Tuesday, 30 July 2013

How To Boot Computer More Faster.


Often people say that their computers take a lot of time to start.There are many reasons of this problem. I am telling you a few tricks which is able to be useful to resolve this problem.

1st Trick to boot computer faster

Click Start Menu => Run or Search Programs and Files =>Enter.
Type “msconfig” and then press Enter.
Now go to the “Startup” tab.
You will see a list of programs in Startup which also start when we start computer.
All program boxes will be Enable all. So you Disable all unnecessary or unwanted programs except antivirus.  
Click on apply and restart your computer. You will feel that your PC is faster than before.

2nd Trick to boot computer faster.

1. Right click on “My computer” and select “Manage

2. Click on “Device Manager”. You will see a list of hardware on right side.

3. If you are not using (USB/COM ports) then disable them.

4. Restart your Computer. It will give you more better performance in booting. 

Seed Up Your Menus.

It is very best trick of windows. After apply you will feel excellent fast speed of your menus. This tricks does not effect on windows startup or browsing speed. It just effects on your menus e.g start program menu, right click menu etc. Follow these steps.

Go to Start menu and click on Run
Type “Regedit” and click “Ok”. You will find registry editor window.
Click on “HKEY CURRENT USER” then click on “Control Penal” and finally click on “DESKTOP
You will see a list on right side & search for “Menushowdelay
Double click or right click on “Menu Show Delay” to modify the value data.
Change the value data of value name to “0” and click ok.

It is done. Enjoy an excellent menu opening speed.

(Important Note. You can adjust value according to your requirements. Minimum value is “0” but normally you can use 50 to 150 )

Disable Turn Off Option In Windows Xp


Disable turn off option and “alt+f4” option

Regedit => hkey_current_user => software =>microsoft =>
Windows => policies => explorer

Then go to right side and by right click of your mouse create new dword value with name noclose and after creating click on it and give value data 1.

And reboot your pc ..now your turn off option is disabled ..to enable it again ..go to that directory by regedit ..and simply delete that created noclose and log off your user and log in again ..your turn off again working.

Optimize Display Settings In Windows XP For Better Performance

Windows XP can look sexy but displaying all the visual items can waste system resources.

To Optimize:


1- Go to Start
2- Click Settings
3- Click Control Panel
4- Click System
5- Click Advanced tab
6- In the Performance tab click Settings
7- Leave only the following ticked:
  •  Show shadows under menus
  •  Show shadows under mouse pointer
  •  Show translucent selection rectangle
  •  Use drop shadows for icons labels on the desktop
  •  Use visual styles on windows and buttons

Basic Network Utilities.

Later in this Artical, you will use information and techniques that are based, in part, on certain techniques anyone can perform on her own machine. There are network utilities that you can execute from a command prompt (Windows) or from a shell (UNIX/Linux). Many readers are already familiar with Windows, so the text’s discussion will execute the commands and discuss them from the Windows command prompt perspective. However, it must be stressed that these utilities are available in all operating systems. In this section, you will read about IPConfig, ping, and tracert utilities.

IPConfig
The first step in studying networks is get information about your own system. To accomplish this factfinding mission, you will need to get to a command prompt. In Windows XP, go to the Start menu,select All Programs (in Windows Vista or 7), then choose Accessories. You will then see an option called Command Prompt. (For Windows 2000 users, the process is identical, except the first option is simply called Programs rather than All Programs.) Next, type in ipconfig. (You could input the same command in UNIX or Linux by typing in ifconfig once inside the shell.) After typing ipconfig and pressing the Enter key, you should see something much like what is shown in picture (IP Config).
IP Config
This command gives you some information about your connection to a network (or to the Internet). Most importantly, you find out your own IP address. The command also has the IP address for your default gateway, which is your connection to the outside world. Running the IPConfig command is a first step in determining your system’s network configuration. Most commands that this Artical will mention, including IPConfig, have a number of parameters, or flags, that can be passed to the commands to make the computer behave in a certain way. You can find out what these commands are by typing in the command, followed by a space, and then typing in hyphen question mark, -?. Picture (IPConfig help) shows the results of this method for the IPConfig command.
IPConfig help
As you can see in  Picture (IPConfig help) there a number of options you might use to find out different details about your computer’s configuration. The most commonly used method would probably be the IPConfig/all, shown in Picture (IPConfig/all). You can see that this option gives you much more information. For example, IPConfig/all gives the name of your computer, when your computer obtained its IP address, and more.

