Laptop Screen Cleaning Tips


Most homes in the UK now have access to at least one home computer, and in many cases this computer is a laptop. Laptops are designed to be carried between locations and it's this portability which makes them an all-purpose machine. Even though laptops are made from tough components they can still be broken if dropped or if treated incorrectly. And one of the areas which is most prone to damage is the laptop screen.

Laptop screens should be treated carefully. They are essentially an active matrix display using either CCFL or LED lighting technology. This can be broken if dropped or the thin film protecting the display can be scratched if it is not cleaned correctly.

Some of the cleaning tips which should be employed when cleaning a laptop screen include:

Never use alcohol-based cleaning solutions:

It's a good idea to NEVER use any alcohol or solvent-based products to clean your laptop screen. The screen may not be made from glass and if it is instead made from a plastic-type material contact with alcohol or solvent solutions may damage the screen.

Don't use tissues or paper towel:

It's best not to use tissues or paper towel to clean a laptop screen. Both these products contain tiny wood fibres, which no matter how small, may leave tiny scratches on the screen if it is repeatedly wiped using these items.

It's best not to use water:

Although water is inert and is a good cleaning medium, using plain water on a laptop screen may leave watermarks on the screen due to the minerals inherently found within its make up.

Never spray the screen - always spray the cloth:

Microfibre cleaning cloths are the best things to use to clean the screen but if you are using a spray cleaning solution don't be tempted to spray the screen. Water sprayed onto the screen may work its way into the screen behind the screen bezel. There are lots of electrical connections behind the bezel which won't take kindly to being doused with water.

Don't rub too hard:

Even if you use a microfibre cleaning cloth the screen may be damaged or scratched if you rub too hard. If you have a stain on the screen it's best to let it soak by damping it with solution rather than trying to wipe it away at the first time of asking.

You can use commercial screen wipes:

If you want a quick and easy way to clean a laptop screen it's worth buying a tub of ready to use screen wipes. These will be sealed in a packet or a tub and will be slightly damp, so marks can easily be removed. These wipes will have been rigorously tested on screens already and will provide a safe and effective way to clean the screen.



Author Bio:
Jenny Frost is an IT manager at a large company. She has to look after hundreds of laptop computers and make sure they are always working correctly. If she needs a new laptop screen for one of her devices she uses accupart.co.uk.

Have Windows 8 Failed In Spite Of Its Many New Functions Such As Password?


Since the release of Windows 8, it has been over two months. Though Microsoft has made many changes on the new operation system, according to an article from eWeek, it doesn't sell well. And still some industry observers agree that Windows 8 is totally a failure. They insist that some new features aren't practical at all. Take Windows 8 password as an example. Opponents claim that once they forgot the Picture Password, it is not easy to get Windows 8 password reset, and also, it is not safer than traditional password at all. Therefore, dose it means that Windows 8 will end up with a failure? Of course not!

Reason 1: Microsoft has just began its fighting

Advertising Age said that Microsoft will spend $1 billion in advertising Windows 8. If you watch TV in USA, you will find that advertisement for Windows 8 is everywhere, just like the advertisement for President Election.

Reason 2: Equipments for Windows 8 will be on sale in large scale

It is said that the production of Windows 8 equipment will slowly grow. As a result, there will be 21 million sets in the end of next year, while there are only 3.8 million sets in the end of this year.

Reason 3: The professional version of Windows 8 will be released

The first batch of sets is for Windows RT, which is only suitable for computers with ARM processor. At the end of next January, the professional version of Windows 8 will be published to adapt to computers equipped with Intel X 86 processor.

Reason 4: Users need time to adapt to the new interface

Since the big changes made on Windows 8 interface, especially the lack of start button and the desktop full of images, users find it hard to get used. While, as time goes by, and with the efforts of publicity from Microsoft, we do believe that users will get familiar with Windows 8.

Actually, the advantages overweight disadvantages in Windows 8. Meanwhile, some disadvantages can be overcome with some tools. For example, just like the Windows Server 2008 password recovery tool, we can also find some software to reset our Windows 8 password now. I do believe that Windows 8 is promising. What do you think?



Author Bio:
I am a computer software expert. And I like making friends. They all like me very much, not only because I am an easy-going man but also because I can solve many computer problems, such as if they want to know Windows password reset I can help them.

How To Replace Laptop Accessories


There are a lot of important laptop accessories that can improve the whole function of a laptop. In some cases, these accessories should be replaced with the new one. It is very important for people to learn how to replace the laptop accessories in the correct way. This is very vital to avoid any problems or damages on the laptop in the future. In this article, there are several popular accessories and how to replace them with the new one. These accessories are chosen because they are very popular among all computer users. Almost all users have these laptop accessories.

1). Laptop keyboard cover:


This accessory is very popular because it can improve the protection on the laptop. There are a lot of different styles and models of this laptop keyboard cover. Most products are specially designed in order to prevent any scratches or damages on the original laptop keyboard. In some cases, this keyboard cover should be replaced with the new one. This product can tear because of the intensive or excessive use. People can simply open the keyboard cover before replacing it with the new one. However, they have to be very careful when opening this cover. Then, they have to purchase a new keyboard cover. They have to measure the keyboard size before purchasing the new keyboard cover. People can simply attach the new keyboard cover to their laptop keyboard. It is necessary to avoid the use of any water because water can damage the laptop.

2). Laptop power jack:


Laptop power jack is an important part in a laptop. This accessory is very useful to conduct the electricity for the laptop. This power jack is very fragile. It can break off very easily. When this situation happen, people should open their laptop in order to replace the broken power jack with the new one. First, they have to remove the battery back from the laptop. It is vital to unplug the power cord on the wall outlet. Then all screws should be unscrewed in order to open the laptop before removing the hard drive of the laptop. There is a laptop power jack inside the laptop body. This accessory is usually located on the motherboard. Replace the broken power jack with the new one. After replacing it with the new power jack, people can simply put all parts, including the motherboard, hard drive, battery, and any other laptop parts, back to the original condition.

3). Laptop batteries:


Laptop battery is another important part in a laptop. There are many problems that may occur in most laptop batteries. Most batteries can last for at least one year before getting any problems. When people have any problems with their batteries, they should replace them in the correct way. Replacing a laptop battery is not as complicated as what people thought. People can simply remove the old battery with the new one. It is very simple to remove the battery from a laptop. In some laptop models, people can simply press the release button to remove the battery easily.

Ways To Avoid A Catastrophe With Computer Support


Anyone who owns a computer these days at some point will probably need to find and engage a computer support service. Computer issues can occur randomly, when it suddenly freezes, slows down to a snail's pace or will not turn on at all.

Computer Support:

Computer support comes in many forms. Some professionals deal primarily with repair, while others offer maintenance plans. Other kinds of computer support can involve receiving advice on choosing and purchasing systems while also seeing that they are updated and properly maintained.

Choosing Customer Support Services:

There are numerous companies available that provide computer support services. For the average computer or small business owner, this can present a challenge when it comes to choosing the right one for their particular needs. Unfortunately, there are a number of rogue firms that are seeking to capitalize on the technical ignorance of consumers. However, following the below tips can make it easier to choose a service that will provide what is needed and eliminate some of the headaches that can occur by dealing with a computer support firm that is unsuitable.

