Google+ Badge

Friday, December 12, 2008

Features To Look For In Free Downloadable PC Security Software

Computer security software is readily available for free over the internet. While major corporations still produce extensive security software packages that are marketed for consumer purchase, they still release smaller versions that can be downloaded for free. When shopping for a free security software package, try to find ones that have as many of the following features as possible:Personal Firewalls - these are geared towards blocking active attempts by other terminals to access your computer over the internet. When looking for a free firewall, find one that has an easy user interface. This is because firewall settings are a major determinant in the extent of security they provide, so the interface should allow you to easily adjust these settings to suit your needs.Anti virus - anti virus software ideally should not only be able to detect and block incoming viruses, but should be able to detect existent viruses that are already in your system and clean them out. Since there are new viruses constantly being made, as well as thousands of existing known viruses, the best thing to look for in a virus software is an extensive database of viruses it can deal with, as well as constant updates on the latest viruses discovered.Adware and Pop Up Blockers - these are specialized programs similar to firewalls whose primary purpose is to keep ads, spam, and annoying pop ups from flooding your screen when you're accessing the internet. While not necessarily harmful, the sheer volume of these can, if unrestricted by a blocker, bog your computer speed down drastically.Anti Spyware - spyware is a form of virus that you should definitely consider protecting yourself against. While not a classic self-replicating and destructive virus per se, spyware actually inserts itself into your system and allows a hacker on a remote terminal to access your personal information This can range from simply monitoring and viewing your information and activities, to actually controlling your computer's functions. Spyware protection programs ideally should be able to not only block intrusion attempts, but to detect active spyware that manages to sneak in your system, and cut off its access.Anti Trojan Programs - Trojan viruses are special viruses that are usually disguised as a different program. For example, a trojan virus may appear to be a harmless game or a music file that you can download. Anti Trojan Programs scan all files that you attempt to download off the internet to make sure they are secure. Like regular anti virus programs, make sure the anti trojan program you select has a good coverage of known trojans.

Nobel Laureates Science Conclave at IIIT-Allahabad

Generally i dont write about seminars in my blog , but this one caught my attention , this event is organised in India for the first time ever .
Indian goverment should promote and encourage these events more regularly.

It can be called the marriage of glamour with sci-tech, the clash of glittering jewellery and stones with slithering protons. Photons of light bouncing off the shimmer and sheen of pancake embellished with glitter. For the first time in Asian scientific history, Bollywood will meet sci-tech and hi-tech at the Nobel Laureates Science Conclave at IIIT-Allahabad – the biggest scientific gathering on this continent. The week-long event will be flagged off on 15th December, 2008.Bollywood stars, actors and performers like Hema Malini, Shradha Sharma, Anup Jalota, Mital Singh, Bhupinder Singh and Penaz Masani have already confirmed their presence. Many more are still expected to join.

According to Flynn Remedios, National Media Co-ordinator, Science Conclave 2008, "The presence of Bollywood will lighten enlightened minds as they pontificate on the Origin of the Universe, Relativity, Particle Physics, Nuclear medicine, Nanotechnology, Wearable Computing and so on."According to Dr M D Tiwari, Founding Director, IIIT-A, "For the first time in Indian and Asian history, 12 Nobel Laureates, leaders, policymakers, research scholars and students including the first batch of the "INSPIRE" program by the DST will participate in the conclave to discuss the emerging trends in the scientific research and technological innovations in world of science. This is a great opportunity for the Indian scientific community particularly young minds to interact with global veterans and stalwarts in the respective scientific disciplines. A few thousand scientists, post-grad students and others are expected to converge and interact with the Nobel Laureates at IIIT-A for the event."Many Indian senior politicians, bureaucrats and ministerial heads are also expected to attend this event. The Governor of Harayana and others like Shri Arjun Singh, HRD Minister, Govt. of India, Shri Ram Vilas Paswan, Minister for Steel, Chemicals and Fertilizers, Shri Charanjit Singh Atwal, Dy Speaker of the Lok Sabha have already confirmed their participation and attendance.The Hon'ble Prime Minister has also been invited to inaugurate the event as well as other senior politicians from the IT and I&B Ministry are likely to attend.The Nobel Laureates Science Conclave is part of the Science Conclave 2008 – a mega symposium, exhibition and lecture series on science and technology at the IIIT-A and is the outcome of the untiring efforts of Dr M D Tiwari and his team of dedicated scientists and faculty at IIIT, Allahabad.

