vmware helps us in installing multiple Operating Systems over one Operating System. Puzzled??? Well, to simplify things, Vmware allows us to run multiple Operating Systems(called slaves) on our computer. Say you are having Windows 7 installed on your computer as the main Operating System. Vmware runs as an application on Windows 7 and allows us to install other Operating Systems like Windows XP, Linux and 20 other types of Operating Systems. So, you don’t need to boot your computer to change your Operating systems. One Vmware Workstation can accomodate 20 such Operating systems.

Wednesday, March 20, 2013

Uninstall Any Program Completely From Your System

Every day we download new softwares and install them on our system, but after some time for different reasons we need to uninstall them. Here in this post I am going to show you different ways to uninstall your program that you don't need any more.

Unable To Access Your Hard Drive or Memory Card?

You might sometimes face this problem; whenever you connect your drives(hard drive or memory cards) to your PC it asks for formatting; it flashes a message of Access Denied. Many of my readers have asked this question. They want to know how to handle this situation. Sometimes you get a message when you connect your memory card "Your card is corrupted". Many a times you get a message like this;

10 Ways to avoid Viruses from your System



I have discussed about Viruses, Worms and Trojans, now I am going to talk about ways to avoid these harmful elements from your system. Viruses exploit your system in some or other way, you need to be very precocious about it. These are definitely easy to avoid but fatal to ignore. So, do not ignore your system. Don't let Viruses harm your system.

Some Windows XP Secrets

I am  sharing some secrets of Windows XP. These secrets may or may not apply to newer Windows Operating Systems.

Did Someone Use Your Computer In Your Absence?

Go to start, then run
then type eventvwr.msc

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log.

Difference Between Virus, Worms, Trojan and Spyware

 


We all have heard the terms Virus,Worms, trojans and spyware but only a few of us know the difference between them.We generally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans, worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other .Ok lets start from the introduction of viruses

How to Hide Files or Folders Using Command Prompt

Do you want to hide some important files?

Do you want to keep some of your folders very confidential that no one can see??


Not even by Changing the View settings to "Show Hidden Files and Folders"?


If YES,

Tuesday, March 19, 2013

Facebook Security For Your Social Life Online

Facebook has recently introduced the new security button on its main navigation panel. You can see it in your Facebook profile. (at right side of Home)

How To Get Rid Of AutoPlay In Windows

Autoplay of media devices has always been a pain in the ass for windows users. It becomes irritating every time when it shows the Autoplay option whenever we connect any media device to our computer specially when we connect USB devices to load some files, and it gives you options of AutoPlay. Fortunately Windows has given the option to disable this autoplay feature. If it is really annoying you, then you must disable it. I am going to list the steps to be followed to disable Autoplay for media devices.

Create Partition Without Formatting Full Disk!

This is a very basic thing, that every other computer user needs to do. Most of us are well aware about partitioning our hard drive disc using some third party software and using full OS installation.
There are very few of us who use the given capability of Windows operating system. Which lets us to partition our hard disk drive partially, without affecting the current setup of OS and without completely formatting it.

Tuesday, March 12, 2013

How to Hide email address when sending mail to Multiple Recipients

I know most of you already know this but some don't hence this post


If you like to hide email address from other recipients while sending to multiple recipients, this article will explain how to do.  I believe this will be helpful for organization and those who are concerned about Security.

STEPS TO FOLLOW
Whenever you send mail to group of mails, fill the mail address in BCC field instead of To field (leave the To field empty).

BCC is expanded as Blind Carbon Copy.



The receiver will see sender and his address.
He can't see others address.

Easy?

7 Things You Should Know About Online Passwords

As online technology has advanced, so have hackers techniques for getting into your accounts and stealing personal information. Hackers break into computers 2,244 times each day by figuring out weak usernames or passwords, according to University of Maryland data. If you’re still using the same password you made up when you opened your first email account, you are setting yourself up to be a hacking victim. But don’t worry; read on and learn how to set those Internet geniuses-gone-wrong up for failure by knowing the essentials about online passwords.