Local or Corporate:

The best way to avoid computer problems is to engage a computer support company that will ensure that the system is properly maintained. However, choosing a firm for that purpose can be daunting. There are advantages to hiring a local company or professional above the big box companies that include:
  1. Higher levels of availability.
  2. More accountability for services.
  3. Better pricing structures.
  4. In home repair services save time and money.
Because a smaller firm relies heavily upon repeat business, they are usually more likely to value their customers. In this way, they make a great effort to ensure that customers are pleased with their services, often more than a larger firm.

Qualifications:

Regardless of whom is chosen as the computer support firm, ensure that their qualifications are clear. Look for reviews and ask for customer referrals. Any reputable professional should be able to provide this. If not, this could be a sign that either they lack experience or have had issues about their services in the past.
Check forums, review sites, the BBB and use the search engines. Ensure that no cautionary tales exist about their service caliber and that they have sufficient experience to handle your particular requirements.
Ensure that the professional to be hired offers a guarantee and that you understand the parameters of the guarantee.

       For example, if there is a timeline, ask what happens if the time period is exceeded by just a few days. A reputable shop will accommodate and cover repairs that fall slightly outside of the service guarantee period.

Costs:

One of the most important aspects of ensuring that no mishaps occur with regard to computer support services is to have a budget in mind. Research the services you are interested in for your area so that you have some idea of what to expect. Otherwise, a price quote may easily exceed what your business is able to comfortably pay.

There are literally millions of issues that can occur through the lifecycle of a computer. Much of the time, it makes more sense to have the system maintained by a computer support professional on a regular basis, rather than risk the need for repair.

Even still, repairs also become necessary. In those cases, having an affiliation with a professional ahead of time will mean less downtime for the business. Keeping in mind that downtime costs revenue, the investment made in computer support services is well worth the expense.



Author Bio:
Tony is a managed it services Austin tech. When he's not working on making sure computers don't take over the world and cause caos, he's fishing over at the Guadalupe river just south of Austin, TX.

How To Boot Ubuntu From A USB Flash Drive

Below are the three methods, that can be adopted to boot Ubuntu OS from a USB Flash Drive!

Option 1: Boot Ubuntu as a Live CD from a USB Flash Drive

Use this option to install Ubuntu as a Live Install, which allows you to boot from the USB flash drive in Ubuntu, experience the Linux environment but will not retain any changes or settings after you shut down. This is a great way to get a feel for the OS, test some of it's capabilities as well as typical hardware compatibility.

Programs you may need to download:
  1. Ubuntu 10.04 Live CD ISO available at ubuntu.com.
  2. Universal USB Installer available at pendrivelinux.com.

What you will need:
  1. Computer Running Windows XP/Vista/7.
  2. Fat32 Formatted USB 2.0 Flash Drive, at least 1GB.
  3. PC with a Bios that can boot from USB.

Now with all of the necessary components in place, we can begin to setup our Ubuntu Live USB Drive,
  1. Run the Universal USB Installer by Pendrivelinux.com that you downloaded earlier.
  2. Choose Ubuntu 9.10/10.04.1 Desktop i386.
  3. Select the Ubuntu Live CD that you downloaded earlier.
  4. Choose your Flash Drive.
  5. In this instance, we are going leave the persistence option unchecked.

This can take anywhere from 15 minutes to 30 minutes depending on the speed of your system. At one point the progress bar will freeze until it is done, and this is the lengthiest wait of the process.

Once complete, you can reboot your computer with the USB flash drive in the USB port, press F12 for the Boot Menu and choose the removable media to boot from and you are in.

As this is a Live USB, any changes you make to the Ubuntu environment will not persist through a reboot. This is because running in this mode, Ubuntu uses available RAM in place of Swap and Hard Disk space. This option also contains the install files needed to install Ubuntu directly to your desktop if you should so desire.


Option 2: Boot Ubuntu as a Live CD with Persistence from a USB Flash Drive

This option will install Ubuntu Linux onto your flash drive with an area for persistent storage. You will be able to restart the computer, boot back into the Linux environment and all settings or changes made previously will persist.

Note: This option is particularly hard on Flash Memory, as there can be quite a bit of reading and writing to the Flash Memory.

What you will need:
  1. Computer Running Windows XP/Vista/7.
  2. Fat32 Formatted USB 2.0 Flash Drive, at least 2GB.
  3. PC with a Bios that can boot from USB.

Now with all of the necessary components in place, we can begin to setup our Ubuntu Live USB Drive,
  1. Run the Universal USB Installer by Pendrivelinux.com that you downloaded earlier.
  2. Choose Ubuntu 9.10/10.04.1 Desktop i386.
  3. Select the Ubuntu Live CD that you downloaded earlier.
  4. Choose your Flash Drive.
  5. Select the Persistence Option of 1GB Casper-RW.

This can take anywhere from 15 minutes to 30 minutes depending on the speed of your system. At one point the progress bar will freeze until it is done, and this is the lengthiest wait of the process.

Once complete, you can reboot your computer with the USB flash drive in the USB port, press F12 for the Boot Menu and choose the removable media to boot from and you are in.

As this is a Live USB with Persistence, any changes you make to the Ubuntu environment will keep through a reboot. This option also contains the install files needed to install Ubuntu directly to your desktop if you should so desire.


Option 3: Install Ubuntu directly to a USB flash Drive

This option works through installing Ubuntu to the flash drive as a complete installation. It does not retain the installation files to install on another system. This will allow you to use Ubuntu exactly as if it were installed alone on the hard disk. You can boot from it with any computer that can boot from a USB flash drive.

Note: This method requires that you disable your hard drive in BIOS to prevent overwriting your current operating system and force the install onto the USB drive.

What you will need:
  1. USB 2.0 Flash Drive, at least 4GB.
  2. PC with a BIOS that can boot from USB.
  3. Blank CD.
  4. A Computer with the ability to Burn CD/DVD.

Now with all of the necessary components in place, we can begin the process,
  1. First, you will need to burn your Ubuntu ISO to CD using a program like ImgBurn available at ImgBurn.com.
  2. Boot your computer and press F2 to enter the system BIOS. Within here you will want to disable your Hard Drive. If this is not an option in your BIOS, I would suggest shutting down your computer and unplugging the power and data cables from your hard drive before proceeding. Note: If you choose not to disable your hard drive, you run the risk of installing Ubuntu on top of your current OS and can lose valuable information.
  3. After you have disabled your hard drive, place the Ubuntu Live CD into your computer and boot from this.
  4. At the initial boot screen, choose to try Ubuntu, not install.
  5. Once Ubuntu loads, plug in the desired flash drive into the computer.
  6. Now, double click on the Install Ubuntu icon that appears on the desktop.
  7. The first 3 screens are language, time zone, and keyboard layout.
  8. Now Ubuntu will notify you that there is a disk mounted, and asks to unmount it. This is your flash drive. Give it permission to unmount.
  9. This is the prepare disk space screen. I chose to leave mine at default and let the installer handle the partitions needed by Linux.
  10. Now you will see the login and user information screen.
  11. Now you are ready to install, click install.
  12. At one point during the installation, you may notice a skip button appear on the bottom left. This is to skip the auto update, and finally the language packs. I chose to skip language packs update.
  13. This may take a while, mine took atbout 35 minutes to complete. When it is done, eject the disk and shut down the computer. Plug your hard drive back in if necessary, or boot your computer into bios and re-enable it. Reboot your computer and press F12 to enter the boot menu, choose the flash drive and boot into Ubuntu.