Credits : Frank Franklyn – FUTURISTIC MEDIA NETWORK

Friday, August 22, 2008

Tips n Tricks To Keep Ur PC UpToDate

DMA Mode on IDE Devices

Changing the CD – ROM setting to DMA will reduce the number of CPU cycles the CD – ROM consumes. Go to Device Manager > IDE ATA / ATAPI Controllers > Primary IDE Channel. Set the Device I setting to “DMA if available”. Repeat for Secondary Channel if you have device attached.

Turn Off System Restore

XP keeps a backup of system files in the System Volume Information folder. This eats up valuable space on your hard, drive. If you don’t want Windows to back them up; Go to Control Panel > System > System Restore. Check “ Turn of System Restore”. Delete the System Volume Information Folder.

Control Your Mouse Using Your Keyboard

You can control your mouse pointer using the numeric keypad. Press Alt + left Shift + Num Lock. Click the Setting button in the Dialog Box the appears. Check “Use MouseKeys”. Click Settings again and change them as desired. With Mousekeys on, pressing 5 simulates a left click.

Windows Explorer shortcuts

Alt+ Enter View and objects properties.

Shift + Delete Deletes and object immediately (Bypasses the Recycle Bin)

F6 Switches between left and right panes on a window.

Ctrl + Esc Displays the Start Menu

Windows Key Shortcuts

Ctrl + WIN + F Display Find: Computer

WIN + Break Display the System Properties dialog box

WIN + Tab Cycle through buttons on the taskbar

WIN + F Display Find: All Files

Speed Up the Start Menu

Go to Start > Run > Regedit. Navigate to the following key. HKEY_CURRENT_USER \ Control Panel \ Desktop. Scroll down in the right panel and double-click on ‘mensuhowdelay’. In the Value Data box, change the defoult value for the menu speed from 400 to a lesser number.

Add or Romove Destinations in the Send to menu

The Send To menu appears when you right-click on an object. You modify this menu by modifying the Send To folder. Generally this folder is found in “C:\Documents and Settings\\’. (It may be hidden). Add / remove shortcuts here to add / remove destinations in the menu.

Disable list of startup programs

To disable the list of startup programs,go to User configuration > Administrative Templates > System > Logon and enable “Do not process the run once list”. This prevents programs from starting up automatically, thus giving you a faster boot up time.

Clean Your Prefetch to Improve Performance

Prefetch is a new technique in XP. However, after using XP for some time, the prefetch directory can get full of junk and obsolete links in the Prefetch catalog, which can slow down your computer noticeably. Open (system drive): / windows / prefetch, delete those junk and obsolete files, reboot.

Disable MSN Messenger form starting automatically

Go to Start > Run > gpedit.msc. Navigate to User configuration > Administrative Templates > Windows Components > Windows Messenger. Click on ‘Do not automatically start windows messenger initially’ and enable this rule. This will shorten your boot up time, and also save memory.

Remove the shortcut arrow from desktop icons

Go to Start > Run > Regedit. Navigate to HKEY_CLASSES_ROOT \ Inkfile. Delete the Is Shortcut registry value. You may have to restart Windows XP

Internet Explorer
Internet Explorer Shortcuts

Shift + CLICK Open link in new window

Ctrl + TAB Move forward between frames

F6 Change Address bar and page focus

Alt + Home Go to your Home page

More Internet Explorer Shortcuts

CTRL + F Find on this page

CTRL + D Add the current page to your Favorites

CTRL + W Close current browser window

CTRL + N Open a new window

Customise Internet Explorer Interface

Go the Start > Run > gpedit.msc. Navigate to User configuration > Internet Explorer Maintenance > Browser User Interface. Add the name you want to see on the browser. You can add a customized animated logo and change the background of the toolbar by going to ‘Browser toolbar costomisation.