The Top 5 Subjects(Tricks) used by Malicious Spammers

According to the research of websense, these are the top 5 Subjects used by Malicious Spammers. If you receive an email with the following subject or similar tricks, Don't click the links or download the Attachment, if you do, you will end up in malware attack.

10 System Admin Tools to Help You Secure Your Network

System admins are frequently bombarded with security concerns, requests, alerts, news items, “did you see this?!” emails, and more. Keeping up with all the aspects of network security can seem like an overwhelming task, but in this post we’re going to look at ten tools a system admin can use to help secure their network. Some you may be familiar with, like network security software, while others may come as a surprise, like your email client; but all will help you to stay ahead of the bad guys, keep yourself informed of the latest threats, and maintain the security of your network.

Tuesday, March 5, 2013

Improve Your Windows Shutdown Speed



This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown. Go to Start then select Run, now Type 'Regedit' and click ok and look for
'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout' Right click and select 'Modify'
Change the value to '1000' and click 'OK', Now select 'HungAppTimeout' Right click and select 'Modify' and change the value to '1000' Click 'OK'

How To Test Your Anti Virus



You have an anti-virus program, how can you test that it really works? This is a good question and it is wise to familiarize yourself with how your anti- virus software behaves when it detects a virus, before it really happens. One quick way to do this is to use the "Renowned" EICAR Antivirus Test File. This is a test file that will cause no damage to your system and still allow you to test if anti- virus tool is awake.

Monday, March 4, 2013

Want to Download Laptop Drivers?




Many people still find it very difficult to download drivers for their laptops, below are some link where you can download almost all brand of laptop drivers from HP, DELL, ASUS, ACER, TOSHIBA, SAMSUNG, etc. Follow these links to get yours, meanwhile you can easily go to the manufacturer's website and click SUPPORT & DOWNLOADS. Check these out

10 Tips & Tricks to Maximize Your BlackBerry's Battery Life

It is well known that the average Blackberry user is always with a SPARE phone, this is due to the short battery life of their Blackberry. Below are some tips to help maximize your battery life, though most of you already know these tips but you have to refresh your memory on these ones.

BlackBerry Batteries

Saturday, March 2, 2013

5 Ways To Avoid being Hacked


Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people.
Hackers used loopholes in the security of companies to obtain personal information about
people.All you have to Consider to prevent your Password From Becoming Easy Pickings (PFBEP). Some of the thijngs that happened to victims were avoidable. What's scary about this situation is that almost all of us are vulnerable but we can take steps to stop it or reduce it.

Hide Your Hard Disk Partitions



1. First goto start then run and type “diskpart” (without quotes) and hit ENTER
2. Type “list volume” (without quotations)
3. Select the volume of drive you want to hide by this command “select volume3” (without quotes/specified volume number)
4. Then type “remove letter f” (without quotes) (It removes the drive f)

How To Create Undeletable Folder



I know its very old but many of you reading this still don't know it.

Steps
1. Go to start and click run then type cmd and hit ENTER
2. Change to the directory that you want.to create the folder
3. Assume i change to D:
4. So, in Command Prompt, type D: and hit ENTER.
5. Type in this command "md\lpt1\\" without quotes and hit ENTER
6. The folder will now be in your D: drive
7. Go to D: drive in My Computer and try to delete or rename it, you cannot do anything to it.
There are still many names that you can use to name the folder like: -lpt1to lpt9, -CON -AUX etc

Friday, March 1, 2013

How To Create E-BOMB!






A deadly virus Ebomb is a simple attack that enables multiple applications in victims pc just to annoy him.
Although there are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and

Simply open NOTEPAD and TYPE

Create a File/Folder Without Name



 Really cool trick. I used it many times on public computers making everyone think that there's virus in the
computer. All computers were linked so I could do this to all of them.