Author Bio:
Joshua Bulman is a full time web designer and IT support technician for a company that provides Custom USB drives via the web marketplace. He enjoys reading fiction, writing just about anything, and discovering new technologies.

Forget Your Windows 7 Password? Create Windows 7 Password Reset Disk


Suppose if you forgot Windows 7 password, you would try to find solutions to recover or reset it through the internet. Soon you would find one solution—using Windows 7 password reset USB disk, which is most mentioned by people. So here in this article, I will show you the exact ways to create a Windows 7 password reset disk.

Theoretically, a password reset disk Windows 7 can be made with a CD/DVD or USB flash drive. Since USB flash drive is more convenient to carry and safer to preserve, here I highly recommend creating a Windows 7 reset password with USB to prevent your computer from being locked. Below are guides on how to create a Win 7 password recovery USB.

Situation 1 :)

If you haven’t forgotten your Windows 7 password yet. At this situation, you can easily make such a password reset USB disc for free to prevent your computer from being locked.

Now follow the below steps:
  1. Insert the prepared USB flash drive into your computer.
  2. Type “reset” in the Windows search box and select “Create a password reset disk”. 
  3. When the “Forgotten Password Wizard” appears, click “Next”.
  4. Select your USB flash drive and click “Next”.
  5. Once the wizard finishes creating the reset disk, click “Next” then “Finish”.
  6. That's it. Job Done!



Situation 2 :(

If you have already forgotten your Windows 7 password. Many computer users actually didn’t take any precautions against Windows 7 password forgotten problem before they find they’ve lost or forgotten the password. So if you don’t have such a password reset disk when you forget or lose your Windows 7 password, you need to seek for other ways to make one and then use that to reset Windows 7 password.

Here’s how to create a reset password Windows 7 USB with Windows Password Recovery Enhance:

You need to do the below steps in another system in order to recover your system.
  1. Download and install PC Login Now's iso file.
  2. Burn the ISO file to CD (Use Magic ISO).
  3. After you have created a bootable disk, Insert that disk into the DVD Drive and Restart your computer.
  4. Set the BIOS to boot from CD. (Mostly not required if your system automatically detects the disk on your DVD Drive).
  5. The software then automatically runs.
  6. Use PCLoginNow to finish the job.

Note:
Download-file is an ISO file named “PCLoginNow_Free.ISO” which should be burned to a CD before using it.

How To Create Bootable Windows 8 Usb Drive



It’s been quite some time since we have seen technology revolving around portability. A USB drive acts as a portable medium for storing noticeable memory and as such a portable and a bootable windows  8 USB drive gives you a flexible availability of an operating system on your reach. Well most of the systems coming through in today’s age lack optical drives so it would be quite a wise decision to go on and use a bootable USB drive to install Windows 8 onto your system.

To create a bootable windows 8 USB drive we need to incur some requirements which happen to be:
  1. A flash (USB) drive bearing a capacity of 4 GB or more than that.
  2. A Windows 8 DVD or Windows ISO file which acts as the source which has to be transferred.
  3. If you consider having windows 8 DVD then you need an optical DVD drive in your computer but if you go onto have an ISO file then a USB port will work well.
Note: If you have a windows 8 DVD then you may proceed doing this procedure from the very first step, but if you have an ISO file then you need to go on from the second step.

Procedure: 
  • First we have to create a windows ISO file from the windows 8 DVD. This ISO file contains all the data which needs to be transfer into the usb drive to create a bootable one. There are many tools to create an ISO file from a DVD; you can use any of them. My suggestion is, you can use Magic ISO.
  • After you have created the required ISO file, you need to download the Windows 7 USB/DVD download tool from the Microsoft Website and install it onto your computer. Windows xp users need image mastering api v2 to use this software.


  • After installing it start the download tool by looking for it either in the start menu or the shortcut icon on the desktop.
  • When the tool utility will open up it will ask you for the path of your ISO file. By clicking onto browse you will have to locate the ISO file in the computer. This location has to be the path associated with your ISO files destination.


  • After selecting the ISO file you can click onto next which takes this utility onto a next step.
  • The next step is to select the media we wish to use, as we are going to make a bootable USB drive so the type of media has to be USB. There is an option to keep DVD as the media too which implies that you can make a bootable DVD too through this application but for now we have to go through the USB process.


  • After selecting the media you need to erase all the contents present in the flash drive by pressing erase USB drive. This will format the USB drive and make it free to be used particularly from this process.


  • When you will click next the utility will show you a tagline “creating bootable drive, just wait for the Windows 7 USB DVD Download Tool to prepare the drive and copy the Windows 8 installation files to it”.


  • The download tool will start formatting the drive, after that it will start copying the contents and as soon as this will be completed you will come across a labeled line that Bootable USB drive created successfully. If t\all the steps would have been incurred properly a Bootable USB drive would be ready to be operated.
This completes the process and your bootable windows 8 Usb Drive is made and prepared to be used as an installation media. Now you simply have to boot your computer through the USB drive and you would be easily able to install new windows on your computer. The maximum time period to install Windows 8 is almost 20-30 minutes with great ease.



Author Bio:
Khalid: http://www.siliconelake.com/
With the Divine Assistance i do succeed and with that Assistance i fail.

Ways to Prevent Computer Viruses

Computer viruses affect systems in different ways. Some wipe out or corrupt data in the system while others steal sensitive user information. While many people take insurance policies to protect their homes and property, many more seldom do the same in protecting their digital information. The initial steps of data protection may take a while but the results would be worth the effort. Securing a computer from viruses involves various strategies.

A special procedure is given below (At the end of this article),  to check if your Antivirus software is working in the right way or not!

Antivirus:

Those who do not have an antivirus application, can Download or buy one on the internet. Ensure the program is compatible with the operating system. The antivirus application should be updated frequently so that it protects against the latest virus definitions. Choose antivirus software that can update and scan automatically. Do not install applications from untrusted sites. Run full system scans at least once or twice a week. Heavy internet users should do this more often.

Dont miss: Beaware Of Viruses On Social Networking Sites!

Firewall:

Turn on the Firewall. This is normally the base of the operating system. Users just have to turn it on. Firewall refers to software that monitors what comes in and goes out of the machine. It acts as a gatekeeper. Learn more about firewall and it's function here.

Updates:

Activate security updates to keep the system up to date. Make sure third party applications such as web browsers are also updated. Most programs have a feature that notifies users when a new program version has been released. Be sure to update all active programs. Keep the operating system updated. Many manufacturers create security patches, which they send out as needed. Setting automatic updates allows the operating system to download and install the security patches eliminating security risks including viruses.

Back up:

Back up data. This provides an extra layer of protection against Data loss. There are so many factors that can compromise data security including undiscovered bugs, downloading infected files, hardware failure and clicking on the wrong link. This is why backup is an essential part of smart computer usage. Find more about data loss and how to prevent it here.

Date Encryption:

Encrypt data using encryption software. Many operating systems have encryption capabilities. Users can encrypt their entire hard drives to protect data from virus attacks. Some encryption programs can create virtual hard drives to secure all files and prevent corruption by viruses. Choose an encryption program that allows synchronization with data protection services that store data offsite.