Ping
Another commonly used command is ping. ping is used to send a test packet, or echo packet, to a machine to find out if the machine is reachable and how long the packet takes to reach the machine. This useful diagnostic tool can be employed in elementary hacking techniques. In Picture (Ping) you see a ping command executed on www.yahoo.com.
IPConfig/all
Ping
This picture tells you that a 32-byte echo packet was sent to the destination and returned. The TTL item (Time To Live) shows how many intermediary steps, or hops, the packet should take to the destination before giving up. Remember that the Internet is a vast conglomerate of interconnected networks. Your packet probably won’t go straight to its destination; it will take several hops to get there. As with IPConfig, you can type in ping -? to find out various ways you can refine your ping.

Tracert
The final command we will examine in this chapter is the tracert command. This command is a more or less “ping deluxe.” tracert not only tells you if the packet got to its destination and how long it took, but also it tells you all the intermediate hops it took to get there. This utility will prove very useful to you later in this artical. Picture(Tracert) illustrates a tracert to www.yahoo.com. (This same command can be executed in Linux or UNIX, but there it is called traceroute rather than tracert.)
Tracert
With tracert, you can see (in milliseconds) the IP addresses of each intermediate step listed and how long it took to get to that step. Knowing the steps required to reach a destination can be very important, as you will find later in this artical. Certainly there are other utilities that can be of use to you when working with network communications. However, the three we just examined are the core utilities. These three (IPConfig, ping, and tracert) are absolutely essential to any network administrator, and you should commit them to memory.

Tips For The Safety Of Computer.

Here some tips for the safety of computer. You can get better result and performance of computer speed by acting upon these tips. 
  • Do not  turn off your computer during working position of windows.
  • Alway turn off you computer manually by clicking on start menu and select shut down. In case you are not using a mouse then simply press windows key and then press "U key" two times. 
  • Before connecting new hardware i.e CD rom, ram, hard drive etc, Turn off computer completely.
  • Always close CD Rom by pressing its button, do not apply force on the gate of CD Rom.
  • Do not keep your computer near dinning table and also do not keep any liquid or water near your CPU. 
  • Keep you system in airy atmosphere. 
  • You can use AC in your compute room.
  • Do not use water room cooler in front of CPU.
  • Always turn off computer manually & disconnect your computer from the AC current.


Monday, 29 July 2013

How to Make a Shutdown Shortcut in Windows 7 and 8

Are you still shutting down or restarting your Windows computer the old-fashioned way—through the Start menu? You can create a shortcut so that you could do these right from your desktop? Making a shutdown shortcut is a much quicker and more joy and unique way of shutting down. Follow these given below steps.

Right-click on your desktop.
Hover the cursor over "New" and click "Shortcut" on the next menu that appears.
Copy and paste the following into the text field:- (shutdown.exe -s)
To create a restart shortcut, replace -s with -r (shutdown.exe -r)

To change the timer, add -t xx, with xx being the number of seconds, to the end. By default, there will always be a 30-second countdown even if the -t xx portion is not included.

To add a "goodbye" message, type -c "your message" (including the quotation marks) at the end.
Type a name for the shortcut. Click "Finish" when done.
Right-click the shortcut and choose "Properties".
Click "Change Icon..
Choose an appropriate icon. Finally, confirm your selecting with "OK" at both windows.
When you are ready, double-click the shortcut to initiate shutdown. You will see a window counting down and your message will be shown. one time the timer runs out, all your programs will start to close and Windows will shut down.

How do I enable a Windows 8 picture password?

