<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Pc tips and tricks for you..</title><description>Cool place to hang on for Tips and tricks on your windows platform...:)</description><managingEditor>noreply@blogger.com (Arjun)</managingEditor><pubDate>Sun, 1 Sep 2024 17:55:19 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">54</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://pctipsntrickz.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Cool place to hang on for Tips and tricks on your windows platform...:)</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Funny notepad trick...Hack your friend's keyboard and make it to appear "You are a fool" continously</title><link>http://pctipsntrickz.blogspot.com/2011/03/funny-notepad-trickhack-your-friends.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 30 Mar 2011 08:19:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-681994355613837443</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The trick..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;/b&gt;Today,we can learn a new trick of how to hack and prank your friend's pc by making repeated&amp;nbsp;occurrence of the text "You are a fool" from the same old classic note pad in windows.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;How to implement it??&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;/b&gt;Its very easy to implement it...Just copy and paste the VB script from below and save it as "yourfilename.bat"&amp;nbsp;&amp;nbsp;with .bat extension&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The code::&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal; line-height: 17px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Set wshShell = wscript.CreateObject(“WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “You are a fool.”&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;loop&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: normal; line-height: 17px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: normal; line-height: 17px;"&gt;Note:Use the script just to joke your friend and don't repeat it again and again which may annoy your friend or don't use it with unknown person...Enjoy pranking...:)&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Changing Start menu name in windows xp...Its free...!!!</title><link>http://pctipsntrickz.blogspot.com/2011/03/changing-start-menu-name-in-windows.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 30 Mar 2011 07:59:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-3493049676775589377</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;Sometimes when we see the classic start menu option in the windows xx(any version),we see a 'START' label in the button of start menu,which becomes bored and monotonous after some years of using windows.But there is a way of changing the label name of the start menu button.So,let us try to experiment it.&lt;br /&gt;
&lt;b&gt;First step:Modify the explorer.exe file using resource hacker:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
We sh&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;ould download resource hacker,by which we can modify,edit,insert and delete .res(resource) files in windows.Download the resource hacker from &lt;span class="Apple-style-span" style="color: blue;"&gt;&lt;a href="http://www.users.on.net/johnson/resourcehacker/"&gt;here&lt;/a&gt;. &lt;/span&gt;First make a copy of explorer.exe found in c:\windows\explorer.Start reso&lt;/span&gt;urce hacker and then locate explorer.exe.We are using string table now.Expand the string 37 followed by highlighted 1033.If you are using classic layout locate the string 38.we are going to modify the item 578 labeled as start.Just double click on the start string and then modify the name excluding the label and then its half done.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;Second step:Modify the registry files&lt;/b&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Now the name is modified,we need to do some modification &amp;nbsp;in the registry to display the final label name.Go to Start-&amp;gt;Run-&amp;gt;Regedit or win key+R then,follow the path..&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;HKEY_LOCAL_MACHINE\ SOFTWARE\ &lt;/span&gt;Microsoft\ Windows NT\ CurrentVersion\ Winlogon&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;And in the right pane double click the shell entry to open the edit string box and in the value string data enter the name you gave to modify(Eg: pctips.exe) and then give ok and then logoff and login again or reboot the entire system and when you are back in you should now see your own customised modified start menu label in your system..Enjoy customizing...:)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Use flash block in google chrome and block the flash content</title><link>http://pctipsntrickz.blogspot.com/2011/01/use-flash-block-in-google-chrome-and.html</link><category>Browser tweaks</category><author>noreply@blogger.com (Arjun)</author><pubDate>Thu, 13 Jan 2011 23:57:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-5607921940638895321</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Go through the link&amp;nbsp;&lt;a href="https://chrome.google.com/extensions/detail/gofhjkjmkpinhpoiabjplobcaignabnl?hl=en"&gt;https://chrome.google.com/extensions/detail/gofhjkjmkpinhpoiabjplobcaignabnl?hl=en&lt;/a&gt;&amp;nbsp;to download flash block to your chrome browser.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;What it actually does&lt;/span&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: #333333; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The extension automatically blocks flash content on webpages.&lt;br /&gt;
Each flash element is being replaced with a placeholder that allows you to load only selected elements on a given page. You can also manage a whitelist of allowed websites via a configuration panel.&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;In general, FlashBlock helps with lowering memory usage, reducing&amp;nbsp; cpu cycles,&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;and can be used as an alternative to AdBlock.&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_l9aNykVSwoI/TTABtgNoTXI/AAAAAAAAAUQ/spZ0K7llsNI/s1600/google_chrome_flashblock_thumb%255B3%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="264" src="http://1.bp.blogspot.com/_l9aNykVSwoI/TTABtgNoTXI/AAAAAAAAAUQ/spZ0K7llsNI/s320/google_chrome_flashblock_thumb%255B3%255D.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #333333; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Technical details&lt;/span&gt;:&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;To whom it may concern, FlashBlock holds flash elements from being loaded on the page level, hence requires access to the page's content (aka private data).&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;It works completely locally, and does not read,use,load or transmit any data, thus guarantees user privacy and safety.&lt;br /&gt;
The code is open-sourced and can be reviewed easily.&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/_l9aNykVSwoI/TTABtgNoTXI/AAAAAAAAAUQ/spZ0K7llsNI/s72-c/google_chrome_flashblock_thumb%255B3%255D.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>20 Windows Keyboard Shortcuts You Might Not Know !!</title><link>http://pctipsntrickz.blogspot.com/2010/12/20-windows-keyboard-shortcuts-you-might.html</link><category>Pc tips</category><category>tricks</category><author>noreply@blogger.com (Arjun)</author><pubDate>Tue, 21 Dec 2010 21:00:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-9028477552249049139</guid><description>&lt;span class="Apple-style-span" style="border-collapse: collapse; color: #333333; font-family: Verdana; font-size: 14px;"&gt;Mastering the keyboard will not only increase your navigation speed but it can also help with wrist&amp;nbsp;fatigue. Here are some lesser known Windows shortcuts to help you become a keyboard ninja&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="border-collapse: collapse; color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="border-collapse: collapse; color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: 18px; font-weight: bold;"&gt;Global Windows Shortcuts:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+1, 2, 3, 4, etc.&amp;nbsp;&lt;/strong&gt;will launch each program in your taskbar. It is helpful then to keep your most used programs at the&amp;nbsp;beginning&amp;nbsp;of your task bar so you can open them one right after another. This also works in Windows Vista for the quick launch icons.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGEmu7-bAI/AAAAAAAAATk/4aMsiesxEEU/s1600/taskbar.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="64" src="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGEmu7-bAI/AAAAAAAAATk/4aMsiesxEEU/s320/taskbar.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+Alt+1, 2, 3, etc.&lt;/strong&gt;&amp;nbsp;will open the jump list for each program in the taskbar. You can then use your arrows to select which jump list option you want to open.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGEn2LkksI/AAAAAAAAATo/Y5fL-Srouz8/s1600/taskbar-jump-list.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGEn2LkksI/AAAAAAAAATo/Y5fL-Srouz8/s320/taskbar-jump-list.png" width="162" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+T&lt;/strong&gt;&amp;nbsp;will cycle through taskbar programs. This is similar to just hovering over the item with your mouse but you can launch the program with Space or Enter.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/_l9aNykVSwoI/TRGEpJrH5FI/AAAAAAAAATs/h5fA-ngEdUo/s1600/taskbar-win-t.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="158" src="http://4.bp.blogspot.com/_l9aNykVSwoI/TRGEpJrH5FI/AAAAAAAAATs/h5fA-ngEdUo/s320/taskbar-win-t.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+Home&lt;/strong&gt;&amp;nbsp;minimizes all programs except current the window.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+B&lt;/strong&gt;&amp;nbsp;selects the system tray which isn’t always useful but can come in very handy if your mouse stops working.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/_l9aNykVSwoI/TRGEl2l-r3I/AAAAAAAAATg/vV4-8ONSBVY/s1600/system-tray.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://4.bp.blogspot.com/_l9aNykVSwoI/TRGEl2l-r3I/AAAAAAAAATg/vV4-8ONSBVY/s1600/system-tray.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+Up/Down&lt;/strong&gt;&amp;nbsp;maximizes and restores down the current window so long as that window has the option to be maximized. It is exactly the same as clicking on the middle button on your windows.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Alt+Esc&lt;/strong&gt;&amp;nbsp;is like Alt+Tab but switches windows in the order they were opened and does not have the fancy window preview overlay.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Win+Pause/Break&lt;/strong&gt;&amp;nbsp;will open your system properties window. This can be helpful if you need to see the name of a computer or simple system statistics.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_l9aNykVSwoI/TRGEsZiYHJI/AAAAAAAAAUE/VbrcvilTQgo/s1600/system-properties.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="100" src="http://2.bp.blogspot.com/_l9aNykVSwoI/TRGEsZiYHJI/AAAAAAAAAUE/VbrcvilTQgo/s320/system-properties.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Ctrl+Esc&lt;/strong&gt;&amp;nbsp;can be used to open the start menu but will not work as a Windows key replacement for other shortcuts.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Ctrl+Shift+Esc&lt;/strong&gt;&amp;nbsp;will open the task manager without needing to hit Ctrl+Alt+Del first.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_l9aNykVSwoI/TRGFV-8FIgI/AAAAAAAAAUI/ffaYs-hin3Y/s1600/task-manager.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="165" src="http://2.bp.blogspot.com/_l9aNykVSwoI/TRGFV-8FIgI/AAAAAAAAAUI/ffaYs-hin3Y/s320/task-manager.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;strong style="font-style: normal; font-weight: bold;"&gt;Alt+Space&lt;/strong&gt;&amp;nbsp;will open the window system menu which can be used to maximize (x), minimize (n), close (c), or move (m) the window&amp;nbsp;which can be especially helpful if your window is somehow off-screen. This shortcut can also be helpful with windows that don’t close with the Alt+F4 shortcut such as the command window.