E-Mails:

One of the most common means of getting a virus infection is through e-mail links containing viruses. Do not open e-mail attachments and links from strangers. If necessary, visit the sites directly.

There are many strategies used to protect computer systems from getting a virus infection. However, the most basic protection against viruses involves using the right antivirus application and updating the computer system on a regular basis.

Here is A simple Way to check if your antivirus Works Or Not?

Follow the below steps:
  • Open notepad.
  • Copy the below text and paste it on the notepad.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  • Then save it as eicar.com
On opening the saved file you should get a message from your Antivirus as Malware detected or Virus, And that file has to be automatically deleted by your antivirus.

But Don't worry eicar.com is not a virus, It is a standard test file. :)

This is what the message i got by doing so, and the file got deleted automatically.

What Is The Most Secure Web Browser For 2013



What Is The Most Secure Web Browser For 2013

Web browsers are the gateways to the Internet. Once exploited, they become the primary vectors for breaking into computer systems and infecting them with malicious programs. One of the most popular means of breaching security barriers and compromising sensitive data over the Internet is via phishing attacks. Malicious URLs linking to phishing sites has been on the rise over the years. For instance more than 50,000 phishing sites were discovered per month in the last year alone. Another major threat is malware, including viruses, worms, Trojans etc that makes your system a prey of a remote predator. As the gateways to the Internet the browsers are bound to protect your systems from these types of online threats. Therefore they implement numerous security work-outs behind the curtains without relying on security barriers of the OS and antivirus software. Following is a comprehensive discussion about the security features on major web browsers seen today.

Internet Explorer 10 Security:

             Over the past couple of years Internet Explorer continued to tarnish its reputation over numerous bugs and vulnerabilities amidst a fierce competition lead by Google Chrome and Mozilla Firebox. However with the new IE 10 launched exclusively for Windows 8 (It supports Windows 7 as well) the software giant strives hard to regain the top notch spot it once enjoyed. Microsoft has introduced several security upgrades to the IE9 in creating the browser destined to serve Windows 8. Enhanced Protected Mode for example restricts browser’s access rights to the other applications to provide an additional layer of protection.

            Address Space Layout Randomization (ASLR) introduced with Windows Vista has been tweaked and renamed ForceASLR, and addresses memory related vulnerabilities often exploited by socially engineered malware. Windows 8 kernel includes ForceASLR protection out of the box, and Windows 7 users can enable the feature via an update. InPrivate Browsing enables the users to browse in private, as the browser does not store browsing history, cookies, temporary internet files, user names and passwords etc during a browsing session. Recently NSS Labs on their review on browser security published that Internet Explorer 10 has a malware blocking rate of 99.1% and Phishing URL blocking rate of 92%.
Recommended For You: Attributes Of A Great Web Browser For Students!

Google Chrome Security:

            Behind the curtains web browsers implement numerous strategies for keeping away malicious code snippets breaking into your system and compromising your data. The Sandbox feature is one such precautionary methodology found in Chrome. This lets a particular application run in an isolated environment without impacting other processes. Based on multi-processor architecture adapted by Chrome, processes such as HTML rendering and handling JavaScript are done in secure, isolated environments protecting your System. However this doesn’t mean Chrome is invincible. Last year a group of French hackers of VUPEN managed to crack this sandbox feature successfully.

            According to a research conducted by NSS Labs reviewing security features of popular web browsers, Chrome had a malware blocking rate of 70.4% backed by Google’s Malicious Download Protection although this lagged behind the 99.1% of Internet Explorer 10. Chrome has also excelled above the rivals in blocking phishing URLs. Just In Time Hardening (JIT) and Plug-In Security too add plus ones to the chromium camp as these features prevent malicious code snippets taking control over your system behind your back.

Mozilla Firefox Security:

             Firefox too is blessed with numerous security features to keep the users safe from exploits and attacks. Site Identity Button provides an overview of the reputation of the website, owners of the website, whether it’s a verified site etc. enabling you to stay away from suspicious sites that could potentially harm your PC. Private Browsing makes browser forget the web history, user names, passwords, cookies etc while Do-not-track feature enables users to inform web sites not to track their behaviors on the sites. However it should be noted that you are only requesting from the websites not to keep tabs on you, adhering to that is entirely up to the website. Firefox is able to mitigate cross site scripting(XCC) attacks using the content secure policy it has adapted to communicate with the website to filter legitimate content.

            Firefox enjoys automatic updates, therefore users always get to enjoy the latest and most stable version of the software without having to manually update. Blocking of phishing attacks, detecting outdated plug-ins and blocking malware integrating with the anti-virus software installed on your PC are some of the key security features of the browser. However blocking rate of malware attacks by the browser itself is very poor, recording around 4.2% compared to the 99.1% of Internet Explorer 10 and 70.4% of chrome. That being said you are at the mercy of your anti-virus software when malware downloaded into the computer is concerned.


Opera Security:


             Considering the leading rivals Opera is a tiny competitor in the browser arena, with a market share of around 4% or less. However that doesn’t necessarily mean it doesn’t have what it takes to go head to head with the bigger players like Chrome and Internet Explorer. Security-wise Opera too offers a decent set of features to protect its users against attacks. Blocking of malware and phishing URLs is one of the foremost tasks of any browser today, and Opera too protects the users from malicious web pages by automatically scanning the web pages against its huge database of known malware and phishing sites. Opera also allows users to enable do-not-track options and control the right to access geographical location details. Another novel feature is the option to control access rights to the web camera when surfing on social media web sites. Private browsing mode or private tabs feature erases web history, cookies, temporary internet files etc during a private session. Opera scores few points offering 256 bit encryption and extended validation certificates for a safer browsing experience. However 3rd party plug-ins and JavaScript still can pose security threats to the browser.

Conclusion:

               Like there isn't anything called a perfect security system there isn’t anything called a perfect browser, and there never will be. Each of the browser discussed above have their own set of pros and cons, and beats the rivals in some aspects. Internet Explorer 10 is a huge transition from the not so pleasant history of its predecessors, and offers rich set of features to maximize your security online. Its malware detection system is able to detect and block 99.1% of the known malware as revealed by NSS Labs. No other browser comes even closer to that margin, with chrome following from a distant scoring 70.4%. However when blocking phishing URLs is concerned, chrome excels ahead of the rivals. Firefox too offers decent set of security features along with its automatic updates in order to keep the users safe. Whatever the browser you’d be using, understanding that security flaws do exist with any kind of system and sticking to the latest versions of the applications and installing security updates and patches recommended by the manufacturer are important for a secure online experience.




Author Bio:
Maria Tomic is a media software testing expert from IQmango free software provider. Maria is primarily focusing on DVD tools and looking for the best free DVD burning software for Windows 8 computer.

The 10 Most Effective Ways To Extend Your Laptop’s Battery Life

A laptop without a long lasting battery life can be a real nuisance. When you need to look for sockets to constantly charge your laptop it loses all of its charm. Fortunately, there are ways to keep your battery going.
Let's have a look at them.