Picture password Picture password is a feature introduced with Windows 8 that allows you to create three different gestures on any image of your choice and use those gestures as your password  The gesture can be any combination of circles, straight lines, & taps. For example if the picture you chose was of a face your picture password could be a tap on each eye and then a circle around the mouth.
Open the Windows Charms. 
Click Settings and then More PC settings 
In the PC settings window click Users and then select Create a picture password.

Sunday, 28 July 2013

How To Increase Your Internet Speed 100% working

 Increase your PC's internet speed.This trick is 100% working on windows 7 & 8. we know, slow internet speed is often an issue When we browsing a webpage or downloading.
slow speed get irritated. You can try this easy trick in your windows & enjoy fast speed of your internet connection.

Just follow the below simple steps.

Press "Windows Key" or go to Start and then go to "Search Box" of your windows.
Type "Command Prompt" but do not Run this app.
First right Click on "Command Prompt" and "Run it as Administrator".
Type (netsh interface tcp set global autotuning=disabled)     
Press Enter Button.
Now Go to the control panel , Click on *Programs and Features* select *Turn Windows Features on or off* (left side) 
Windows Features window will open. Uncheck *Remote Differential Compression*
For windows 8  Uncheck *Remote Differential Compression API support*
Now  Press   windows+R  key
Run window will opened   Type “gpedit.msc”  for Open Group Policy window.
In Computer Configuration (left column) click symbol down to “Administrative Templates
Then click to symbol down *Network* and click on *Qos Packet Schedule*
In the Right-column, click “Limit reserve-able bandwidth” for open properties check on Enabled and  make it 0% from 20%
Click “Apply” and then “OK
Restart Your computer and surf internet again.

How To Restrict User’s To Access Shutdown Button?

This tip is very interesting for home and some small office users, who wants to restrict user’s ability to shutdown their computer. You can hide the Shutdown button from the Start menu using registry editor and also restrict access to shutdown, if a user clicks on Ctrl+Alt+Del.

Follow the given steps to hide system shutdown button from start menu:

To use this feature, you will need to be logged into your computer with

administrative rights.

Click Start button and type regedit in Run option then press Enter for next.

Here locate the location to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer

Here in right side panel, right click to create a new DWORD value with name NoClose.

Now assign number 1 to its value data box.

Now close the registry editor and restart your computer after any changes to go into effect.

But next time, if you want to unhide the shutdown button then simply change the value data box to 0 or delete this DWORD item.

Again close the registry editor and restart your computer after any changes to go into effect.

How To See Hidden Files In Windows

To enable the viewing of Hidden files follow these steps:

For Windows 8 users
step- Open My Computer or Windows Explorer .
step- Click View and then Options (as shown in below picture).
step- In Folder Options click the View tab.
step- Finally, within the view tab, select the option Show hidden files and folders as shown in the other picture and then click Apply and then Ok.

For Windows 9x, XP, Vista, and 7 users

step- My Computer or Windows Explorer .
step- Click the Tools drop down menu. If you do not see the Tools option try pressing Alt.
step- Click either Folder Options or Options.
step- Click the View tab.
step- Within the view tab, select the option Show hidden files and folders as shown in the below picture and then click Apply and then Ok.

Saturday, 27 July 2013

How to moving the taskbar

If you want to move your taskbar. Mostly I leave mine at the bottom, like the rest of the population, but occasionally I feel like going wild and have the taskbar at the top of my computer. The Taskbar is that thin bar at the bottom where you can see all your open programs, the start menu, the clock, etc. Now, in WinXP they made it very nice to move it. This is how:

step#1- Right Click on the Taskbar
step#2- Click, Lock the Taskbar, until there is no check there
step#3- Left Click on the task bar and move it to where you want it…it will always rest up against an edge, so top, left or right.
step#4- Then click, Lock the Taskbar, again and it won’t move from that spot.

These are the same instructions for Windows 98, ME, 2k, only you do not have to unlock the taskbar, you just left click on it and move…this was easier, but also you sometimes accidentally moved the task bar when you did not want it to move, ugh. Well, there you have it, now put your taskbar to the top and see if you like it.

PC Troubleshooting Tips Why is My PC Crashing?

Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files
Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files
Windows operating systems handle file organization in a way that is not very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software
Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory
When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this is not true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating
If you have run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and does not work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan is not very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!
As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!

How to Back Up to your system?

There are many steps to save data with backup regularly.

Back up regularly your data. It is important factor for you to get backup your files and folder on a regular basis. Because in this global network a computer can crash, a virus, or a hard drive failure can wipe out everything. Don’t make this mistake, It depend upon you and your data importance but better technique is that back up everything at least once a week. But if you use your computer daily, it is best to back up important files daily and other data weekly.

Keep several backup copies of same backup. Never back up over a previous backup copy, always try to keep several copies over time so that if one time one back create problem you can user others.. Remember, a problem that is backed up will remain a problem when restored!

Easy way for backup using Be selective method. You don’t have to do a total system backup of your system over time, If your are doing so, you are wasting your time. Just back up your important files, folder and photos. Backing up the entire hard drive is time-consuming, not practical, and should not be done. A backup of specific data files is the way to go. But a best technique is that first install your all computer program and system drivers then do a backup using any third party software (cloning software) like Norton ghost or others of your C drive once, this backup will help you to restore your all computer program in 15 min in case of any problem and do important data backup daily or weekly.

How To Remove Bad Sector From Hard Disk.

How To Remove Bad Sector

What Is a “Bad Sector”?
A bad sector, also known as a “surface defect”, is simply a sector on a computer’s disk drive that is physically damaged and therefore unable to be read. Usually, it is detected by the SCANDISK or CHKDSK utilities software that your operating system is equipped with.
When SCANDISK or CHKDSK find the bad sectors on your drive, they mark them so that the operating system will skip them in the future. This is known as standard disk repair.

Fixing Bad Sectors
Many PC users may come across bad sectors on their computers and not know how to fix them. Fortunately, a bad sector is not a lost sector – there is a way to save them. Once the bad sector is marked, the disk controller will remap the logical sector to a different area on the hard drive.
Since the drive has many spare sectors, the only reason the operating system would detect a bad sector would be if the surface of the disk drive was failing.
If this happens, it means the drive has run out of spare sectors and can no longer remap bad ones. This is very bad news for your operating system.

Common Symptoms
There are several common symptoms of bad sectors. One is the system blue screen. This is when your monitor screen suddenly turns blue duing the middle of an operation. Often, this is because your system is unable to read a sector.
Another symptom is constant system freezes. This occurs because the operating system is unable to access the sector information it needs to load a page or open a file. Other symptoms include: “drive not formatted” error, “drive or device not found”, or “operating system not found”.
All of these error messages are signs that your computer system’s registry and memory are corrupted and need a fix.

Bad Sector Dangers
If system structures like the FAT are affected by bad sectors, it could cause your computer to freeze or even crash. That is where RegCure comes in.
RegCure’s software addresses sectors below the the file system, enabling it to detect the bad sectors that SCANDISK and CHKDSK cannot reach.
The advantage is that the disk management system can then go back to reallocating spare sectors where they are needed.

Friday, 26 July 2013

How you can Deal with your Print Screen Button?

   Today a very useful tip for those who are interested to copy or download an images (Specially for Copyrights Images) from any site using Internet. Then there are two options to copy these images in Windows XP, Just open the required image page website, one option deal with this the Print Screen Button on your Keyboard and other is press Alt- Print Screen Button. If you simply press Print Screen Button after open a image from any site, here you can copies the entire windows to the Clipboard, and if you press Alt- Print Screen Button, Windows XP copy the only active window.
Now you can use any Graphic Tools like (Adobe Photoshop, Paint) to manage and print this image. Just open one tool then paste this image, this will paste all Clipboard contents into Paint. Now you can print, save this image or can do more work on this image.

Quickly Move Between The Fields Of A Web Page

If you’re filling out an online form, e-mail, or other text field you can quickly move between each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, if you’re filling out your name and the next field is your e-mail address you can press the Tab key to switch to the e-mail field.