Load Internet Explorer Fast

Edit your link to Start IE to have –nohome after it. “<>: \ Program Files\Internet Explore\IEXPLORE.EXE” –nohome. This will load IE very fast because it dosent’t a web page while it is loading. To go to your homepage after it has loaded, just click on the home button. (Or hit Alt + Home)

Fire Fox Shortcuts

New Tab Ctrl + T

Next Tab Ctrl + Tab or Ctrl + Page Down

Previous Tab Ctrl + Shift + Tab or Ctrl + Page Up

Open Address in New Tab Alt + Enter

Suffixing extensions in Firefox

IE automatically suffixes. Com to an address if you press Ctrl + Enter.

Firefox expands this feature to include. Net and. Org extensions as well.

For complete. net address Shift + Enter

For complete. org address Ctrl + Shift + Enter

Cut and Paste

You can highlight any text anywhere using the mouse and instantly pastely paste it by pressing mouse button 3 ( or both buttons on two button nice).

Applications also support selecting text and pressing Ctrl + C to copy it or Ctrl + X to cut it to the clipboard. Press Ctrl + V or Shift – Insert to Paste.

Some more Cut and Paste

When using the full screen window manager screen you can enter “scroll back mode” with Ctrl + A + Exc. You can move the cursor with the arrow and mark text by pressing the Space Bar at the beginning and end of the text you want. The text you selected can now be paseted with Ctrl + A

***Microsoft Office

Cut and Paste

To quickly select and entire sentence in Word, hold down Ctrl and left-click anywhere in the sentence, or just triple-click anywhere to do the same. Double-clicking just selects a single word.

Adding Footnotes

If you use Footnotes a lot in Microsoft Word, you don’t need to reach to your mouse and click Insert / Footnote each time you want to add one. Just hold down the Alt and the Ctrl keys and press F.

Selecting Cells in Word Tables

. To select a column, hold down the Alt key and click in the column you want to select

. To select a row, click in the fist cell of the row you want to select and them press Alt. + Shift + End.

Add Accents to Character

Go to Start>All Programs>Accessories>System Tools>Character Map. Select thecharacter and click Select. Copy it into your document. In M*cros*ft Word, dry holding down Ctrl key and hit ‘(single quote) key. Type the letter to be accented. E.g. a for a`, d for o`, e for e`, I for I`, u for u`, y for y`.


Determine the length of all audio CD tracks, Very fast with Excel

This macro will list the duration of all the tracks on an audio CD inserted in your CD ROM.

Open Excel
On the Tools menu, point to Macro, and then click Visual Basic Editor (or Alt F11)
Copy text between the lines below:
Option Explicit

Private Declare Function mciSendString Lib "winmm.dll" _
Alias "mciSendStringA" (ByVal lpstrCommand As String, _
ByVal lpstrReturnString As String, _
ByVal uReturnLength As Long, _
ByVal hwndCallback As Long) As Long

Sub AudioCD_InsertTime()

Static S As String * 30
Dim Cmd As String
Dim Counter As Integer, Answer As Integer
Dim Min As Integer, Sec As Integer
Dim NrTracks As Integer, Track As Integer
Dim TrackLength() As String

Answer = MsgBox("The audio CD must already be in the CD-rom drive." & vbCrLf & _
"No other software may use the audio CD.", vbExclamation + vbOKCancel)
If Answer <> vbOK Then Exit Sub

mciSendString "close all", 0, 0, 0
mciSendString "open cdaudio alias cd wait shareable", 0, 0, 0
mciSendString "status cd number of tracks wait", S, Len(S), 0
NrTracks = CInt(Mid$(S, 1, 2))

ReDim TrackLength(1 To NrTracks)
Dim i As Integer
For i = 1 To NrTracks
Cmd = "status cd length track " & i
mciSendString Cmd, S, Len(S), 0
TrackLength(i) = S
Next i

Counter = Counter + 1
Min = CInt(Mid$(TrackLength(Counter), 1, 2))
Sec = CInt(Mid$(TrackLength(Counter), 4, 2))
With ActiveCell.Cells(Counter, 1)
.Value = "00:" & Format(Min, "00") & ":" & Format(Sec, "00")
.NumberFormat = "[mm]:ss"
End With
If Counter = NrTracks Then Exit Do

mciSendString "close all", 0, 0, 0

End Sub
In the Visual Basic Editor:
Insert > Module
Paste the code.