  1. Don't leave a charged battery unused for extended periods. When the battery is charged, you should use it more than once every two weeks. Also try to make sure that you don't discharge the battery completely.
  2. Don't leave your laptop on standby mode but turn it off completely. Of course placing your laptop in standby mode instead of leaving it on completely will save some battery power, but turning the laptop off will save you a lot more power.
  3. Defragmentation of your laptop should be done on a regular basis. When you do this often, your hard drive will work a lot faster, which will be less demanding on your battery and the hard drive itself. It will make your hard drive a lot more efficient. 
  4. Optimise your power options. Your laptop will give you a few options on how you want to use it. You can go to the power options in the control panel and choose the option max battery for the most efficient power usage effect.
  5. Do not multitask when you use the battery as it will drain more quickly. Instead, stick to using one program at a time. If you want to make sure you get the most of the battery do not let programs run in the background.
  6. Don't demand too much from your PC and chose the programs you use wisely. Activities like playing a DVD or gaming consume less power than programs such as word or email. If you want to use your battery for a long time, stick to the passive activities.
  7. When you lower the graphics you use, your battery will conserve energy. This can be done when you shut off graphic drivers and adjust the screen resolution.
  8. Devices like WiFi and USB drain your laptop battery. Also charging other devices is not advisable.            
  9. Buy a more efficient laptop. New laptops are very energy efficient and some of them even can be used all day long. If you replace an old device with a new one it will give you a quick fix. 
  10. Turn automatic saving options off. Programs like Excel and Word have these options but drain your battery.

Sticking to these simple rules is a sure way to make the most out of your battery. Good luck!



Author Bio:
Rens works for Intralinks, a leading virtual data room provider.

Tips to Prevent Data Loss!

How do you protect yourself from losing important data? Do you save your work as often as possible? Do you do backups? Here are a few effective tips on how to prevent data loss:

Backup your work:

             Backing up your work is simple thing to do: you can use USB’s, CD’s, or external drive, among others, to have a duplicate or backup of your work. Just in case your file was corrupted by whatever reason, you’re sure that you have a secured file stored. You can also try partitioning your hard drive into two: one for the operating system and some programs, while the second partition would be for backup. This way you won’t need to have a separate storage device while preventing data loss.

Use Antivirus and Antispyware Programs:

             Viruses, worms and spywares can delete, modify and corrupt your files. Right after installing programs on your computer, it is a must to install an antivirus and antispyware. Keep your antivirus updated so that it could be effective in preventing viruses. Always scan your computer using antispyware program because spywares could attack your files and give attackers access to it.

Use UPS (Uninterrupted Power Supply):

            Brownouts are unavoidable, so it is advantageous to use UPS. A sudden surge in current could corrupt your files as well as some programs on your computer. While in a middle of encoding your project, you could prevent data loss by using UPS. UPS, could allow you to properly save your work and shutdown your computer, which otherwise would cause files and programs to malfunction.


Don’t try to repair your computer if you’re not qualified to do it:

           If you think that you need to open up your computer because it needs repair, don’t attempt to do it unless you really know what you’re doing. Trying to solve the problem without assistance from a qualified professional could do more damage than good. You could lose not just data, but you could rupture the hardware inside. Or you could harm yourself from electric shock.

Don’t share your file with strangers:

          To protect yourself from data loss, never allow anybody you don’t know to access your important file. You’re never sure what they could do to it. They could steal your work, modify or delete it.

Don’t modify the registry of your Operating System:

          Unless you’re sure what you’re doing, never do changes to the registry. It could harm your operating system that could result in malfunction and loss of some important files.

Useful KeyBoard Shortcuts


Useful KeyBoard Shortcuts

Hi friends! below are the list of keyboard shortcuts which may be helpful for you, if u are good at using keyboard rather than mouse. These keyboard shortcuts may be helpful for you in one or another day when your mouse suddenly stopped working.

Consider you are working on an important info. on a word, suddenly your mouse has stopped working and your mouse pointer is still on your monitor, What would u do to save ur file? Below are the shortcuts for all such worse situations, You don't need to Keep all those in memory, Just remember the shortcuts which you think will help you in such situations from the list of below shortcuts :)

Keyboard Shorcuts (Microsoft Windows)

  1. CTRL+C (Copy)
  2. CTRL+X (Cut)
  3. CTRL+V (Paste)
  4. CTRL+Z (Undo)
  5. DELETE (Delete)
  6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
  7. CTRL while dragging an item (Copy the selected item)
  8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
  9. F2 key (Rename the selected item)
  10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
  11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
  12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
  13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
  14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
  15. SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
  16. CTRL+A (Select all)
  17. F3 key (Search for a file or a folder)
  18. ALT+ENTER (View the properties for the selected item)
  19. ALT+F4 (Close the active item, or quit the active program)
  20. ALT+ENTER (Display the properties of the selected object)
  21. ALT+SPACEBAR (Open the shortcut menu for the active window)
  22. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneou sly)
  23. ALT+TAB (Switch between the open items)
  24. ALT+ESC (Cycle through items in the order that they had been opened)
  25. F6 key (Cycle through the screen elements in a window or on the desktop)
  26. F4 key (Display the Address bar list in My Computer or Windows Explorer)
  27. SHIFT+F10 (Display the shortcut menu for the selected item)
  28. ALT+SPACEBAR (Display the System menu for the active window)
  29. CTRL+ESC (Display the Start menu)
  30. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
  31. F10 key (Activate the menu bar in the active program)
  32. RIGHT ARROW (Open the next menu to the right, or open a submenu)
  33. LEFT ARROW (Open the next menu to the left, or close a submenu)
  34. F5 key (Update the active window)
  35. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
  36. ESC (Cancel the current task)
  37. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box - Keyboard Shortcuts:

  1. CTRL+TAB (Move forward through the tabs)
  2. CTRL+SHIFT+TAB (Move backward through the tabs)
  3. TAB (Move forward through the options)
  4. SHIFT+TAB (Move backward through the options)
  5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
  6. ENTER (Perform the command for the active option or button)
  7. SPACEBAR (Select or clear the check box if the active option is a check box)
  8. Arrow keys (Select a button if the active option is a group of option buttons)
  9. F1 key (Display Help)
  10. F4 key (Display the items in the active list)
  11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts:

  1. Windows Logo (Display or hide the Start menu)
  2. Windows Logo+BREAK (Display the System Properties dialog box)
  3. Windows Logo+D (Display the desktop)
  4. Windows Logo+M (Minimize all of the windows)
  5. Windows Logo+SHIFT+M (Restorethe minimized windows)
  6. Windows Logo+E (Open My Computer)
  7. Windows Logo+F (Search for a file or a folder)
  8. CTRL+Windows Logo+F (Search for computers)
  9. Windows Logo+F1 (Display Windows Help)
  10. Windows Logo+ L (Lock the keyboard)
  11. Windows Logo+R (Open the Run dialog box)
  12. Windows Logo+U (Open Utility Manager)
  13. Accessibility Keyboard Shortcuts
  14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
  15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
  16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
  17. SHIFT five times (Switch the StickyKeys either on or off)
  18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
  19. Windows Logo +U (Open Utility Manager)
  20. Windows Explorer Keyboard Shortcuts
  21. END (Display the bottom of the active window)
  22. HOME (Display the top of the active window)
  23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
  24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
  25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
  26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
  27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map:

After you double-click a character on the grid of characters, you can move through the grid by using the below keyboard shortcuts:

  1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
  2. LEFT ARROW (Move to the left orto the end of the previous line)
  3. UP ARROW (Move up one row)
  4. DOWN ARROW (Move down one row)
  5. PAGE UP (Move up one screen at a time)
  6. PAGE DOWN (Move down one screen at a time)
  7. HOME (Move to the beginning of the line)
  8. END (Move to the end of the line)
  9. CTRL+HOME (Move to the first character)
  10. CTRL+END (Move to the last character)
  11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts

  1. CTRL+O (Open a saved console)
  2. CTRL+N (Open a new console)
  3. CTRL+S (Save the open console)
  4. CTRL+M (Add or remove a console item)
  5. CTRL+W (Open a new window)
  6. F5 key (Update the content of all console windows)
  7. ALT+SPACEBAR (Display the MMC window menu)
  8. ALT+F4 (Close the console)
  9. ALT+A (Display the Action menu)
  10. ALT+V (Display the View menu)
  11. ALT+F (Display the File menu)
  12. ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts:

  1. CTRL+P (Print the current page or active pane)
  2. ALT+Minus sign (-) (Display the window menu for the active console window)
  3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
  4. F1 key (Open the Help topic, if any, for the selected item)
  5. F5 key (Update the content of all console windows)
  6. CTRL+F10 (Maximize the active console window)
  7. CTRL+F5 (Restore the active console window)
  8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
  9. F2 key (Rename the selected item)
  10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation:

  1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
  2. ALT+PAGE UP (Switch between programs from left to right)
  3. ALT+PAGE DOWN (Switch between programs from right to left)
  4. ALT+INSERT (Cycle through the programs in most recently used order)
  5. ALT+HOME (Display the Start menu)
  6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
  7. ALT+DELETE (Display the Windows menu)
  8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
  9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts:

  1. CTRL+B (Open the Organize Favorites dialog box)
  2. CTRL+E (Open the Search bar)
  3. CTRL+F (Start the Find utility)
  4. CTRL+H (Open the History bar)
  5. CTRL+I (Open the Favorites bar)
  6. CTRL+L (Open the Open dialog box)
  7. CTRL+N (Start another instance of the browser with the same Web address)
  8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
  9. CTRL+P (Open the Print dialog box)
  10. CTRL+R (Update the current Web )

Renew the old: Steps to Sync Older Program with Windows 8

Windows 7 was released back in 2009 and it has been doing its pants well in the market. And many companies to make their customers happy had developed software that had the capacity to sync with the lucrative Windows 7. But then Microsoft thought, it has been long time that we haven’t shown any big changes in the market, and then it introduced its Windows 8. But, what will happen of the software that was designed to run on a specific version of Windows. And this definitely means that it means a big-bad time for them.

Renew the old: Steps to Sync Older Program with Windows 8

But probably this article may bring you good news! In case your old programs just says “Not Allowed” when you try to run it on Windows 8, you still may have a chance left for you as there is a secret option of Compatibility mode. Growing deeper, this mode tricks programs into thinking that they're running under their favourite older version of Windows, letting them run in comfort.

And when your old program has problems in showing them on Windows 8, you may simply follow these steps and it may probably help you to come out of the messy situation.

Note: The Windows 8 Compatibility Mode works only for programs written for Windows Vista or later Windows versions. That won’t help programs written for Windows XP or earlier Windows versions.
  1. To start the process you first need to right-click the program's icon and then choose Properties.
  2. After a moment when you can clearly see the Properties dialog box appears, simply click the Compatibility tab. 
  3. After that go to the Run Compatibility Troubleshooter button and hit it.
  4. At this the system uses its own and complex process and asks Windows 8 to try and guess what version of Windows your program needs, and then it applies the changes. If the program begins working, you're through. Congratulations!
  5. In case the program still fumbles with your newly adopted Windows 8 then you can go back to Step 2. There simply go in the Compatibility Mode section, select the Run This Program in Compatibility Mode for check box and select the program's desired Windows version from the drop-down list.
  6. Also do check the program’s box or its manual to know which version is it compatible with. Click OK and then try running your program again to see whether it works better.

But even after the whole ruffle-shuffle process your program still doesn’t be friends with you; probably you need to upgrade it to a newer version.



Author Bio:
             Authored by Amyclaus. For more hardware issues find mytechgurus or by follow Plus 1 @ Google+

With Windows 8, comes a new web browser- Internet Explorer 10

With Windows 8, comes a new web browser- Internet Explorer 10

With the launch of Windows 8 came the new avatar of the Internet Explorer family- Internet Explorer 10.Internet Explorer 10 is the first ever iteration of IE browser made for touch screen platform and is the default browser on Windows 8 machines. IE 10 offers one platform that gives you two browsing experiences: One, which is optimized for touch-enabled devices and the other, which gives a familiar browsing experience on usual desktops.

What’sNew in Internet Explorer 10:

Two aspect of the same browser where one renders touch screen experience and the other renderstraditional desktop experience. The homescreen though is same for both. Other than its complete transformation to touch, IE10 supports multi-column, multi-grid and a multi-flexible box layout.

By default, IE10 keeps you on the traditional browsing experience (to follow links), in which you go on your web browser, run a search and then click on the link to visit the page. Now in Internet Explorer 10, you can change this default setting, switch to a built-in Lockstep (on Windows 8), and enjoy the Metro Style applications.

You can decide the settings of the tiles that open in your Internet Explorer 10 browser. These settings can be applied on Start screen as well as individual sites, which are pinned on your start page.

Enhanced Protect Mode is new in Internet Explorer 10, which extends the normal protected mode of your web browser. This mode prevents attackers from modifying settings and installing any malicious or unwanted software into your browser. Additionally, this mode adds further restriction on accessing personal information by restricting locations that houses your personal information. This section is accessible only if you permit.

IE 10 also restricts access to any valuable information on a corporate network resource by restriction internet tab processes to access user’s domain credentials, by not allowing internet tab processes to operate as a local web server and by restricting internet tab processes to make any connections to intranet servers.



Author Bio:
Authored by Amyclaus.Need Remote Assistance- Mytechgurus. Get affordable technical support for resolving technical issues with computers and for computer repair.Online services and free Guaranteed Remote Computer Repair is here mytechgurusinc.

10 Easy Steps to Speed Up Your Computer Without Upgrading

             It seems that the longer you own your computer, the slower it gets! A lot of people will keep their computer until it gets so slow that they feel they need a newer, faster model. Some feel like the reason it is getting slower is because it is getting older, when that is just not the case. Your computer should run just as fast as the day you brought it home – if you follow these 10 Easy Steps to Speed Up Your Computer.


1). Empty the Temp directory regularly:

                Every time you launch a program, it creates a temporary file, until you either save or close the file. The reason it does this is in case your system crashes or gets turned off (before saving the file), it will be possible to recover the unsaved file you were working on. This is a good idea, but rarely works. Every time your system crashes, locks up, or gets turned off while you have open files, these temp files get created and just sit there in the Temp directory. Then, every time you launch a program, it looks through all of the temp files (to see if one needs to be recovered) and slows the open process, and in some rare cases, even locks up when trying to launch. In any event, the launch process is slowed.

Other ways of getting unneeded temp files is by installing programs. Most programs that get installed extract temp files (needed during the installation) to the temp directory, but a lot of times don’t get deleted when the installation is complete.

Windows also uses the temp directory for its temp files, for recovery purposes and ongoing use.

After a short while, the temp directory fills up with hundreds (and I have even seen thousands) of temp files that always get scanned over when Windows starts up and when programs launch. This slows everything down immensely.