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_l9aNykVSwoI/TRGErw1b3yI/AAAAAAAAAUA/yZPTEz9W3xE/s1600/system-menu.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/_l9aNykVSwoI/TRGErw1b3yI/AAAAAAAAAUA/yZPTEz9W3xE/s1600/system-menu.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px; font-weight: normal;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: 18px;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;Windows Explorer Shortcuts&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium; font-weight: normal;"&gt;:&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;Here are handy shortcuts built into Windows Explorer which may have similar features in other programs too.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;Alt+Up&lt;/span&gt;&amp;nbsp;will navigate up one folder level since the up arrow on the menu bar was removed in Windows Vista.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;Shift+F10&lt;/span&gt;&amp;nbsp;opens the contextual or “right click” menu for a file/folder. This can be very handy for speed especially if you know which option you want to select. Look for an underlined letter in each option to know which letter you can press for faster access.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;a href="http://1.bp.blogspot.com/_l9aNykVSwoI/TRGEpy1sxjI/AAAAAAAAATw/7rzIByVXihI/s1600/context-menu.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="165" src="http://1.bp.blogspot.com/_l9aNykVSwoI/TRGEpy1sxjI/AAAAAAAAATw/7rzIByVXihI/s320/context-menu.png" width="320" /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: #333333;"&gt;&lt;span class="Apple-style-span" style="color: #172232;"&gt;&lt;span class="Apple-style-span" style="color: #333333;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: Verdana, sans-serif;"&gt;&lt;span style="font-style: normal;"&gt;Shift+Del&lt;/span&gt;&amp;nbsp;deletes a file without sending it to the recycle bin because who wants to empty their recycle bin anyway?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;Ctrl+Shift+N&lt;/span&gt;&amp;nbsp;creates a new folder in your current directory.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;Alt+Enter&lt;/span&gt;&amp;nbsp;opens the file properties so you can view file size, sharing settings, and creation date.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;a href="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGErcSNyeI/AAAAAAAAAT8/vImS6m221mo/s1600/file-properties.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="254" src="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGErcSNyeI/AAAAAAAAAT8/vImS6m221mo/s320/file-properties.png" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;F2&lt;/span&gt;&amp;nbsp;renames a file or folder.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;F3&lt;/span&gt;&amp;nbsp;will open explorer and select the search bar. If you already have an explorer window open it will highlight the search bar. In some programs it will also open the search dialog to search within that program.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;a href="http://2.bp.blogspot.com/_l9aNykVSwoI/TRGEqY6V6mI/AAAAAAAAAT0/7x-FHQvz288/s1600/explorer-search.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="211" src="http://2.bp.blogspot.com/_l9aNykVSwoI/TRGEqY6V6mI/AAAAAAAAAT0/7x-FHQvz288/s320/explorer-search.png" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;F6&lt;/span&gt;&amp;nbsp;cycles objects in the current window. In explorer this will cycle between the location bar, options bar, left pane, and right pane. It also works with varying&amp;nbsp;success&amp;nbsp;in other programs.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span style="font-style: normal;"&gt;F10&lt;/span&gt;&amp;nbsp;toggles the file menu in explorer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;a href="http://1.bp.blogspot.com/_l9aNykVSwoI/TRGEq5Ov6tI/AAAAAAAAAT4/R1_9aayKrxc/s1600/file-menu.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/_l9aNykVSwoI/TRGEq5Ov6tI/AAAAAAAAAT4/R1_9aayKrxc/s1600/file-menu.png" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;span class="Apple-style-span" style="color: black; font-family: arial, sans-serif; font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 14px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/_l9aNykVSwoI/TRGEmu7-bAI/AAAAAAAAATk/4aMsiesxEEU/s72-c/taskbar.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">6</thr:total></item><item><title>Intel Core i7 CPU Review</title><link>http://pctipsntrickz.blogspot.com/2010/12/intel-core-i7-cpu-review.html</link><category>Tech gadgets</category><author>noreply@blogger.com (Arjun)</author><pubDate>Fri, 17 Dec 2010 21:45:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-3743260641463463104</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The Intel core i7 cpu's are some of the strongest chips that have already come down the pipe thus far. These are chips for the serious multi-tasker. These are CPU's for the hardcore gamer, the video editor, the music producer and anybody else that wants a lot of power going to numerous distinctive processes.&lt;br /&gt;
&lt;br /&gt;
You might be gaming in vast 3D land scapes or making use of Maya to sculpt your own, it doesn't matter, the i7 can deal with it. I have a pair of core i7 personal computers&amp;nbsp;&amp;nbsp;I use. I game with one, and do my video and audio work on the other. So I can say with some certainty that these processors&amp;nbsp;can deal with pretty significantly anything that's thrown at them.&lt;br /&gt;
&lt;br /&gt;
Here are some impressive specs:&lt;br /&gt;
&lt;br /&gt;
Processor Number Cache clock speed&amp;nbsp;Bus Speed Number of Cores&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;i7-970 12 MB SmartCache 3.2 GHz  4.8 GT/s QPI 6 &lt;br /&gt;
i7-960 8 MB SmartCache 3.2 GHz  4.8 GT/s QPI 4 &lt;br /&gt;
i7-950 8 MB SmartCache 3.06 GHz 4.8 GT/s QPI 4 &lt;br /&gt;
i7-860 8 MB SmartCache 2.8 GHz  2.5 GT/s DMI 4&lt;br /&gt;
&lt;br /&gt;
I have a system with core i7 cpu's now, and I have to say they are brilliant. I used to run on duel cores, and I thought they were fantastic, but the i7 just knocked them flat. I wont try and say it cut my waiting time in half, but I certain noticed the difference in a large way. Actually the biggest difference you'll notice whenever you upgrade is the difference whenever you are running quite a few tasks at once.&lt;br /&gt;
I keep in mind the first time I tried to lagg it on purpose. I ran my video editing software, audio editing software and a video converter all at once. Normally I would get noticable lagg, and perhaps even have to shut some thing down. Not anymore. The i7 was able to maintain up with every thing quite well.&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;As for gaming I tend to run WoW, along with a few other games, mainly 1 I definitely enjoy called 9Dragons. I wasn't able to set lots of of my games past medium, or even low, on a number of of the a lot more intense choices. With my core i7 computers, along with a graphics card update, I can run every thing at top performance levels and not worry at all about lagg. Too sweet for words.&lt;br /&gt;
&lt;br /&gt;
If a new personal pc&amp;nbsp;is inside the cards for you, and you aren't certain yet what to look for, I would suggest a new core i7 computer. Anybody who plans to do any sort of intenst activity with their new system will need to seriously take into account the i7, particularly if you are going to be using numerous programs at once. When you need power, you would like the top, and at the moment the extremely most effective CPU you can get is an intel core i7.&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="font-family: 'Trebuchet MS', arial, sans-serif; font-size: 13px;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Effectively retrieve RAR data with Easy RAR Recovery</title><link>http://pctipsntrickz.blogspot.com/2010/12/effectively-retrieve-rar-data-with-easy.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Fri, 17 Dec 2010 21:39:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-3309932635755034174</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;A lot of problems can arise during work with archives. One of the largest is damaging or deleting these archives. In this case you will need to restore them. One of the best tools in this field is Easy RAR Recovery. This program was made specially to solve issues like this.&lt;br /&gt;
&lt;br /&gt;
Comparing to recovery integrated in RAR tools, recovering results in Easy RAR Recovery&amp;nbsp;is much more reliable. This is because of the unique algorithms which are used in this program. These algorithms can get back archives with all types of damage. It can work not only with solid archives, but with any other RAR archives as well.&lt;br /&gt;
&lt;br /&gt;
This program was made for restoration of all types of RAR archives, created by any RAR archiver. The power of Easy RAR Recovery is enough to get back files where the size is higher than 4 Gb. So no matter what was in the archive: documents, mails, songs,&amp;nbsp;Photos or&amp;nbsp;even movies, it will be returned. Easy RAR Recovery was designed to retrieve RAR archives, but it also works with self-extracting SFX files, which can be also retrieved. After recovery, these files can be used with no troubles.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Another welcome function of this program is the supporting of Unicode. It means that all archives will be retrieved successfully and you will be able to read your files with no complications. The language of files in the archive is not a problem and you will be able to work with them as though they were not damaged at all.&lt;br /&gt;
&lt;br /&gt;
Easy RAR Recovery will function on windows 2000, XP, Server 2003, Vista, Server 2008 and 7. It is very user-friendly in use and you can constantly check your data before restoration. If you have a lot of lost files this function is particularly useful, because you always can take a look at the file before restoring it. Besides, you can see how much of the data is damaged and be restored whether either the entire File&amp;nbsp;or just some sections of it if file is damaged very badly. The last case is highly uncommon.&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Easy RAR Recovery is very user-friendly in use. To recover some documents, you just have to run the program and take a few easy steps, which does not require any special knowledge or skills. You just need to select files which you are wanting to restore and then retrieve them. After finishing work, the program will show you results. This way, you can see which data can be restored and which are not possible to restore.&lt;br /&gt;
&lt;br /&gt;
As you can deduce, Easy RAR Recovery is one of the most powerful solutions for RAR recovery. Competitors to this program are not so functional or cost a lot more money. This makes Easy RAR Recovery an excellent choice for any user who want to keep his RAR archives safe.&lt;br /&gt;
&lt;br /&gt;