Go back to Excel (use tab on Windows' Task bar) or close the Visual Basic Editor.
Put an audio CD in your CD ROM
Select any cell (suggest a cell on row 1 for this try out)
Then...... Tools > Macro > Macros (or Alt F8)
With your macro selected click .
You can copy the cells and paste into any text document.
Save the workbook for use next time.


How to exit a Java App cleanly!

Exit Java Application

Have you ever started a java app from an SSH session and when you are done you try to exit the SSH session and it's not exiting. Another symptom would be to call the java app from a script and the script never regains contol from the Java App. The solution is simple...

Your program still has descriptors for stdin, stdout and stderr open and sshd is waiting for them to close. Either have your program close those descriptors or redirect them to /dev/null. You probably also want to use "nohup" to prevent the program from exiting on SIGHUP. Here is an example that should help you....

nohup java -cp . Test /dev/null 2>&1 &


Instant Restore Point

Instant Restore File

Here it how to make your own instant Restore button that you can make a
instant Restore of your system anytime you want. (It is 2 lines long)

1. Open Notepad
2. Type this in below
3. Save it with extension of .vbs
4. Make shortcut to the file (Or save it to your Desktop)
5. Double click it on when ever you want to make a restore point

rp="Scripted Restore Point by "&WScript.ScriptName
GetObject("winmgmts:\\.\root\default:Systemrestore").CreateRestorePoint rp, 0, 100


How to connect your home computer from Remote location?

How to connect your home computer from Remote location?

Using the Remote Desktop feature, you can connect your home computer (host) from any other remote computer (client) and can access all computer resources (installed programs, data and any network resources). You can run any computer application on the remote computer as you were running actually sitting in front of home computer.

Follow the given steps to configure your computer to connect remote computer:

To use this feature, you will need to be logged into your computer with administrative rights.

To perform this task, first make sure your both computers are connected to the internet.

First you have to configure the host computer that allows the users to connect it remotely. On the host computer, right click on "My computer" and click on Properties option.

Under the Remote tab, select the option "Allow users to connect remotely to this computer" and click Ok button.

Now get the IP address of host computer (type the "ipconfig /all" on the command prompt of host computer to find IP address).

Now make a connection on remote or client computer, click on Start button, go to All Programs> Accessories, and Communications, then click on Remote Desktop Connection, option. A Remote Desktop Connection, dialog box will appear.

Click on Options button for detail configuration, under the General tab, type the IP address of host computer in the Computer box and also type username and password of host computer then click on Connect button to make a connection to remote computer.

If your username and password is correct then a remote desktop windows will appear.

credits : NFT TEAM 

Monday, July 28, 2008

404 ! 404 ! Whats it ?

Credits : Ron Eletrick

There are many Internet web server error messages. One such is the 404 error message. This error is a result of some problem with the Web server and not your terminal/computer. If you encounter a 404 error message, then the cause might be that the server is not able to locate the file that has been requested. It might be the case that the file that is sought has been moved to some other location or has been deleted. This causes a 404 error message to appear on you terminal screen.

Generally, when sending messages or requesting files using HTTP you get response from the server and each of this response has a numeric code associated with it. Here is a great technical site Also this code has message in English that appears as the message along with the number. This message for a 404 error message will be “Not Found”. The usual scenario is that with a 404 error message a short HTML document which has the numeric code with the associated string is included. But not all the web browsers have this kind of facility. Some browsers are more user friendly in that they even have a humorous 404 error messages!

A 404 error will also occur and get displayed if the file that is requested is spelt wrong. Always see to it that you type in the correct spelling. Even if you have spelt it correct and you get a 404 error message, then possibly the file has been shifted or deleted altogether. One another alternative is to remove the information between each backlash. Try this until you land up with the required file. In many cases this helps to reach the information you need.

Microsoft Outlook Web Access has various kinds of 404 error messages. They can be “File Not Found”, “Not Found”, “Object not Found”, “Page cannot be found “ and a few others.

The possible causes for this error message to appear are DNS name resolution, proxy server configuration, exchange virtual directory configuration, Uniform Resource Locator (URL) creation, problem with URL Scan component of IIS(Internet Information Server) lockdown tool and/or the wrong port allocation on the OWA Web site.

