Computer/Network Tips & Tricks, ICT latest and Old useful info, Network/Computer Security Tips & Tricks, General Security/Safety Tips
Friday, March 29, 2013
How To Write Simple HTML Code For Posting Link To Your Blog
HOW TO PROTECT YOURSELF ON FACEBOOK
Previously I wrote about Facebook
Security, if you miss it then read it HERE.
Recently kidnapping has been taken to facebook, read it HERE, am writing/teaching you another trick to protect
yourself online (Facebook). Below are some ways to help you protect yourself
and your Facebook Account from bad guys online, being online is like being in
public, forget the computer or phone you are using.
Tuesday, March 26, 2013
11 Must Have Softwares For Advanced Windows Users
BELOW ARE THE LIST OF 11 MUST HAVE SOFTWARES FOR ADVANCED WINDOWS USERS
This is my #1 favorite software. Vmware helps us in installing multiple Operating Systems over one Operating System. Puzzled??? Well, to simplify things, Vmware allows us to run multiple Operating Systems(called slaves) on our computer. Say you are having Windows 7 installed on your computer as the main Operating System. Vmware runs as an application on Windows 7 and allows us to install other Operating Systems like Windows XP, Linux and 20 other types of Operating Systems. So, you don’t need to boot your computer to change your Operating systems. One Vmware Workstation can accomodate 20 such Operating systems.Wednesday, March 20, 2013
Uninstall Any Program Completely From Your System
Every day we download new softwares and install them on our system, but after some time for different reasons we need to uninstall them. Here in this post I am going to show you different ways to uninstall your program that you don't need any more.
Unable To Access Your Hard Drive or Memory Card?
You might sometimes face this problem;
whenever you connect your drives(hard drive or memory cards) to
your PC it asks for formatting; it flashes a message of Access Denied.
Many of my readers have asked this question. They want to know how to
handle this situation. Sometimes you get a message when you connect your
memory card "Your card is corrupted". Many a times you get a message
like this;
10 Ways to avoid Viruses from your System
I have discussed about Viruses, Worms and Trojans, now I am going to talk about ways to avoid these harmful elements from your system. Viruses exploit your system in some or other way, you need to be very precocious about it. These are definitely easy to avoid but fatal to ignore. So, do not ignore your system. Don't let Viruses harm your system.
Some Windows XP Secrets
I am sharing some secrets of Windows XP. These secrets may or may not apply to newer Windows Operating Systems.
Did Someone Use Your Computer In Your Absence?
Go to start, then run
then type eventvwr.msc
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log.
then type eventvwr.msc
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log.
Difference Between Virus, Worms, Trojan and Spyware
We all have heard the terms
Virus,Worms, trojans and spyware but only a few of us know the
difference between them.We generally consider everything that is
detected by an antivirus as virus but this is not the case.The
antivirus not only provides protection against viruses but it also
protects us from trojans, worms and spywares.All these can be harmful to
your computer hardware and software.Today I will differentiate all
these terms from each other .Ok lets start from the introduction of viruses
How to Hide Files or Folders Using Command Prompt
Do you want to hide some important files?
Do you want to keep some of your folders very confidential that no one can see??
Not even by Changing the View settings to "Show Hidden Files and Folders"?
If YES,
Tuesday, March 19, 2013
Facebook Security For Your Social Life Online
Facebook has recently introduced the new security button on its main navigation panel. You can see it in your Facebook profile. (at right side of Home)
How To Get Rid Of AutoPlay In Windows
Autoplay of media devices has always been a pain in the ass for windows users. It becomes irritating every time when it shows the Autoplay
option whenever we connect any media device to our computer specially
when we connect USB devices to load some files, and it gives you options
of AutoPlay. Fortunately Windows has given the option to disable this autoplay feature. If it is really annoying you, then you must disable it. I am going to list the steps to be followed to disable Autoplay for media devices.
Create Partition Without Formatting Full Disk!
This is a very basic thing, that every other computer user needs to do.
Most of us are well aware about partitioning our hard drive disc using
some third party software and using full OS installation.
There are very few of us who use the given capability of Windows
operating system. Which lets us to partition our hard disk drive
partially, without affecting the current setup of OS and without
completely formatting it.
Tuesday, March 12, 2013
How to Hide email address when sending mail to Multiple Recipients
I know most of you already know this but some don't hence this post
If you like to hide email address from other recipients while sending to multiple recipients, this article will explain how to do. I believe this will be helpful for organization and those who are concerned about Security.
STEPS TO FOLLOW
Whenever you send mail to group of mails, fill the mail address in BCC field instead of To field (leave the To field empty).