To test the software, you can first try trial edition and than if you will like this program, you can purchase it. Do not waste your time and money for useless programs and instead buy Easy RAR Recovery and you will never have troubles with RAR files&amp;nbsp;being damaged.&lt;/span&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Benefits Of Online Shooting Games and pc games</title><link>http://pctipsntrickz.blogspot.com/2010/12/benefits-of-online-shooting-games-and.html</link><category>games</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 15 Dec 2010 05:41:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-4204004610750722618</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;It might sound unbelievable, but several studies have shown that there are many benefits connected with shooting games. A vast majority of people who do not understand this genre often assume that these kinds of games encourage violence in society.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, Arial; font-size: 14px; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, Arial; font-size: 14px; line-height: 18px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="content"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;It might sound unbelievable, but several studies have shown that there are many benefits connected with Shooting games. A vast majority of people who do not understand this genre often assume that these kinds of games encourage violence in society. It is believed that such games influence people to act poorly and provoke criminal activity. As a matter of fact, thousands of people play these games and most of them also regularly visit the Church and are great philanthropists. They do several things that most people would regard as wholesome and positive. In fact, several experts believe that people who blow some steam off by playing online shooting games are less likely to indulge in violence in reality. Among numerous benefits linked with these games is the fact that the player develops a variety of important thinking skills while playing these games. This happens unconsciously and most players don't understand the effect at first. If you observe someone playing a sniper game, you'll see that it's not just about shooting a large number of bullets hoping to hit the target. Instead, this kind of game requires the player&amp;nbsp;to apply calculated and strategic thinking. The player has to come up with unique tactics to win a game and will be compelled to spend time thinking whether a particular shot has the capability to hit the target, and that is intended to hit it or not. Besides, another benefit of playing shooting games is that it improves the players' hand-eye coordination considerably. A lot of experts have repeatedly argued in favor of this benefit. To know better, one can try playing these games rather than despising them. People need to see with their own eyes what these games are really about and the ways these can help enhance their abilities. It might sound unbelievable, but several studies have shown that there are many benefits connected with shooting games. A vast majority of people who do not understand this genre often assume that these kinds of games encourage violence in society. It is believed that such games influence people to act poorly and provoke criminal activity. As a matter of fact, thousands of people play these games&amp;nbsp;and most of them also regularly visit the Church and are great philanthropists. They do several things that most people would regard as wholesome and positive. In fact, several experts believe that people who blow some steam off by playing online shooting games are less likely to indulge in violence in reality. Among numerous benefits linked with these games is the fact that the player develops a variety of important thinking skills while playing these games. This happens unconsciously and most players don't understand the effect at first. If you observe someone playing a sniper game, you'll see that it's not just about shooting a large number of bullets hoping to hit the target. Instead, this kind of game requires the player to apply calculated and strategic thinking. The player has to come up with unique tactics to win a game and will be compelled to spend time thinking whether a particular shot has the capability to hit the target, and that is intended to hit it or not. Besides, another benefit of playing shooting games is that it improves the players' hand-eye coordination considerably. A lot of experts have repeatedly argued in favor of this benefit. To know better, one can try playing these games rather than despising them. People need to see with their own eyes what these games are really about and the ways these can help enhance their abilities.&lt;/span&gt;&lt;/div&gt;&lt;div class="content resource"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="content resource"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Online shooting games&amp;nbsp;are a great way to unwind and the steam off. They also help improve one's hand-eye coordination and many other skills.&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Save time and money by printing your own photos at home</title><link>http://pctipsntrickz.blogspot.com/2010/12/save-time-and-money-by-printing-your.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 15 Dec 2010 05:38:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-5013981759204527277</guid><description>&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Considering how widespread the use of digital cameras is today, and how affordable the average model is, it's hard to believe that even 10 years ago people were still using old-fashioned film cameras on a regular basis. Indeed, the digital camera revolution has meant that a whole new generation of photographers has emerged, with the art of good photography no longer confined to those who are able to afford the best equipment or easily navigate their way around a dark room.&lt;br /&gt;
&lt;br /&gt;
For most ordinary people, the biggest benefit delivered by the modern wave of digital cameras has been the ability to print out photographs at home. In the early days of digital photography, it was possible for people to print colour photographs but lower ink and paper quality meant that the result was often grainy, giving poor representation to what may have been excellent photographs. The development of affordable home photo printers since the mid-2000s has changed this. Essentially, ink used in photo printers is able to emulate the resolution and range of colours available on traditional photographic prints, delivering end results of much higher quality than those seen on older printers.&lt;br /&gt;
&lt;br /&gt;
The benefits of photo printers are clear. For starters, they save a considerable amount of time. Photo sharing and printing websites, for example, can be very handy. But depending on your computer's capabilities and your internet speed, it can take over an hour or longer to upload photos to these sites and request print outs. Thereafter, these print outs may take several days to arrive in the post or, if your postal system is unreliable, never arrive at all. With a photo printer at home, printing out photos may take just minutes and you'll have them in your hands immediately.&lt;br /&gt;
&lt;br /&gt;
What's more, purchasing a photo printer is likely to save you money in the long-term. It's true that the act of buying a photo printer may put a temporary dent in your finances. You'll also need to add various peripherals to this cost, like ink cartridges, toner and special photo printing paper. These supplies however will last a considerable length of time and the overall savings you make could be significant.&lt;br /&gt;
&lt;br /&gt;
In addition,&amp;nbsp;photo printers&amp;nbsp;allow you to print photos one at a time, rather than in bulk. As a result, it's much easier to print the photographs you want as and when you want to see them, or when you want to send a single snapshot to family or friends. This not only saves you money but it's also a much more environmentally friendly way of printing photographs, since you ultimately generate less waste by only printing the photos you want to keep.&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The magic of Xbox 360 Kinect..</title><link>http://pctipsntrickz.blogspot.com/2010/12/magic-of-xbox-360-kinect.html</link><category>games</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 15 Dec 2010 05:38:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-1951552757360202160</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;It has been some time when game consoles&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;first hit the market. They had become an instant rage in the market and thanks to the manufacturers of these gaming cosoles&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;there is no let up in their popularity. Now&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;console gaming&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;has reached new heights due to a fantastic innovation that has hit the market. You can now play games&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;as you would play an actual game.&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;Xbox 360 Kinect&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;is one such console. You can enjoy with your entire family when you buy Kinect and enjoy games on this console.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;It has been some time when game consoles first hit the market. They had become an instant rage in the market and thanks to the manufacturers of these gaming consoles there is no let up in their popularity. Now console gaming has reached new heights due to a fantastic innovation that has hit the market. You can now play games as you would play an actual game. Xbox360 Kinect is one such console. You can enjoy with your entire family when you buy Kinect and enjoy games on this console.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;Think of a situation where your entire family, your wife, two kids and you decide to play a tennis doubles match on your Xbox360 Kinect. Now, instead of sitting down in front of your gaming console, all of you stand next to each other with the gaming joysticks in your hand. The living room turns into a lawn tennis court and you are ready to play as if you would in an actual game. You play the game in a virtual atmosphere that resembles an actual tennis court. It is as if you are actually playing the game against your opponents. This great experience is possible when you buy Kinect.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;The magic of Xbox360 Kinect is that it allows you to convert your living room into a gaming arena. You can play games like soccer, table tennis, volleyball, boxing and others in a real atmosphere. Believe it or not, there is really no difference between an actual game and these virtual games. From the time the Kinect hit the market it has captured the imagination of millions of people worldwide. And this is all because of the fact that it offers a real gaming environment. It is no wonder that avid gamers from all over the globe are queuing up to buy Kinect and enjoy the games available on the console.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;To buy your Xbox360 Kinect all you need to do is connect to the Internet. Go to any reputed online shopping website and you will surely be able to get your hands on this wonderful gaming console. If you are already aware of online shopping then I don’t need to tell you how easy it is to make an online purchase. You just need to go through the online catalog and pick your Kinect. After you pay online the product is delivered to your shipping address. All you need to do to buy Kinect is to click your computer mouse a few times.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;When you buy Kinect you will actually look forward to coming back home early from work. The Xbox360 Kinect is such an addiction that your entire family will soon get hooked to it. Playing on the Kinect is much better than watching TV. You will compete with each other and also have laughter to share. It will bring the entire family together. You can even arrange a competition among friends and enjoy the games. If you want to enhance your social network then this is one way that you will be able to.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif; line-height: 18px;"&gt;The Xbox360 Kinect gives you a fantastic real life gaming experience. To enjoy with your whole family buy Kinect online.&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What kinds of laptop batteries do you need...!!</title><link>http://pctipsntrickz.blogspot.com/2010/12/what-kinds-of-laptop-batteries-do-you.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 15 Dec 2010 05:32:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-6873973540510700105</guid><description>&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; font-family: arial, verdana, sans-serif; font-size: 14px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Simple as it may sound, batteries are the biggest difference maker between laptops and desktops. Unplug a desktop from the wall, and it shuts down; do the same with a notebook, and it might last a day.Or, more realistically, anywhere from 90 minutes to 9 hours.