Always keep in mind that there is way to find the page you require. A 404 error message just indicates that the wrong instructions have been given to the server to locate that page, similar to you being on the wrong route to reach a city. You just have to correct the route!

Windows Registry Structure

Credits : Kenth Nasstrom

You can view the structure of the Windows Registry when you open it up with a Registry Editor utility like REGEDIT.EXE or REGEDT32.EXE.

If you’ve never opened the Registry before, you might be surprised and comforted by its familiar-looking layout. Its hierarchical data structure is much like the data structure you see everyday in Windows Explorer, except here the tree structure units are keys, subkeys, and values rather than directories, subdirectories, and files. But any intuitive understanding of the Registry’s content (for most people) ends right here, because the registry was designed more for the operating system and installed applications than for humans.

The Registry’s hierarchical data structure and central location allow Windows and hosted applications to quickly locate their configuration settings and default parameters, but these parameters have values in the Registry that are different from their internally-defined values used by the applications themselves. This can make altering application settings from within the Registry a grueling and tedious task, and this is why most changes to Registry data are more easily (and more safely) made by changing settings from within individual applications or system utilities.

A Closer Look at Registry Structure

The primary divisions of the Windows Registry are seen a list of 4-6 expandable folders, called root keys or subtrees, in the left pane of the Registry Editor window. These can be expanded to show the keys and subkeys, and these can be expanded in turn to show further subkeys below or their value entries listed on the right pane in Registry Editor. The Registry subtrees and a description of their contents are as follows:

• HKEY_LOCAL_MACHINE (HKLM): This root key (or subtree) contains configuration data specific to the local computer, including its hardware devices and operating system components. The information contained within HKLM is independent of the current user and applications or processes in use.

• HKEY_CLASSES_ROOT (HKCR): This root key contains the file-class, OLE, and COM object data. The keys, subkeys, and data within this subtree are linked to (and identical to) those contained in the HKEY_LOCAL_MACHINE\Software\Classes\ subtree.

• HKEY_CURRENT_CONFIG (HKCC): This root key is added to make current versions of Windows compatible with older Windows 95 applications. It is derived from HKLM\System\CurrentControlSet\HardwareProfiles\Current and contains configuration settings for all currently active hardware.

• HKEY_CURRENT_USER (HKCU): This root key contains profile information for the user currently logged in. Each time a user logs on, HKCU is rebuilt with that user’s profile data from HKEY_USERS.

• HKEY_USERS (HKU): This root key contains the default profile and the profiles of all users who have logged onto the computer.

• HKEY_DYN_DATA (HKDD): This root key is found only on Windows 95/98/ME. It is linked to HKEY_LOCAL_MACHINE and contains information about Plug and Play hardware components. HKDD , for use with the Plug-&-Play features of Windows, this section will change as devices are added and removed from the system.

The “HKEY_” at the beginning of each root key’s name indicates that the key is a unique identifier (or handle) that programs can use to access resources. Each of these root keys branches out, first into keys and then further into subkeys. At the end of these branches of keys and subkeys lay the Registry data, or value entries, corresponding to the data stored in the hive files. The Windows Registry can store several different value types, but the most common that you will see are binary, strings (text for humans), and DWORD (Boolean) values.

Registry Hives

Much of the information contained in the Registry is stored on the computer’s hard drive as a set of binary data files aptly named “hives”. The hives are permanent Registry components, serving as both supporting files from which Windows retrieves Registry data during system startup, and as backup files that the Registry writes to each time its supporting data is altered or changed through a process called flushing. Flushes are automatic and occur within a few seconds after changes are made to the Registry.

How To Create A Windows XP Recovery Kit

credits : Otis Cooper

We all just love our computers, especially when we want to enjoy those high priced games and when we use it as a business tool.

But what a pain in the "you know what" when the system fail to perform as it should or worse yet, we experience a disaster with our operating system.

When you understand Windows XP, you will soon learn that there are ways to recover from a Windows XP crash.When followed in detail, there are certain tasks you can perform that will allow to recover from any Windows XP failure, no matter how serious the issue.