This tip also applies to the buttons, if you press tab and the web developer has designed correctly the button should be selected and will allow you to press the space bar or enter to push the button.

If you have a drop-down box that lists every country or every state you can click that box and then press the letter of the state or country you’re looking for. For example, is a drop-down box of States in the United States you could press u on the keyboard to quickly scroll to Utah.

5 Facts About Internet Crime and Punishment.

The world we live in is becoming increasingly dominated by digital technology, and with this has come the emergence of cybercrime. A cybercrime is any kind of crime which targets technology, or uses technology to further criminal ends. But how do you police an internet which crosses international borders and oceans, in which the perpetrator and the victim can be separated by millions of miles?

1) Piracy/Copyright Infringement.

Piracy of music, films and TV shows wasn’t invented by the internet, but it was one of the first types of cybercrime to emerge. File sharing programs and websites make it easy for people to download and watch or listen to copyrighted material that they didn’t pay for. Copyright infringement is illegal in the UK, but identifying offenders and justifying the cost prosecution of them is a serious obstacle to enforcement.

Currently action must be sought by the copyright holders, once they know their copyright is being infringed. Most legal activity surrounds blocking those websites which distribute pirated material. The 2010 Digital Economy Act requires ISPs to send letters to customers who download pirated material however prosecutions have not been forthcoming.

2) Child Pornography.

Child pornography is another crime which has flourished on the internet. With the distribution of images made so much easier all around the globe, many countries struggle to understand what they should be prosecuting. Under UK law it is illegal to make, take, possess, distribute or show indecent images of those under the age of 18. All of the above are punishable by 10 years imprisonment, fines and registration on the sex offenders register.

3) Child Grooming.

Child grooming occurs when an adult makes friends with an individual under the age of 18 (often on chat rooms or children’s game sites), usually with the aim of meeting and engaging in sexual activity. The Sexual Offences Act of 2003 added to the existing raft of child protection laws to ensure that internet grooming is punishable by up to 10 years imprisonment, in line with other child protection laws.

4) Online Fraud and Identity Theft.

With so much of our lives on line (banking, socialising, working) it is easier than ever for people to become the victim of identity theft online. Phishing schemes usually target bank and credit card user by getting them to log in to a fake webpage. Once they have your details, fraudsters can run up bills online, use your identity to obtain medical services or to cover illegal activities. Currently in the UK the Data Protection Act of 1998 is used to protect users from online fraud, but commentators believe that additional legislation will soon be required, as nearly 50% of all frauds recorded are identity theft.

5) Cyber Terrorism.

Cyber terrorism is the act of an individual or group using internet based attacks to disrupt the operations of a company or government body. As we rely more in our day to day lives on computer networks, so the risk of disruption if a service is interrupted grows. Imagine the chaos if a town’s traffic control system was disrupted, or the air traffic control at an airport. Hacking and cyber-attacks are illegal under the UK’s Computer Misuse Act, punishable by imprisonment and fines. UK-based hackers may be extradited to face the consequences of their actions overseas.

The digital age is in a constant state of development but so is the law, and many types of cybercrime are already punishable by existing laws. It is easy to imagine that distanced as they are from the physical scene of the crime (be it a hacker breaking into a government server a hundred miles away, or an individual downloading child pornography from a thousand miles), that they are insulated from the law. But it simply isn’t true. Ranging from fines to custodial sentences, cybercrimes are punishable under UK law, and it is a law which is changing daily to adjust to the differences of crimes in the digital world.

How You Can Save Energy Using Energy Saving Feature?



You can save your system energy applying these feature.

  • First Right click on our your system desktop and a popup menu will appear.

  • Select the Properties option from the menu.

  • Click Screen Saver tab and then select Power button, here you will get Power saving sitting option for your monitor.

  • Select your power scheme from available option, for example turn off monitor time, turn off hard disk and stand by your system.

  • At the end Click OK button to apply the selected scheme.