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Regardless of capacity, all new notebook batteries are made up of lithium-ion cells and are rechargeable via A/C adapters. While some manufacturers make it more difficult than others to remove the&amp;nbsp;laptop battery, most make it simple to pop them in and out. This opens up the possibility for mobile professionals to tote a spare battery (sold separately). However, you are better off getting one battery that lasts a long time than lugging a spare; extra batteries are bulky, and you need to shut down your computer before inserting them.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;In choosing or configuring a notebook, you may be presented with different&amp;nbsp;laptop batteriessizes and capacities. We can help you decide which one is right for you.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;How Much Battery Life Do You Need?&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;If you plan to use your notebook away from your desk, you will want a bare minimum of three hours of endurance (with four to five hours being preferable), because even when carrying a notebook around the home or office, being chained to an outlet is extremely inconvenient. If you use your notebook in public places (coffee shops, outdoors, planes, etc), you want a minimum of four and a half hours of endurance (with six or more hours preferred).&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Choosing the Right Number of Cells&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;While there are batteries with two, four, or eight cells, most come in three-, six-, or nine-cell packs. If long battery life is important to you, always choose the the largest number of cells available. Whatever you do, don't settle for a three-cell&amp;nbsp;laptop battery; notebooks and netbooks with three-cell batteries tend to get less than three hours of battery life. Batteries larger than six cells—often referred to as "extended batteries"—may add some extra bulk to your notebook, sticking out the back and adding a few tenths of a pound to the weight. However, if you need long endurance, this extra weight is worth it.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Measuring Battery Capacity&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;While battery capacity is the most important factor affecting battery life, you can't tell just from the battery specs how long a notebook will last. Some notebooks are more power efficient than others and, even with the same notebook, users themselves can have a big impact on battery life based on the power settings they use and the tasks they perform. For example, a quad-core gaming notebook may get less than two hours of endurance out of high-capacity battery, while a netbook with a lower-capacity battery can last more than nine hours.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;At LAPTOP, we test notebook battery life by running a custom script that surfs the Web continuously via Wi-Fi. See our "How We Test" section for more details.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;However, it's clear that the more wattage a battery provides (usually measured in either milliamps or killowatt hours), the better. Most vendors do not advertise the amount of wattage a battery provides, but rather the number of cells inside the battery. And more cells almost always equals more juice.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Long-Life/Prismatic Batteries&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Over time, a typical notebook battery tends to lose its ability to retain a charge. After a year of use, the typical battery has lost 15 percent of capacity, and it quickly declines from there. A handful of new batteries, such as HP's Enviro batteries (made by battery manufacturer Boston Power), use oval-shaped prismatic cells to maintain their ability to hold a charge over time. The Enviro batteries, for example, are guaranteed to last at least three years. While this new kind of battery is a rare option, it is definitely preferable when available.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Secondary Batteries&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;Many business notebooks also provide the option to purchase a secondary battery, which kicks in when the main battery runs out of power. Secondary batteries typically slide into the optical drive bay (replacing the optical drive), or attach to the bottom as a battery slice. These secondary batteries add to the cost and sometimes the weight, and slices in particular can make a notebook less comfortable on your lap. However, they can add anywhere from two to six hours of endurance.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Some Useful Tips to Get Rid of Spam</title><link>http://pctipsntrickz.blogspot.com/2010/12/some-useful-tips-to-get-rid-of-spam.html</link><category>security tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 15 Dec 2010 05:29:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-5344339257705504433</guid><description>&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;In under some important circumstances when we open the inbox and found it's flooded with unwanted junk mails and we delete all those mails one by one then found our expected mail. It is quite annoying and almost all of us get this type of emails regularly. But the most irritating thing is that deleting these mails doesn't mean that the problem has been resolved. You will get these types of spam next day as well. Do you want to get rid of spam permanently and prevent it from coming to your email inbox? To learn this, go through this article.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;Before jumping into the solution, let's discuss what is spam? This is referred as unwanted commercial mail addressed to the receiver without their knowledge. To get rid of spam, you need to remember some simple things. You can also consult an&amp;nbsp;email support&amp;nbsp;provider. There are many such service providers who offer&amp;nbsp;tech support&amp;nbsp;to the PC users.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;Internet Explorer is the most popular Internet browser but it is not so much effective to block spam. Instead of IE, you should use some alternate browsers like Mozilla Firefox or Apple's Safari. These browses come with built-in spam filtering tools that is stronger than Internet Explorer.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;Using an anti-spam warfare is a very wise decision in this context. Do you shop online? If yes, it is suggested to use an alternate email account for account registrations. Those who are enthusiastically committed to an online forum, they should keep their email private. Change the settings and only allow moderators to view your email id.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;In some spam mails you will find an unsubscribe link inside that email. It is suggested not to click it. You may get the spam emails even more than before after clicking. This is because once you click on this link, one email will be sent to the sender by which they will understand that it is an active id.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;While forwarding mails, be careful. Sometimes, we get good emails which we want to share with our friends or beloved ones. Every time the mail is forwarded, it includes the sender's email id. Gradually the list of ids becomes heavier and the spammers take those ids to send spam mails. So, when you are forwarding an email, delete all the existing email ids and then send the email. Sometime, spammers also send catchy message and ask to share it with friends. So, if you get any message from unknown sender, don't open it, just click on the delete button.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; line-height: normal;"&gt;&lt;span style="font-family: verdana; font-size: 10pt;"&gt;By following the above mentioned steps you can protect your inbox from unwanted junk emails.&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Computer Viruses,Trojans and Worms - What Are They and What Do They Do?</title><link>http://pctipsntrickz.blogspot.com/2010/12/computer-virusestrojans-and-worms-what.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Wed, 15 Dec 2010 05:25:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-2792509345845008811</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;A virus is known to many as an agent that causes different diseases. They have many modes of infecting all of the members of the animal kingdom. Although there are different types of viruses, they have one commonality; they are all harmful. Nowadays, the term virus has taken a different turn when it comes to the meaning. Now, it is more commonly associated with anything that brings a computer to its demise or to something close to that.&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;Computer virus has to be the most popular phrase when the thought of internet comes to the minds of most people. The reason is that they remember the destruction it brings. Computers have changed the way all people live. It has become important in all aspects of living may it be politics, religion or business. Just when we thought it could not get better, the Internet came along. Among all of the benefits of the internet, the one that people are most happy about is how it made communication much easier. In the old days, the only connection you have to your loved ones in other countries is through mail or telephone. Now, there are more efficient and faster ways of communicating. You can send an e-mail or a private message which will only take a few seconds and your message will be received immediately.&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;This advancement took a tragic turn when someone smart enough decided to make a computer virus. A computer virus, sticking to the true meaning of the word virus, is something that infects a computer, jams its programs and causes many problems to the user. It can bring any time of destruction from a small computer glitch to making your whole computer system crash.&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;Sadly, there are many ways that a virus is transferred from one computer to another. Storage devices such as USB can be a medium to transfer a virus. If two or more computers are connected via a network connection, a virus can be transferred. The most devastating news is that not only can it be transferred offline; it can be transferred online too. The internet became the most notorious aspect of the computer when it comes to getting it infected.&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;This is why the whole world, or the people who uses computers, rejoiced at the birth of antiviruses. These are the programs that are designed to track down and get rid of computer viruses from its system. Now, there are many ways on how to protect your computer using antiviruses. Although there are many antivirus programs out in the market today, they have one common factor: they prioritize prevention. They gave importance of detecting a virus that is threatening to invade a computer so that they can block it before it can cause any harm. Now, antiviruses are also wise enough to detect viruses that are already in the computer before they were installed and delete or clean it.&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #333333; font-size: 12px;"&gt;Aside from antiviruses, the users can also follow guidelines to prevent their computer from getting infected such as don't access sites that are about hacking since most viruses are found here.&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Modifying Windows Firewall Through Command Prompt</title><link>http://pctipsntrickz.blogspot.com/2010/12/modifying-windows-firewall-through.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:46:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-4885114418071395743</guid><description>&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Windows is all GUI now and very little command line any more, well believe it or not command line is still a very powerful tool that can change a lot of items within Windows. Here we will talk about changing Windows Firewall through a command line. The Windows XP firewall is a very basic firewall that protects users from some of the attacks that come across the Internet.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;The&amp;nbsp;&lt;strong&gt;netsh&lt;/strong&gt;command is a free program that comes with Windows XP and is&amp;nbsp;what we will be using to make specific changes to the Windows firewall in this article. The netsh command alone will put you at a netsh&amp;gt; prompt which is ready for more commands. Because netsh can be used to modify other items beside the firewall we need to tell it that we will be configuring the firewall so we give the netsh&amp;gt; prompt the firewall command. Now we are sitting at netsh firewall&amp;gt; prompt. Like any other command line program we can give it a ? to display all the available commands.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;netsh firewall&amp;gt;?&lt;br /&gt;