When troubleshooting Windows XP, there are two possibilities as to where the problem may be.This problem may be with Windows XP or it may very well be a hardware problem.In either case, the best way to recover from this is to have an XP Recovery Kit at the ready.

This kit will enable you to get your computer up and running in minutes rather than hours. This kit consists of backups of your entire hard drive.You will save yourself a heap of troubleshooting procedures that you would have to perform otherwise without this recovery kit.

To get right to the point in creating your own XP Recovery Kit, you will need disk imaging utility such as Drive Image by Powerquest and a backup medium such as a cdrom writer,a dvd writer, or a second hard drive.

There are two procedures you can perform to create an XP Recovery Kit.And these procedures can be use to create kits for other versions of Windows as well.Using a recordable medium is the first and using a second hard drive is the second method.

You also have the option of re-installing Windows XP as a form of recovery but this process takes time.Creating your XP recovery kit will require time as you make this kit but after this, you can quickly get any system running again just as if nothing went wrong.

To use cdroms or dvds, make sure your cd or dvd writer is functioning properly.Install and run Drive Image.We used Drive Image which cost $69.95 but you can also use such free or trial versions of drive imaging software.

One good software is the Back-Up 2006 by Andy Shroebel at which should perform the same tasks as Drive Image.

After running your imaging software, follow instructions to create an image of Drive C. You will have the option of choosing cdrom, dvd, or second hard drive to perform the image.You will also see the number of disks required to complete the process.

The Image software should reboot the computer and perform the backup.When using disks, you will need to remove and insert the cds as needed.Label the cdroms in order and put them in a safe and secure place.

When using a second hard drive, you will know to know how to install it on the ide cable.Formatting and partitioning the second must be done before it can be used.

Windows XP have a backup utility but Windows XP home edition will have to install it from the cdrom.Place the XP cd in the drive, open My Computer, and right click the CD Drive containing the XP cd.

Now click Open and you will see the contents of the cdrom. Click the ValueAdd folder, then the MSFT folder. Next click the NTBackup folder and click NTBACKUP to install the backup utility.

But the Windows XP utility will not record to cdroms or dvds but will only save the backup as a file.This is why its best to use Drive Image or a compatible software.

After completing your drive image by backing up Windows XP on cd, dvd, or second hard drive, you will not be so concerned should Windows XP freeze up and fail to load.

Simply reboot the computer and access your BIOS to let it know which medium to boot from.Save the change and place the cdrom or dvd one in the drive and reboot.If you used a second hard drive,simply reboot and that's it.

Now don't be tempted to wait until Windows XP fail and say you should have made that recovery kit.Take the time to make an image of your hard drive and be prepared for any failure brought on by Windows XP.

The Benefits Of USB Adapters

Credits : Michael Brown

Finding an available port for your computer peripheral could be very difficult, particularly if you need several ports for your numerous devices. And the difficulty gets more challenging if what you are looking for are ports with serial, parallel and non-USB connectors, because modern computers have either reduced or removed the use non-USB ports.

If you cannot find any available non-USB ports, you can still your non-USB devices to use. Simply get yourself a USB adapter. You may ask, is a USB adapter better than the conventional expansion card? Here are the advantages of employing a USB adapter:

1. Compatibility. Whether you wish to connect the serial, parallel port, or any other non-USB ports to your computer using the USB adapter, you won't have any problem getting them to work properly. The USB adapter allows your devices to work if connected to a USB port.

2. Price. Buying an expansion card is more costly than buying a USB cable.

3. Universality. In the past, there were certain ports that were compatible with only specific devices like printers and modems, particularly for printer ports. USB Adapter accommodates all (depending on the sort of USB adapter) non-USB connectors of any computer peripherals. This short list would include joysticks, keyboards, modems, and mouse with 9- or 25-pin serial connectors.

4. Availability. USB adapters are more plentiful than expansion cards and, in turn, are easier to locate. A local computer store or online store could be a rich resource.

5. Practicality. While most of the devices on the market have USB connectors, computers and other host systems also have USB ports. And because non-USB ports are harder to find, you can resort to a USB adapter to connect your non-USB devices to your computer.