Rule of thumb for Temp Files: If you don’t have any programs open (and nothing minimized in the bar below), then you shouldn’t have ANY temp files in your temp directory. If you do, delete them.

To delete Temp files, make sure NO programs are open, and…

a. In Windows 95, 98 or Me, go to C:WindowsTemp and delete everything inside the Temp folder.

b. In Windows 2000 or XP, it is a little trickier. First, make sure that you can see hidden folders. Double-click My Computer. Click on the Tools pull-down menu, and then on Folder Options. Click on the View tab. Scroll down and click on Show Hidden Files and Folders. Click Ok. Now you can go to the

C:Documents and SettingsAdministratorLocal SettingsTemp folder. Delete everything here.
Also, look in the
C:Windows(or Winnt)Temp or Tmp folders. Delete everything here, as well.

Note: this assumes that your logon ID is Administrator. If the main account is not Administrator, or if there are more than one account, substitute “Administrator” for the account names, and delete the temp files from all of the C:Documents and Settings(account name)Local SettingsTemp folders.


2). Empty the Temporary Internet Files regularly:

                 This is similar to the Temp directory, but for images and cookies while browsing websites. Every time you go to a website, your browser will look through your list of temporary Internet files, to see if you have all of the images needed to view your requested web page. If it is a very long list, it will delay your view time. However, if you have a dial-up, this is the lesser of two evils. If you already have the needed images, it is quicker (for a dial-up) to look through your temporary Internet files, than to download new images every time you visit a website.

On the other hand, if you have a broadband Internet connection (highspeed CableModem, DSL, Wireless, etc.), and you want a little more snap in your surfing, then you should delete your Temporary Internet Files on a regular basis, and choose to Check for Newer Images on Every Visit to a web page.

To empty Temporary Internet Files:
               Go to your Control Panel, by click on the StartSettingsControl Panel (or in Windows XP, just StartControl Panel) and double-click the Internet Options icon. Choose to Delete Cookies, and to Delete Files. This will clear all of your Temporary Internet Files.

To have Internet Explorer always check for new images and content on every visit to a web page, to the right of the Delete Files button, is the Settings button. Click this button and choose Every Visit to the Web Page. This option never has Internet Explorer look through your Temporary Internet Files to see if you already have the images needed. This way, Internet Explorer will just automatically download every image, every time, without looking through a list. If you have a good Internet connection, this is the better way to go. Don’t forget to delete your Temporary Internet Files every once in a while (see above).


3). Check your hard disks for problems:

                   There are two different types of disk checks: one is a file check, which checks the state of your operating system, checks all of your files, your file structure, and other software checks. If there are software problems (such as a corrupt FAT (file allocation table), etc., this check will attempt to fix it. The other is a physical hardware disk check. This checks the surface of your hard disks, to see if there are bad sectors (sections) of your hard drive, to see if your drive is physically experiencing problems. This disk check will attempt to repair the bad sectors, but if it can’t, it will mark the sector as bad and attempt to move the file(s) or file “pieces” to a good sector(s) of the disk. By marking the sector as bad, it knows not to write any future files to this section of the hard drive.

To run a disk check (or scan disk), here are the steps:

a. For Windows 95, 98, or Me, double-click My Computer. Right-click the C-drive and click on Properties. Click on the Tools tab and choose to check the computer for problems. If you choose to do a Thorough Scan, this will do the hardware check for physical disk damage or sector damage. Otherwise, the Standard Scan does the software file check. In either case, you can choose to have the scan automatically fix any errors it finds. The Thorough Scan does take quite a bit longer. You may want to let this run over night. Only do the Thorough Scan when you think there may be a problem with your drive itself, or if you haven’t run it in a few months, otherwise, run the Standard Scan once a week or so.

b. For Windows 2000 and XP, double-click My Computer. Right-click the C-drive and click Properties. Click on the Tools tab and choose to check the computer for problems. Click on Check Now. You will then have two check boxes. The top option is for the file check, and the second option is for the hardware (physical disk) check. Check either one, or both. At least check the top one. Again, if you think you may be having problems with the hard disk itself, then check the second one, as well. And just like the Windows 98 Thorough Scan, this will take quite a bit longer to run, so let it run over night. One thing, though: For Windows 2000 and XP, you won’t be able to run the check right then. After clicking the Start button (once the check boxes are checked), you will need to reboot to run the disk check. It will ask you if you want the system to run the CHKDSK on reboot. Choose Yes and reboot. Just before getting back into Windows, the system will do its CHKDSK, and depending on which options you chose, will take either a few minutes, and sometimes up to an hour or so, to run. Let it run.


4). An even more thorough disk check (and tune-up):

                     It would be to use a 3rd party utility (a stand-alone program outside of Windows) to check everything for you, automatically. One of my favorites is TuneUp Utilities 2004. It costs $39.99, but they do offer a FREE download trial of 15 days, to check it out to see if it speeds up your computer and/or fixes any problems. This program does a really good job of not only checking your computer’s file structure, master boot record, file allocation table, and files, but also an extremely good job of detecting and fixing bad sectors of your physical disk drives. And not only that, it also tunes up your system for increased speed, checks and cleans your registry, adjusts memory for you, tweaks your Internet settings for faster downloads and browsing (whether you use a dial-up or broadband), and streamlines your operating system for peak performance.


5). Don't want the TuneUp Utilities:

                   If you don’t want to get the TuneUp Utilities 2004, you can do a few of the performance tweaks yourself, if you have Windows XP. By default, EVERYTHING is turned on in Windows XP. It isn’t very streamlined for performance, but rather for appearance. You can turn off a few of the unnecessary features, and Windows will still work just fine, and maybe a little faster.

             To do this, right-click on My Computer and click on Properties. Click on the Advanced tab. Under the Performance section, click on the Settings button. On the Visual Effects tab, you will see a list of check boxes. By default, these are all on. You really don’t need any of them. If you choose one of the radio buttons at the top, say, Adjust for Best Performance, then all of the check boxes will turn off. This will noticeably speed up your computer. You can go through the check boxes one by one, and determine which ones you can and can’t live without. The one that will make the biggest effect is the very last one in the list. This is the Themes. If you turn it off, it will free up a lot of system resources and give you quite a bit more memory to work with, but Windows XP will look more like Windows 2000. For most people, this isn’t a problem. It is all eye-candy, anyway. Your pretty green pasture picture will disappear; your pretty green and blue buttons and task bar will go to a gray. If you can live with these things, then you will have much more performance. You will find that menus open up much more quickly and everything responds more immediately.



6). Turn off Active Desktop:

                  Active Desktop turns your desktop into a web page, and allows you to have things like a real-time calendar, and up-to-the-minute weather or stocks. These things are really neat, but your system takes a performance hit when they are running in the background all the time. And even if you don’t use Active Desktop for anything, just having it active can cause a performance decrease. Turn it off.

a. In Windows 95, 98 and Me, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Active Desktop. If there is no check next to it, then it isn’t on. Don’t choose it. Instead, just click the desktop again to get out of the menu.

b. In Windows 2000, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Show Web Content. Again, if there is no check next to it, then it is not on. Do not check it.

c. In Windows XP, right-click on the desktop and in the pop-up menu, choose Properties. On the Desktop tab, choose Customize Desktop. Now, on the Web tab, make sure that there are no websites chosen here. If there aren’t any, then Active Desktop is not on. Cancel and go back to the desktop.