&amp;nbsp; Commands in this context:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Displays a list of commands.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-Adds firewall configuration.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; delete&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Deletes firewall configuration.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dump&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Displays a configuration script.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; help&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Displays a list of commands.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; reset&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Resets firewall configuration to default&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; set&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-Sets firewall configuration&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; show&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Shows firewall configuration&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;So lets now do an example of a configuration we can do with netsh and allow Incoming ICMP ECHO Requests&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;set icmpsetting 8 ENABLE&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;To disable ICMP ECHO Requests&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;set icmpsetting 8 DISABLE&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Enable Fire and Printer sharing&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;set service FILEANDPRINT ENABLE&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Now as you can see we have done some very broad configurations that either allow everyone or no one to connect or ping our computer. Lets say we want just a specific network access our computer. Then we will have to use the CUSTOM command within netsh firewall&amp;gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;set service FILEANDPRINT ENABLE CUSTOME 192.168.1.0/24&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;So the above statement is only going to allow computers on the 192.168.1.0 network to connect to my computer for file and printer sharing. For those of you who might not be very network familiar the /24 at the end of the network address is the subnet mask. Not to get off on to far of a tangent the /24 means a 24 bit mask which is 255.255.255.0.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Now lets say we are testing something and want to just turn the firewall off completely, well we can do this very easily from command prompt.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;set opmode disable&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Now obviously if we turned the firewall of we just might need to turn it back on so.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;set opmode enable&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;So with all this changing we have done something has gone terribly wrong and we cannot get the right traffic in and out of our computer that we want. So the best thing to do is reset out firewall back to defaults and this can be done by a very simple and obvious command.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;netsh firewall&amp;gt;reset&lt;br /&gt;
Ok.&lt;/em&gt;&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;After executing this command all of our modifications will be lost and the firewall will go back to all of its default settings.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>8 Tips for Securing Your Home Computer</title><link>http://pctipsntrickz.blogspot.com/2010/12/8-tips-for-securing-your-home-computer.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:45:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-148308156725035495</guid><description>&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Security is something that everyone has to stay up with nowadays with all the credit card fraud and identity fraud in the news. There are many things that you can do to help keep your computer and your self safe. Follow these 8 steps and you will be better protected against security threats.&lt;/span&gt;&lt;/div&gt;&lt;ol style="font-size: 12px; line-height: 19px;"&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Turn off unnessecary processes&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;There are alot of programs that run in the background of your computer and some of those programs open up ports that can allow a hacker into your computer. By shutting down these programs that are most of the time unnessecary we can eliminate the amount of ports we have open on a computer.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Install Anti-Virus and Anti-Malware&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;This one is an absolute nessecity for anyone who has a computer that is connected to the internet. An up to date anti-virus anti-malware prorgram can be bought just about anywhere including online. One popular option is&amp;nbsp;&lt;a href="http://www.symantec.com/" style="color: #04719b; text-decoration: none;"&gt;Symantec&lt;/a&gt;&amp;nbsp;which has a full featured program to cover everything. Some other third party software also works well.&amp;nbsp;&lt;a href="http://mwalton84.adwarebot.hop.clickbank.net/" style="color: #04719b; text-decoration: none;" target="_top"&gt;Adware Bot&lt;/a&gt;and&amp;nbsp;&lt;a href="http://mwalton84.spynomo.hop.clickbank.net/" style="color: #04719b; text-decoration: none;" target="_top"&gt;Spy No More – Anti Spyware&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Turn on Windows Firewall or install a personal firewall&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;As was mentioned in tip number 1 we have ports open on our computer that can possibly allow a hacker in. Windows firewall (which comes free with windows) can block these types of ports. You can also purchase a thrid party firewall program that will help block these ports. There are many third party companies that provide excellent firewall programs.&lt;a href="http://mwalton84.goldwall.hop.clickbank.net/" style="color: #04719b; text-decoration: none;" target="_top"&gt;Firewall Gold&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Have a router between you and the internet&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Some ISP (internet service providers) such as cable allow you to plug into their modem and it gives your computer a public IP address. By installing a router between your ISP modem and your computer you can not only share your internet connection but you are also protecting yourself by not publishing your IP address to the internet.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;A simple&amp;nbsp;&lt;a href="http://www.tkqlhce.com/click-3321197-10440897?url=http%3A%2F%2Fwww.newegg.com%2FProduct%2FProduct.aspx%3FItem%3DN82E16833124010%26nm_mc%3DAFC-C8Junction%26cm_mmc%3DAFC-C8Junction-_-Network%2B-%2BWireless%2BRouters-_-Linksys-_-33124010&amp;amp;cjsku=N82E16833124010" style="color: #04719b; text-decoration: none;" target="_top"&gt;router&lt;/a&gt;&amp;nbsp;is pretty inexpensive depending on the freatures that you get with it like wireless.&amp;nbsp;&lt;a href="http://www.jdoqocy.com/click-3321197-10439988" style="color: #04719b; text-decoration: none;" target="_top"&gt;NewEgg&lt;/a&gt;&amp;nbsp;is a great place to find routers and many more computer items.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Disable the computer guest account&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The guest account for windows XP professional is disabled by default but it is always a good idea to check and make sure.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Keep computer up to date with the latest Windows updates and anti-virus definition updates.&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Windows workstations need to be constantly update in order to keep them secure. You can go to&amp;nbsp;&lt;a href="http://www.mikenetpc.com/2009/08/16/8-tips-for-securing-your-home-computer/www.windowsupdate.com" style="color: #04719b; text-decoration: none;"&gt;Windows Updates&lt;/a&gt;&amp;nbsp;and get free Microsoft Windows updates.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Virus definition updates need to be purchased from the company&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Backup important data&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Backuping up data is not really a security item to keep your computer secure but more to keep you secure. Should your computer happen to be hacked or just crash if your data is backed up you will not lose your data.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Only download and install trusted software&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;One of the most common ways computers get viruses and malware is from software downloaded off of the internet. Certain programs downloaded from unknown sources contain viruses embedded within the program.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The best way to protect yourself against this is to not download software unless it is from a site that is totally trusted.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;By following these eight steps you can significantly decrease your risk at being hacked or infected by a virus. The most important thing is to use common sense and you will stay protected.&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Defragging  and the benefits of defragging your pc</title><link>http://pctipsntrickz.blogspot.com/2010/12/defragging-and-benefits-of-defragging.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:40:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-6638672949067755307</guid><description>&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Defragging your hard drive will speed up your computer if you have a lot of fragmented files. Now let me try and explain fragmented files a little be before I continue.&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;First think of your hard drive as a book where the writer does not leave any room for addition in chapters. As soon as he finishes writing a chapter he picks up on the next chapter on the next line. So if he needs to make additions to a chapter that he has already written he will have to add it to the very end and update his table of contents so you know where to get for the rest of the chapter. Hope the made since!&lt;/div&gt;&lt;div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Now you start a word document and you write about half of it and then close it and start an excel document, you save that and then modify your word document again. The physical storage locations on your hard drive are going to be word-&amp;gt;excel-&amp;gt;word and our table of contents is going to tell use where to find the entire word document which is around the excel document.&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Now that you hopfully understand that think of the reader or eye trying to read a document that the spread across then entire physical drive and you can imagine how it could take longer.&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Defragging takes these files that are split up across the entire hard drive and organizes them next to each other so the eye doesn’t have to travel all over the place to access a file.&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Phew! with all that being said you should only need to defrag your hard drive if you do a lot of program installs and unintalls or if it has been a year since you defragged before. Defragging never hurts your computer but be prepared to have it spend a good 4 hours defragging a large hard drive.&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Now how do you defrag your hard drive, well that part is easy:&lt;/div&gt;&lt;ol&gt;&lt;li&gt;Open My Computer&lt;/li&gt;