Remove Annoying Delete Confirmation Messages In Windows



Although not strictly a performance tweak I love this fix as it makes my machine ‘feel’ faster. I hate the annoying ‘are you sure?’ messages that XP displays, especially if I have to use a laptop touchpad to close them. To remove these messages:

1. Right-click on the ‘Recycle Bin‘ on the desktop and then click ‘Properties

2. Clear the ‘Display Delete Confirmation Dialog‘ check box and click ‘Ok

If you do accidentally delete a file don’t worry as all is not lost. Just go to your Recycle Bin and ‘Restore’ the file.

Thursday, 25 July 2013

Top 10 Ways To Save Your Computer From Hackers


01- Software Updates:
For the protection of your computer from hackers you should get the best and latest version of application which is impossible for the hackers to find it, another thing is also take place that your web browser and other programs are given best upgrades.

02- Window Updates:
Another way to protect and save your computer from hackers is that you should keep your operating system up to dates in for minimizing the risk of virus which is very necessary for your computer.

03- Anti-Virus Software:
Another way to protect your computer from hackers is that you should install best quality Anti-virus software, because with out antivirus software your computer is in the list of hackers and it is dangerous for your computer. So for protection of your computer you must do for the best.

04- Anti-Spyware Software:
Anti-spyware software is one of the best ways to protect your computer from hackers, Thanks to anti-spyware luminaries like Ad-Aware, the previously crippling spyware infection had dwindled down whole of year.

05- Switch to Macintosh:
Another best way for protect your computer from hackers is with the help of Macintosh operating system which is very secure for your computer because this fact only came about because smaller quantity hackers bother to attack this platform in the first place.

06- Hacker-controlled Websites:
Another way to avoid your computer from the hackers is that you should avoid for getting snared by doubtful sites committed to porn, free downloads, online games, and so on; this way, there are not as much of chances for you to be hacked.

07- Spam Email:
Another one of the best way to protect your computer from hacker is that you should avoid to open those websites which are doubtful if the massage is doubtful than delete the message which is useful for your computer.

08- Firewall:
Another thing which is very important for your computer avoid to be hacked is to install the firewall if you have not install it than I will recommend to install it. Because there are goods that even filter both incoming and out going data streams.

09- Data Backup:
Another thing which is very helpful for your computer to avoid from hacker is that if any data which is in your computer as well as related to computer, you should take backup of this data which is very important to save your data from crashes on internet.

10- Password Polices:
Another very important thing which is very helpful to protect your computer from hackers is that your password polices should be of high standard using combinations of letters and numbers, and making sure that your password is as secret as potential without necessarily making it too difficult for you to remember it.

What is Computer Network?

Two or more computers connected together through a communication media form a computer network.

The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

Computer Network Components:
There are different components of a network. Following are the basic components of network.

1. Server:
Powerful computers that provides services to the other computers on the network.

2. Client:
Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:
A physical connection between the devices on a network.

4. Network Adopter:
Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:
Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:
Any person that uses a client to access resources on the network.

8. Protocols:
These are written rules used for communications. They are the languages that computers use to talk to each other on a network

The 3 Basic Computer Operations.


Input: Information and programs are entered into the computer through Input devices such as the keyboard, disks, or through other computers via network connections or modems connected to the Internet. The input device also retrieves information off disks.

Output: Output Devices displays information on the screen (monitor) or the printer and sends information to other computers. They also display messages about what errors may have occurred and brings up message or dialog box asking for more information to be input. The output device also saves information on the disk for future use.

Processing: The CPU or central processing unit is sometimes called the Control Unit and directs the operation of the input and output devices. The Coprocessor or the Arithmetic-Logic Unit does arithmetic and comparisons. The memory or RAM temporarily stores information (files and programs) while you are using or working on them. The BIOS or basic input/output system controls the dialogue between the various devices.

Defragmenter Program To Optimize The Placement Of Files


This utility program is used to re-organize the files and un-used space on the hard disk, so that operation system can access data more quickly and easily. When operating system stores data on the disk, it stores the data in the first available sector on the disk. In this case data of a file is stored on disk in a scattered form; it is referred to as “File is fragmented”. The fragmentation slows down the data accessing speed of computer. You can improve the performance of your computer by de-fragmenting your hard disk. In De-fragmentation process, the data of each file is stored in continuous sectors. There are many third party software’s available in market for this purpose but you can use windows built-in utility program called Disk Defragmenter. To start disk defragmenter utility, first make sure all running program are closed.