7). Install and run a good AntiVirus program: 

                  Install and run a good AntiVirus program to keep out viruses and Trojan horses that can take over your system. If you have a virus(s), your system performance can be dramatically decreased. Viruses can do all kinds of nasty things to your computer. They can take over your computer, erase your hard drive, use your computer as a server, give you a bunch of illegal music or programs and tell all of their friends to download it all from you – leaving you holding the bag and supplying the computer space and bandwidth for their hobby. So, protect yourself with a good AntiVirus program. One of my favorites is AVG. It is not only a really good AntiVirus program, but it is also FREE! If you don’t have any AntiVirus software on your computer, get AVG AntiVirus NOW by downloading HERE. If you already have an AntiVirus program, and you want to use AVG instead, do NOT install AVG. First, uninstall your current AntiVirus program, reboot and install AVG. You do NOT want to have two AntiVirus programs installed at the same time. They will work against each other and can cause problems.


8). Get rid of Spyware:

                 A lot of computer users have Spyware and don’t even know they have it, much less how to get rid of it. If your computer has been taking you to websites that you don’t want to go to, or if you get pop-ups when you aren’t even on the Internet, or if your computer has been running extremely slowly lately, for no reason, you probably have Spyware.

On all of the computers that I setup, I install two different AntiSpyware programs: AdAware SE and SpyBot. These two programs are highly recommended by TechTV (G4) and other computer authorities (including my own research on Spyware) and work very well together. They compliment each other and catch Spyware that the other misses, but together, do a very good job.

SpyBot is not only a good program for getting rid of Spyware, but also as a preventative Spyware-catcher. It sits there and looks for known Spyware coming into your system, as well as suspicious-looking content. If you use the Tea-Timer feature, it can be a little annoying, but ANY suspicious-looking program, trying to be installed on your system, is flagged and your permission is asked for it to be installed (now and always).

AdAware SE has a little better Spyware database in it, but is not setup as a preventative AntiSpyware program. It does do a good job when you keep up on the updates and manually scan your system with AdAware.

If, after downloading and installing, updating, and running both of these AntiSpyware program, you still can’t get rid of your Spyware, you may need to enlist the services of a professional. Some Spyware is so intelligent that it looks to see if AntiSpyware programs delete the Spyware part of its programming and, if it’s gone, reinserts it back in place. This can be very frustrating for the user (and in some cases, even for the professional). There are stronger measures that can be taken to get rid of the Spyware, in cases like this, but can be very devastating to the user’s computer, if not handled perfectly. At this point, leave it to the professional. Call a local computer repair company and have them come out to your home or business and get rid of the Spyware for you.

In some cases, when the Spyware has become too entwined into your system, even a computer repair technician can’t get rid of the Spyware. At this point, it is better to just backup only what you need and have the operating system reinstalled. Believe me, when your computer gets to this point, you don’t want to just put a “band-aid” on it. Just start from scratch with a clean system. It’s the best way to go.


9). Streamline MSCONFIG:

                  One thing that really causes a HUGE performance decrease is to have unnecessary programs running in the background. Some of these programs can be seen in your System Tray (located next to the clock, in the lower-right corner of your screen). These are tiny programs that are robbing you of memory and processing power. Some of them you need, while most you don’t. Some of the programs you DON’T need are printer icons, CD burning icons, shortcuts to programs (such as video settings), AOL, any Instant Messaging Programs, etc. Just because these programs aren’t always running, doesn’t mean that you still can’t print, burn CDs or Instant Message. They can be run when you need them, from a shortcut.

You can use a utility, called MSCONFIG, to turn OFF unnecessary Start Up items.

a. In Windows 98, Me, and XP, click on StartRun and type msconfig. Click on the Startup tab. This is a list of everything that is running in the background, some of which show up in the System Tray. Now, be careful, some of these you do need. Some items to keep are Ctfmon.exe (XP), Scan Registry (Win98, Me), Task Monitor (Win98, Me), System Tray (Win98, Me), LoadPowerProfile (Win98, Me), Rundll.32, any AntiVirus programs (such as McAfee, Norton, or AVG). Others, you can uncheck, such as NeroCheck, ypager, qttask, AOL, and any other Instant Messaging programs, or printing programs. Remember, if something doesn’t work, because you turned it off, it can always be turned back on. You just have to reboot every time you make a change here. But, as you uncheck the unnecessary programs that run in the background, you will see that Windows loads much faster, that there are less icons in the System Tray, and that your system is much more “snappy” and quick to respond.

b. In Windows 2000, MSCONFIG wasn’t supplied. You actually have to download and run an MSCONFIG utility. A Google Search on "MSCONFIG utility" leads you to the download page, you can download this software from there. And if you copy it into your C:Windows(or Winnt)System32 folder, you can access it the same way as Windows 98 or XP (by the Run command in the Start menu). Or, you can just double-click it and use it that way, too. See above for what to leave checked and unchecked.

After you reboot, you will have a window that says that the configuration utility was edited. Just check not to show that in the future, a check box at the bottom. This just means that there was a change made to the MSCONFIG.


10). Defragment your hard drives:

                  If you have never done this, or it has been a few months since the last time, this step is one of the most important things that will give you more performance. As you use your computer, your drives become fragmented, by creating and deleting files. Just because a file is 10mb in size, doesn’t mean that it is sitting there on the drive (all 10mb) all in one spot on the drive. It fills in from the inside of the drive, outward, as the drive finds room. So your one file can be in pieces, in several spots on the hard drive. Don’t worry, your file allocation table keeps track of where the pieces are, however, it takes longer to access a file that is in pieces (fragmented), than a file that IS all in one spot on the hard drive. This is where defragmenting comes in. When you defragment your hard drive, this process copies all of the pieces to temporary spots on the hard drive, and then fills in all of the files (in their entirety) from the inside, out, so that no files are split into pieces. This dramatically speeds up the seek time, as well as speeds up the use of your files and programs.

NOTE: to efficiently defragment a hard drive, it likes to have 25% free space. It can still do the defragmentation with only 15% free space, but it takes quite a bit longer. If you can, delete any unnecessary files before deframenting your drives.

a. To defragment your hard drives (in any Windows operating system), double-click on My Computer. Right-click on the c-drive and click on Properties. Click on the Tools tab and choose the bottom button, to Defragment Now… Click on the appropriate drive, and then on Defragment. This can take some time. Depending on your processing power, the amount of RAM you have available, the size and speed of your drive, and a few other things, this process can take 20 minutes, or hours. It is best to let this one run over night, as well, but it is well worth it.

Good luck. I hope this article has helped you. If you live in the Lapeer, Genesee, or Tuscola County, Michigan areas, and would like an IT Professional to do a professional TuneUp on your computer(s) in your home or business, please contact Lapeer Tech Group at (810) 793-1093, or visit our website at www.LapeerTechGroup.com. You can email us at info@LapeerTechGroup.com.




Author Bio:
              Jim Shutes have worked in the IT field since 1989 and hold several Microsoft certifications. I am a network administrator and owner and operator of Lapeer Tech Group located in Columbiaville Michigan (just outside of Lapeer). During these years I have supported both Macs and PCs am an accomplished graphic and web designer and have had the opportunity to support 2nd and 3rd level enterprise networks for GM EDS Delphi and Delco.