&lt;li&gt;Right Click on the drive you want to defrag, usually C:&lt;/li&gt;
&lt;li&gt;Click Properties&lt;/li&gt;
&lt;li&gt;Click the Tools tab&lt;/li&gt;
&lt;li&gt;Click “Defragment Now…”&lt;/li&gt;
&lt;li&gt;New program will&amp;nbsp; open&lt;/li&gt;
&lt;li&gt;Select your hard drive, usually C:&lt;/li&gt;
&lt;li&gt;Click the “Defragment” button&lt;/li&gt;
&lt;/ol&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Your computer will now begin to defragment your hard drive, during this time you should not use your computer because it will be running very slow and you could cause the defragmenting process to run slower.&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;Well I hope this post will answer your question about deframentation..&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Now Its Easier to Build your Own PC...</title><link>http://pctipsntrickz.blogspot.com/2010/12/now-its-easier-to-build-your-own-pc.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-1821692807339128430</guid><description>&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Most people have thought a one point or another that they want to build their own computer so that they can get a good computer for less expensive and get everything they want in a desktop computer. Building your own computer is not as hard or imtimidating and some people might think. You can purchase everything you from a single website and have it delivered to your home. In this article we will discuss bare bone kits.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;If you have never built a computer before I would recommend doing a bare bones kit because most of the components that can conflict with each other are supplied for you. A bare bones kit is a cheap kit you can buy that will normally provide you with a case, motherboard, processor and power supply. If you get a kit like the&amp;nbsp;&lt;span class="Apple-style-span" style="color: black;"&gt;Foxconn R10-S4&lt;/span&gt;&amp;nbsp;you receive a small case, power supply, processor and motherboard. The motherboard includes onboard video, onboard Network Card, USB connections, and PS2 connections. The best thing to look at in this kit is that you do not have to purchase a video card for the computer. After purchasing this bare bones kit all you have to do is purchase memory, and a hard drive and you are pretty much set.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Foxconn R10-S4: $119.99&lt;br /&gt;
WD 180 SATA HD: $39.49&lt;br /&gt;
Kingston ValueRAM 1GB: $20.99&lt;br /&gt;
LG DVD Burner: $28.99&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;o to build the above computer we will spend just over $200 and we can get a decent family computer that can be used for general purpose computing. You can already see that even using a bare bones kit you can build a computer pretty inexpensive just by ordering the parts online.&lt;/span&gt;&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Once you receive all of your components for your bare bones kit you will open the kit and insert the hard drive into the supplied bay and connect the power cable and the supplied SATA to the 0 SATA port on your motherboard.&amp;nbsp; Next you will insert your Memory into the supplied slots on the motherboard to give you a 1 gig of RAM. Lastly you will place your DVD Burner into the slot on the case and attach the power and supplied IDE cable to the motherboard.&lt;/span&gt;&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;You now have a fully function computer with no Operating System on it.&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Restoring Word files using Easy Word Recovery</title><link>http://pctipsntrickz.blogspot.com/2010/12/restoring-word-files-using-easy-word.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:26:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-6399800226896835107</guid><description>&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 18px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Have you ever thought about restoring your lost files? With Easy Word Recovery this dream will come true. In a few quick steps you can retrieve any of your documents. It does not matter by which version of Microsoft Word they were saved in: Microsoft Word 6.0, 95, 97, 2000, 2002, 2003, 2007 or 2010. This program can function with all of them, and not just work but fully retrieve them.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Results of work are almost better than manual restoration by a qualified engineer. One of the biggest advantages of Easy Word Recovery is that this program can retrieve files even on broken USB-drives and hard discs, which even Windows cannot recognize. The program can also recover documents from physically damaged discs.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;The program has a simple and pleasant interface, what greatly simplifies working with it. Before data restoration you can look over the current document and decide whether you will retrieve it or not. After this task, restoration can be carried out. You can also compare results between files viewed earlier and the retrieved file so you can analyze completed work&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Easy Word Recovery will retrieve not only the text data of file, but also all of tables or pictures that were in the file. This is very useful, when you are restoring some research or science work.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Another useful function of this programis the chance to retrieve not only damaged documents, but also the deleted ones. Reliability of recovering documents like these is very high.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Easy Word Recovery is a specialized solution for retrieving documents. That’s why the results work far better than any included recovery tool in Micrsoft word. This occurs because unique algorithms are implemented in this program. These algorithms are better optimized for data restoration than the ones which are used in integrated recovery tools.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Thanks to Unicode, Easy Word Recovery supports all world languages. This means that regardless of what language the file was created in, it will still be available after restoration. You can also modify, rename, or perform other actions with this file as though it were never damaged at all.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;This program can be run on all releases of Windows: 2000, XP, Server 2003,vista, Server 2008 and 7. You can be certain of success regardless of your operation system. This program can work on all of them.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;Easy Word Recovery has a very small size and does not demand a great deal of system resources. You can run this program on almost every machine and be sure that everything will function smoothly. The price for Easy Word Recovery is very reasonable. Comparing the program to competitors, the price is smaller, but this program has much more useful functions and functions much more effectively.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #444444; font-family: Verdana, sans-serif;"&gt;If you still have some concerns about purchasing Easy Word Recovery, you should go to our site and read reviews or consider downloading a trial version to make sure that Easy Word Recovery is the best recovery application for your documents. With this program, you can be relaxed about the retrieval of all of your documents and be sure that all of them are safe.&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Some of the MS powerpoint mistakes that we often commit and tips to avoid that</title><link>http://pctipsntrickz.blogspot.com/2010/12/some-of-ms-powerpoint-mistakes-that-we.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:22:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-8227059641843882761</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;A lot of times when you want to present, powerpoint presentation is used to help deliver your point across the audience. The audience will see your pictures and point over the screen as you talk.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;As easy as it is to make a presentation for your speeches, it is also quite easy to make mistakes. What more you won't notice these mistakes because you think it is the right way to do it. In the end, these mistakes will just bore your audience and your presentation have failed.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;If presenter are writing everything inside one slide, then that is a mistake itself. The reader is going to know everything just by reading the slides.If you want to do that then why not just make a video with word.That's the same as just writing the entire speech down on a blackboard and not saying a word.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Use as little words as you can or even just place one picture in one slide. This might seem weird but simplicity works. Then explain to them the meaning of the slides on your own.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Being consistent is also important in your presentation. You use Times New Roman in one slide, the next slide contains Calibri and the next is Verdana.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Who would love looking at that mess? Stick to one fonts only when you are presenting your slides. The size of the font should be large enough to the audience sitting far away can read your slides.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Keep to the same theme throughout your presentation. Don't confuse the audience by using different slides themes inside your presentation.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The developers put the transition animation there for a good reason. You can hide different points in a slide and reveal them slowly.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Sometimes, people forget to limit their animation usage. There isn't a single slide or points that have not been animated by them. Eventually the audience will get bored with it.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Use the transition animation sparingly. You can put a few in different slides and make sure it is quick and not flashy.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;A lot of times after people finish their presentation, they do not spell check. This simple feature will save you a lot of embarrassment moment where you get corrected from your reader. Using spell checker is not 100% fool proof as you still need to run through your presentation again.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;This makes sure your slides are in order and you know the flow of the presentation.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Hope you got benefited from this..&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Setting up dual monitors for your pc</title><link>http://pctipsntrickz.blogspot.com/2010/12/setting-up-dual-monitors-for-your-pc.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:16:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-5555695509965257774</guid><description>&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Setting dual montiors or even three monitors if very easy and doesn`t require much knowledge of computers.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;Setting up dual monitors only requires that you have a computer, two monitors, and two video cards (or a video card with two inputs). For the purposes of this article we are going to be using a PC with windows XP SP2 on it. The first thing we obviously want to do is me sure both video cards are installed in the computer and the drivers are installed. This is the most technical part of installing dual monitors on a computer. You will need to open the case up and install a second video card. Most video cards are either built into the motherboard or they are installed into an AGP slot on the motherboard. So your best bet is going to be to get a PCIe card because that is most likely the open port you will have.