6. No extra expansion cards required. Normally, when you link devices with a non-USB connector to your computer you would need additional expansion cards for each of these. If you would add a joystick and a modem or any peripheral with non-USB connectors, you would have to add an equal number of expansion cards for each use. With a USB adapter, all you require is a USB port to link any non-USB device to your computer.

7. Multipliable. Because a single USB port can accommodate up to 127 devices (including hubs), you can attach several non-USB devices without the need of expansion cards. This means that if you have numerous non-USB devices, all you need to do is to provide each with USB adapter and a hub to connect them to the source.

8. Simple installation. If you prefer to use an expansion card for your single device, you have to open up the computer casing in order for the expansion card to be installed on your motherboard. But that is not the end of it. You still have to turn on your computer to reboot it before the card will start working. With a USB adapter, all you have to do is to attach the connector of your non-USB device to the adapter, insert the adapter into the USB port of your computer and in no time, your device is working--even while your computer is turned on.

With all these advantages, would you still prefer using expansion cards for your non-USB devices? Definitely not! The availability of USB adapters has made connecting devices to your computer quicker, cheaper, and easier.

Web Browsers – Different Types And Uses

Credits :Joe Goertz

A browser is an application that provides a way to look at and interact with all the information on the World Wide Web. Technically, a web browser uses HTTP to make requests of web servers throughout the Internet on behalf of the browser user. In other words, a web browser is a software application that allows one to view pages on the World Wide Web.

The history of the web browser can be traced back to 1991, when a computer guru named Tim Berners-Lee invented the very first web browser. It premiered on February 26, 1991, and ran on NeXSTEP. It was called WorldWideWeb, but was later renamed Nexus in an effort to avoid confusion with the World Wide Web.

There are different web browsers that are available and in use today and they all come with a variety of features. Some of the available web browsers include Amaya, AOL Explorer, Arachne, Arlington Kiosk, Avant, Camino, Dillo, Elinks, Epiphany, Flock, Galeon, iCab, Internet Explorer, Internet Explorer for Mac, K-Meleon, KioWare, Konqueror, Links, Lynx, Maxthon, Mosaic, Mozilla, Mozilla Firefox, Netscape, OmniWeb, SeaMonkey, Safari, Opera and Off By One. Most of these web browsers are free, but there are five of them that do have a purchase price.

Web browsers also come with some features. Some common features that are included with web browsers are spell checkers, search engine toolbars, download managing, password managing, bookmark managing, as well as form managing. Accessibility features that may be included with many web browsers include page zooming, ad filtering, pop-up blocking, tabbed browsing, incremental finding, HTML access keys, voice controls, mouse gestures, spatial navigation, text to speech, and caret navigation.

With so many web browsers being available, there are a number of different technologies that are supported. Some of them are frames, Java, XSLT, XForms, RSS, Atom, SVG, WML, VoiceXML, MathML, and XHTML. Also, with many web browsers, support for different languages is possible, and some of the different languages that are supported by web browsers include English, Slovak, Arabic, German, Dutch, Turkish, Swedish, Chinese, French, Spanish, Thai, Hebrew, Italian, Greek, Russian, Polish, Welsh, as well as hundreds more.

A web browser is a powerful tool, and isn’t just used for personal computers anymore; there are web browsers that can be used on mobile phones, handheld game systems, as well as pocket PC’s.

Web browsers can also be personalized to an individuals needs by utilizing web browser accessories that are not included with the initial browser software. These applications are referred to as “plug ins”, and a few of the more popular ones are Beatnik, QuickTime, RealPlayer, Shockwave, VivoActive Player, as well as Adobe Acrobat Reader.

Beatnik is utilized to receive high-quality sound and audio from websites. QuickTime, which is a product of Apple, Inc., works as a delivery system for such things as 3D animation, audio, movies, MIDI soundtracks, and virtual reality. RealPlayer delivers on demand audio and video without the hassle of waiting for downloads to complete. Shockwave allows multimedia files to be viewed directly in a web browser. VivoActive allows viewing of on demand audio and video from sites that offer VivoActive content, and Adobe Acrobat Reader allows access to PDF files on the World Wide Web.

Knowing all of the web browsers and their specific uses, it will become easy to understand how choosing the right web browser can enhance the Internet experience.