To run disk defragmenter utility, go to the Start button and type dfrg.msc in Run option then press ok. Now here a disk defragmenter window will appear. Select any drive and press defragmenter button. If you have a large hard disk, this process can take several hours. I recommend you doing this after one month if you want to improve the performance of your computer.

Best 10 Things You Have To Know To Be Computer Literate

1: Search engines

Using a search engine is more than typing in the address, putting a couple of keywords into the big text box, clicking Search, and choosing the first result. While that may work, it won’t give you the best results much of the time. Learning the advanced search, Boolean operators, and how to discern good results from bad results goes a long way toward enabling you to use a computer as a powerful research tool.

2: Word processing

Word processing is one of the oldest uses for a computer. And it continues to be extremely important, even though in many ways its functions have been put into other applications. (For example, people may write more emails than documents, but the task is nearly identical.) It is tough to claim to be computer literate if the basic functions of word processing like spell check, table creation, and working with headers are outside your capabilities.

3: Spreadsheets

Spreadsheets were the killer application that got a lot of people willing to pony up big bucks for a PC in the early 1980s. Spreadsheets offer incredibly powerful analysis possibilities… if you know how to use them for more than storing the holiday card address list. (Okay, I use Excel for that too.) Being able to use formulas, references, and macros can turn a “grid of numbers” into actionable information in the hands of the right person.

4: Browser basics

It is almost painful to watch some “computer savvy” people operate a Web browser. The most obvious goof is going to a search engine to type in the address of the site they want to go to. But folks are unaware of a lot of other things they do that make the Internet more difficult than it needs to be. Mastering techniques like opening links in new windows, using bookmarks, editing URLs to perform navigation, clearing the browser cache, and understanding common error messages will give you access to a world of unlimited information instead of keeping you stuck with only what Web site designers make obvious.

5: Virus/malware scanning

Much of typical computer maintenance is automated or unneeded at this point, but it is still essential to understand how to check a system for nasty bugs, spyware, and other malicious applications. While the scanning tools come with real time monitors, something can still slip onto the system before the scanner has the right filter for it. So it’s critical to know how to trigger a manual virus/malware scan, as well as how to use alternative systems, spot signs of an infection, and other similar tasks.

6: Common keyboard commands

If you do not know how to copy/paste without a mouse, you are not computer literate. Sorry! Every operating system has some universal keyboard commands, and while knowing them won’t add 30 minutes back into your day, it will take a lot of the “friction” out of using a computer. Learning these commands is more a matter of routine than anything else; a short tutorial done once a day for a week will probably be enough to put you in the habit, and it will make you a happier user.

7: Basic hardware terminology

It is tough to have someone help you with a problem when you tell them that your “hard drive” is unplugged, when you really mean “the computer.” There are a number of common hardware misunderstandings out there, and while some are understandable (for instance, confusing a NIC with a modem the cables look similar and they serve the same purpose, networking), knowing basic hardware terminology is a must-have skill to be a savvy user.

8: Simple networking diagnosis

Networking problems create the most common trouble with most computers. While you don’t need to be able to program a Cisco router, you should know how to:

Determine your IP address
Verify physical connectivity to the network
Check that you have a logical connection to the network
Find out what path network traffic takes to get to its destination
Translate from DNS names to IP addresses

9: How to hook it up

Despite the color coding of connections and the fact that most cords can be plugged into only one hole, tons of people still can’t hook up a computer. It is tough to claim to be computer literate if you can’t even get it hooked up and turned on without some help.

10: Security/privacy 101

It is a dangerous world out there! You absolutely must know how to protect yourself from attackers on the Internet and keep your personal data private. Everything from knowing to check a link before you click it to verifying that encryption is being used to transmit sensitive data to researching sites before giving them your personal data are all critical skills for the modern computer user. If you do not know how to keep yourself safe, you need to learn how.