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;Now that you have both video cards installed, plug both of your monitors into the computer and boot it up. You should see the same screen on both monitors or one should be blank. Once windows boots up and you are at our desktop simple right click on an empty part of your desktop and choose “Properties”. Next you will choose the tab that says “Settings” and you should see both of your monitors represented there on the screen. Click the square that is suppose to represent the second monitor. Now you should have two options below that say, “Use this device as the primary monitor” and “Extend my Windows desktop onto this monitor”. You are going to want to make sure that the first option is deselected and the second option is selected. Then click the apply button to make the settings take effect.&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 12px; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;Now move your mouse from left to right and see if it goes properly to the other monitor. If it doesn`t your probably have your monitors in the wrong positions. No problem, just go back to the two boxes and click on the box that is listed as 2 and drag it to the left of the box that says 1 and your monitors should be aligned correctly now. As you can see there is much more functionality here if you want to do more than 2 monitors. You can position them pretty much were ever you want.&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Easily Shutdown a local or remote computer with Shutdown.exe</title><link>http://pctipsntrickz.blogspot.com/2010/12/easily-shutdown-local-or-remote.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 23:12:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-9059941937261417159</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px;"&gt;Shutdown.exe&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px;"&gt;is included in pretty much any recent version of the Windows OS including Windows 2000, XP, 2003, Vista, 2008 and 7. Shuftdown.exe is a great program that can be used by system administrators to shutdown local computers through a batch file or even shutdown remote machines or servers using different switches.&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px;"&gt;The shutdown command it typically stored in the c:\windows\system32\ folder as shutdown.exe.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; line-height: 19px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;em&gt;&lt;strong&gt;Syntax:&lt;/strong&gt;&lt;br /&gt;
Shutdown.exe [logoff_option] [/m \\computername ] [option]&lt;/em&gt;&lt;/div&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;strong&gt;logoff option:&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;/i&lt;ul&gt;&lt;li&gt;Display the GUI (must be the first option)&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/l&lt;ul&gt;&lt;li&gt;Log Off. This cannot be used with /m or /d option&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/s&lt;ul&gt;&lt;li&gt;Shutdown&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/r&lt;ul&gt;&lt;li&gt;Shutdown and Restart&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/a&lt;ul&gt;&lt;li&gt;Abort a system shutdown (only during the time-out period)&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/p&lt;ul&gt;&lt;li&gt;Turn off the local computer with no time-out or warning (only with /d)&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/h&lt;ul&gt;&lt;li&gt;Hibernate the local computer (only with /f)&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/e&lt;ul&gt;&lt;li&gt;Document the reason for an unexpected shutdown of a computer&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;strong&gt;Options:&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;/m \\computername&lt;ul&gt;&lt;li&gt;A remote computer to shutdown&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/t:(0-600)&lt;ul&gt;&lt;li&gt;Time until system shuts down in seconds. 0-600 (default=30)&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/c “Message”&lt;ul&gt;&lt;li&gt;An optional shutdown message with a max of 127 characters&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/f&lt;ul&gt;&lt;li&gt;Force all running applications to close. This will result in lost of unsaved data&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/d u:xx:yy&lt;ul&gt;&lt;li&gt;List a USER reason code for the shutdown&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;/d P:xx:yy&lt;ul&gt;&lt;li&gt;List a PLANNED reason code for the shutdown&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 10 Proven Ways To Protect Yourself From Computer Viruses</title><link>http://pctipsntrickz.blogspot.com/2010/12/top-10-proven-ways-to-protect-yourself.html</link><category>virus protection</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 08:11:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-8070019076537861517</guid><description>As more and more people are becoming comfortable using their computers at school, home or in the office it’s only a matter of time before they encounter a computer virus. Here are my top 10 steps to protect you from computer viruses.&lt;br /&gt;
Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.&lt;br /&gt;
Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.&lt;br /&gt;
Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for “off hours” like 2AM when you aren’t likely to be using your computer.&lt;br /&gt;
Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.&lt;br /&gt;
Backup your data regularly. Most windows computer users keep their documents in the “My documents” folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.&lt;br /&gt;
If you use floppy disks or USB drives on public computers like your school computer lab, Kinko’s, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.&lt;br /&gt;
Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren’t expecting. Also be careful of attachments from people you know but weren’t expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.&lt;br /&gt;
Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.&lt;br /&gt;
Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.Always update your antivirus software to get updated with the most recent virus definition.&lt;br /&gt;
Be wary of links in IM or instant messaging software. Don’t accept invitations from people you don’t know and never click a link from someone you don’t trust, they can easily redirect you to another website that will try to install a virus on your computer system.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Need to avoid losing thousands of dollars of data during power loss – Why an UPS is Essential</title><link>http://pctipsntrickz.blogspot.com/2010/12/need-to-avoid-losing-thousands-of.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 08:08:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-5262302611037284309</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma, Verdana, Arial, Helvetica;"&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;It's most peoples worst computing nightmare. You wake up in the morning, flip on the computer, and it doesn't boot. Sometimes the problem rears its ugly head as a horrific clacking noise. Other times it simply gives a read error.&lt;br /&gt;
&lt;br /&gt;
At this point, most people panic. The first thing you wonder is whether or not the data is recoverable. There is no universal answer to this. In some cases, a simple scan with some data recovery software is all that it takes to retrieve the contents of the drive. In other cases, if you want it badly enough, it will take thousands of dollars and a shipment of the drive to a clean lab where they will pull the platters inside of the drive and access them that way.&lt;br /&gt;
&lt;br /&gt;
Now you're probably wondering if there's a way to prevent this from happening. Well, you're in luck. Getting a UPS (Uninterruptible Power Supply) is the very best and most effective way to prevent your data from pulling a disappearing act.&lt;br /&gt;
&lt;br /&gt;
While it is not fool-proof, having something that regulates the electricity flowing into your computer can reduce the risk of a drive failure by up to 70%. This figure goes up to around 90% if the computer is being used while in an electrical storm. (My computer repair business always gets a little boost after a thunderstorm, courtesy of the lightning wreaking havoc on people's hard drives.)&lt;br /&gt;
&lt;br /&gt;
Don't just run out and get any UPS. You want to get an intelligent one. The "intelligent" UPS will regulate the power without having to hit the battery every time the voltage takes a dip which greatly improves battery longevity. They also include options to hook the power supply up to your computer via a serial or USB port so you can monitor what the power is doing. This also gives the option to allow for a soft shut-down if the power goes out and you are away from your desk.&lt;br /&gt;
&lt;br /&gt;
You can get an Uninterruptible Power Supply at most computer stores. Best Buy carries a fairly wide selection of them.&lt;br /&gt;
&lt;br /&gt;
As for brands, I've personally used APC with much success. Opti-UPS is another excellent brand. In fact, I have an Opti that is 6 years old and still works fine, although the batteries now have no life to them. (That's to be expected. Rechargeable batteries only last so long)&lt;br /&gt;
&lt;br /&gt;
Now that you know of the importance of a UPS I would strongly encourage you to invest in one. It is far better to spend $100 now on some preventative maintenance than having to spend much more later on data recovery.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Spyware Protection - The Only and essential Way To Safeguard Your Personal Information Online</title><link>http://pctipsntrickz.blogspot.com/2010/12/spyware-protection-only-and-essential.html</link><category>Pc tips</category><category>spyware</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 08:04:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-6085717799054915795</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;The Problem:&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;Are you bombarded with popup ads? Seeing new toolbars in your browser? Does your home page change to unwanted/unknown destinations? Bombarded with irritating spam? Perhaps strange software loads when you first start your computer, or your favorites file may have new entries that you don't recognize and don't want. If this is happening to you, your PC (Personal Computer) is most likely infected with adware spyware, spybot spyware, trojan viruses or other harmful internet parasites.&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;What Is Actually Happening?&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;Your privacy is being seriously invaded. These programs have the ability to track your Internet usage habits and even steal such personal information as bank account numbers and passwords. If you are like me, this is scary, isn't it? But there's more...spyware even has the power to install even more parasites on your computer without your knowledge and without your consent. Everything you do and everything you type can be recorded without your knowledge and without your consent. Using spyware, companies can find out what your interests are and even track your purchasing habits. Hackers can and sometimes will access your PC and do anything they wish. Unscrupulous individuals can even steal your identity (you've heard of identity theft, haven't you?) and you would never be the wiser, at least until it is too late (this would be when the bill collectors, or even the police, start calling you!).&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;To Determine If You Are At Risk, Ask Yourself These 3 Questions:&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;1. Have I downloaded files, documents or free mp3 music online?&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;2. Has my computer suddenly started getting annoying ads popping up on the screen?&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;3. Have I suddenly noticed that my computer is running extremely slow?&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;What Is The Solution?