BCC is expanded as Blind Carbon Copy.
The receiver will see sender and his address.
He can't see others address.
Easy?
If you like to hide email address from other recipients while sending to multiple recipients, this article will explain how to do. I believe this will be helpful for organization and those who are concerned about Security.
STEPS TO FOLLOW
Whenever you send mail to group of mails, fill the mail address in BCC field instead of To field (leave the To field empty).
BCC is expanded as Blind Carbon Copy.
The receiver will see sender and his address.
He can't see others address.
Easy?
7 Things You Should Know About Online Passwords
As online technology has advanced, so have hackers techniques for getting into your accounts and stealing personal information. Hackers break into computers 2,244 times each day by figuring out weak usernames or passwords,
according to University of Maryland data. If you’re still using the
same password you made up when you opened your first email account, you
are setting yourself up to be a hacking victim. But don’t worry; read on
and learn how to set those Internet geniuses-gone-wrong up for failure
by knowing the essentials about online passwords.
The Top 5 Subjects(Tricks) used by Malicious Spammers
According to the research of websense,
these are the top 5 Subjects used by Malicious Spammers. If you receive an
email with the following subject or similar tricks, Don't click the
links or download the Attachment, if you do, you will end up in malware attack.
10 System Admin Tools to Help You Secure Your Network
System admins are frequently bombarded with security concerns, requests,
alerts, news items, “did you see this?!” emails, and more. Keeping up
with all the aspects of network security can seem like an overwhelming
task, but in this post we’re going to look at ten tools a system admin
can use to help secure their network. Some you may be familiar with,
like network security software, while others may come as a surprise,
like your email client; but all will help you to stay ahead of the bad
guys, keep yourself informed of the latest threats, and maintain the
security of your network.
Tuesday, March 5, 2013
Improve Your Windows Shutdown Speed
This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown. Go to Start then select Run, now Type 'Regedit' and click ok and look for
'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout' Right click and select 'Modify'
Change the value to '1000' and click 'OK', Now select 'HungAppTimeout' Right click and select 'Modify' and change the value to '1000' Click 'OK'
How To Test Your Anti Virus
You have an anti-virus program, how can you test that it really works? This is a good question and it is wise to familiarize yourself with how your anti- virus software behaves when it detects a virus, before it really happens. One quick way to do this is to use the "Renowned" EICAR Antivirus Test File. This is a test file that will cause no damage to your system and still allow you to test if anti- virus tool is awake.
Monday, March 4, 2013
Want to Download Laptop Drivers?
Many people still find it very difficult to download drivers for their laptops, below are some link where you can download almost all brand of laptop drivers from HP, DELL, ASUS, ACER, TOSHIBA, SAMSUNG, etc. Follow these links to get yours, meanwhile you can easily go to the manufacturer's website and click SUPPORT & DOWNLOADS. Check these out
10 Tips & Tricks to Maximize Your BlackBerry's Battery Life
It is well known that the average Blackberry user is always with a SPARE phone, this is due to the short battery life of their Blackberry. Below are some tips to help maximize your battery life, though most of you already know these tips but you have to refresh your memory on these ones.
Saturday, March 2, 2013
5 Ways To Avoid being Hacked
Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people.
Hackers used loopholes in the security of companies to obtain personal information about
people.All you have to Consider to prevent your Password From Becoming Easy Pickings (PFBEP). Some of the thijngs that happened to victims were avoidable. What's scary about this situation is that almost all of us are vulnerable but we can take steps to stop it or reduce it.
Hide Your Hard Disk Partitions
1. First goto start then run and type “diskpart” (without quotes) and hit ENTER
2. Type “list volume” (without quotations)
3. Select the volume of drive you want to hide by this command “select volume3” (without quotes/specified volume number)
4. Then type “remove letter f” (without quotes) (It removes the drive f)
How To Create Undeletable Folder
I know its very old but many of you reading this still don't know it.
Steps
1. Go to start and click run then type cmd and hit ENTER
2. Change to the directory that you want.to create the folder
3. Assume i change to D:
4. So, in Command Prompt, type D: and hit ENTER.
5. Type in this command "md\lpt1\\" without quotes and hit ENTER
6. The folder will now be in your D: drive
7. Go to D: drive in My Computer and try to delete or rename it, you cannot do anything to it.
There are still many names that you can use to name the folder like: -lpt1to lpt9, -CON -AUX etc
Friday, March 1, 2013
How To Create E-BOMB!
Create a File/Folder Without Name
Really cool trick. I used it many times on public computers making everyone think that there's virus in the
computer. All computers were linked so I could do this to all of them.
Subscribe to:
Posts (Atom)