&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;There is only one solution to this problem and that is to protect yourself and your privacy with a Spyware protection solution. Spyware protection software helps you to completely clean your computer of invasive threats. As a result, your computer will be clean and its performance will be better. Simply put, it will run a lot faster. Additionally, you will have protected your privacy - personal information, financial data, and your financial security will be protected. In the information age, where having just one piece of your personal information can ruin your life, protecting your personal privacy while online is of the utmost importance.&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The Top Twelve Threats that No Computer User Should Ignore..</title><link>http://pctipsntrickz.blogspot.com/2010/12/top-twelve-threats-that-no-computer.html</link><category>Pc tips</category><category>spyware</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 08:01:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-623659266780077064</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The Top Twelve Threats No Computer User Should Ignore&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;The internet is undoubtedly a fantastic resource for&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;families and offers a rich source of educational content.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;However, there are potential dangers - welcome to the&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;dreadful world of viruses, spam, trojans, spyware&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;and other nasties.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Here are the Top Twelve Threats No Computer User Should&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Ignore:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;1. Viruses - A computer program that copies itself. They&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;often disrupt your computer system or damage your data.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Viruses are usually received by email attachments so be&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;careful opening anything from a dubious source. They can&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;affect anyone, for example, the destructive Mydoom worm&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;affected one out of three small and mid-sized businesses.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;2. Spyware - Sends information about you and your computer&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;to somebody else. Spyware may send the addresses of sites&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;you have visited or worse still, transmit personal&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;information. With today's concerns about identify theft&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;this is a real worry. For example, CoolWebSearch may hijack&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;web searches, home page, and other Internet Explorer&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;settings. Spyware is normally received as part of shareware&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;or freeware downloaded from the web.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;3. IP Spoofing - A technique to gain unauthorized access&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;to computers, whereby the intruder sends messages to a&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;computer with an address indicating that the message is&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;coming from a trusted host.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;4. Trojans - An apparently legitimate computer program&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;that is really intended to disrupt and damage computer&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;activity by sending information, perhaps even passwords&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;onto a third party without you knowing. As an example,&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;recent emails entitled "Osama Bin Laden Captured" attempted&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;to download the "Trj/Small.B." Trojan if the embedded URL&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;was clicked. This trojan attempts to hijack the PC.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;5. Spam - Unsolicited mail often promoting products of a&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;dubious financial or sexual nature. Don't leave your email&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;address on websites and internet bulletin boards as they&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;are harvested by spammers.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;6. Adware - puts advertisements on your screen. These take&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;many forms including popups, popunders and advertisements&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;that appear later, even if your browser is closed. Some are&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;sent using the Windows Messenger service which allows a&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;spammer to direct an advertisement straight to your&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;computer by sequentially sending messages to IP addresses.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Always irritating, they are also often of a bad&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;nature.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;7. Diallers - for those of us still with dial up modems,&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;dialler programs redirect calls to a very expensive number.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;You won't know until you get the bill.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;8. Hijackers - Hijackers take control of your web browser&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;and may reset your home page, search bar and search pages.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;They can redirect you to undesirable sites or stop you&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;going to particular sites.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;9. Hackers - With so much personal data available online&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;to anyone with a password you must be sure your password is&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;secure. If you are using your mother's maiden name, your&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;cat's name or your birthday then your password is at risk.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Here are two tips for making a secure password. Method One -&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;pick two random unrelated three letter words and two&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;digits. Mix them up and what do you have? A secure password&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;such as "red19cat" or "hotpin73". Method Two - pick a short&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;sequence of words such as Now Is The Winter Of Our&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Discontent Made Glorious' and you have a password of&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;"nitwoodmg". You could even change the I's and O's to&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;digits.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;10. Phishing - Emails purporting to come from reliable&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;sources such as Paypal, Ebay or your bank. Often wanting&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;you to verify your account details, they can look very&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;realistic but are generally scams to harvest usernames and&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;passwords. Always open a new browser winder and type the&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;address there, rather than clicking on the link provided.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;11. Hoaxes - Chain letters, scams, false alarms. At best&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;they take up time and bandwidth but at worst vulnerable can&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;be victims of fraud. Pass it on!&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Need for cleaning your windows registry..</title><link>http://pctipsntrickz.blogspot.com/2010/12/need-for-cleaning-your-windows-registry.html</link><category>Pc tips</category><author>noreply@blogger.com (Arjun)</author><pubDate>Sun, 12 Dec 2010 07:59:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1655374849264515943.post-8765922929160504860</guid><description>&lt;span class="Apple-style-span" style="font-size: 12px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Registry is the database where data of programs and windows is stored. Registry cleaner is software, used to run your computer faster and smoother. Registry cleaning is very important for a smooth running of your computer system. Whenever you delete a file form your system, the registry does not remove this data. Thus, a reference to the deleted file remains in the registry. Gradually as the registry gets filled up with these databases, the computer gets slower and slower in its functioning. If the registry is not cleaned up regularly, severe damage can be caused to your computer.&lt;br /&gt;
&lt;br /&gt;
A registry cleaner scans the windows and finds out the outdated and incorrect information stored in your computer’s registry. The software fixes this improper information enabling your system to be error free and run faster. The software is enabled with advanced features that make your computer run smoothly and efficiently. Registry cleaning makes your computer run very quickly and also safely.&lt;br /&gt;
&lt;br /&gt;
There are many advantages for registry cleaning. Your computer will have a cleaned up registry and no information in the registry will be cluttered. You can regain the lost disk space and use this for installing new software. Registry cleaning will also block the installation of spyware and adware in your computer. If your computer was having any application errors, you can see that this has been fixed after you clean up your registry. Your system will be maintained as it was in its initial stages and you can also understand your computer much better.&lt;br /&gt;
&lt;br /&gt;
If you do not clean up your computer’s registry timely, you can face different types of problem while using the computer. When you are in the midst of doing important work related activity, your computer can suddenly crash or the system can get stalled all of sudden. This can have damaging impact on your work. Timely cleaning up and fixing of the registry will prevent you from facing such crisis.&lt;br /&gt;
&lt;br /&gt;
There are different kinds of registry cleaner available. You can use the best registry cleaner available in the market to maintain the registry of your computer. Keeping your PC clean is very important if you want it to run efficiently all the time. The registry cleaner software will help you in repairing some applications that are not working in your computer.&lt;br /&gt;
&lt;br /&gt;
The software uses speed detection techniques to very quickly identify the missing and invalid reference from your windows registry. After identifying the problems, the software with the use of its advanced technology can easily clean your registry. After this your computer will start functioning, like a new PC. After installing the software you can customize its different options according to the requirements of your computer.&lt;br /&gt;
&lt;br /&gt;
Many online sites provide registry cleaner software for its customers. Before you buy a registry cleaner, make sure that you are aware about its different features. This will help you in customizing the features of the software according to the needs of your computer.&lt;br /&gt;
&lt;br /&gt;
Buy the best registry cleaner that is available for your computer.&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>