Who Else Wants To Tweak Windows XP For A Faster PC

Windows XP has lost of colours, themes and similar special effects to make your PC look great. These effects slow down your PC and that is the main problem.

If your computer is running slow, and you are sure you do not have a virus, spyware or adware you may try using some of these Win XP tweaks. The more special effects you remove the better.

Some of the effects that slow your PC are:

1. Pictures on the desktop background. A blank wallpaper is the best. Animations or even sounds in the background slow PC even more. Remove Shortcuts on the Desktop. This will be described further below as well.

Right click on My Computer icon and select properties. Go to Advanced Tab, and select Settings next to Performance. Finally select Adjust for best performance. Click OK twice. That is one of the best Win XP tweaks.

2. Is your browser by default plain, or did you install many extensions, themes and cursor symbols? Those slow down speed, so removing them is the best solution if you have a slow PC.

Switch to Windows Classic Theme by right clicking on Desktop and go to Properties.

3. Sounds also cause speed problems, so removing them is another good tweak. These include also startup and shutdown sounds. Remove sounds from your control panel. Double click on the Sounds icon.

4. A lot of MsWord, Notepad, Image and similar files scattered around on your desktop or located in shortcuts can be removed or arranged.

Create new folders, and organise your files. A folder for MsWord documents, images, sounds and Notepad files so you do not waste space.

Shortcuts on your desktop, in start menu and anywhere else can be removed to tweak XP. These are unwanted and are safe to be removed. You know if an icon is a shortcut or not because once you click delete you can read:

"Are you sure you want to delete this shortcut?"

5. Use the search tool to find unwanted files. WIn XP search tool allows you to search for certain file types. For example you can search for only images .gif or .jpg. You can find all the images on your PC, and remove all the unwanted image files.

Same with sound files, documents and you will be amazed about this stuff that has piled up during the years. A brand new computer does not need to search for these files.

Be careful though when using this tweak. Do not remove files you are not sure what their use is. Some files may be system files useful for your PC to work well.

Doing so can damage your PC.

6. Bookmarks or favorites inside your web browser have their negative side too. Same with cookies, cache and browser history.

Remove unwanted sites from your favorites. In Internet Explorer remove cache, cookies and history by selecting Tools, Internet Options and clicking the desired action.

In other browsers these options can also be tweaked from the menu which is usually under Tools. Remove these unwanted files often, or weekly. A weekly or more often job is clearing your recycle bin which helps cleaning wasted space.

Those 6 tweaks will organise your PC for a faster performance. It is the basic for XP users who suffer from slow speed. Even if your PC is not slow, some of the tweaks are still useful in the long run.

Credits : Karl K Smith

Windows Cannot Find error message - How did I get rid of it quickly

"Windows could not find" problem often appears unexpectedly, and you can't even remember what you did wrong before this problem occurred for the first time. If you already have the problem with "Windows cannot find", be sure that you have thousands of "colleagues" all over the world. Once appeared for the first time, "Windows cannot find" error message happens over and over again, and you feel that there is literally now way how you can stop it. The visible part of the problem in most cases is that you see "Windows cannot find XXX. Make sure you typed the name correctly, and then try again." error message on your Windows startup. We know variations of this problem when the text of error message described DLL (dynamic-link library) rather than some executable file. Searching for the file name, mentioned in the text of "Windows can't find" error message, usually makes no sense - there is not such file in your system at all. If you see "Windows not found" error for the first time, think of which third-party program could show it. In most cases "Windows cannot find" error message means that there was a command to run some file, but the file itself is absent. If you are an experienced user and want to seach your autorun list and fix "Windows not found" error - use msconfig.exe utility shipped with your Windows. If you are professional, you will certainly need to use "Autoruns" program, as it provides much more options for editing your autoruns list than any other program of this kind. You may also try to use System Restore to restore your Windows to the state where there was no "Windows could not find" problem at all, but this helps only in one case from ten. For safer fixing of "Windows cannot find Somefile.exe. Make sure you typed the name correctly, and then try again." error we recommend you to reboot into Safe Mode. Be sure to terminate all processes connected with the program you see in the text of error message before you cleanup your autoruns list. No matter which way you will select to clean your autorun list from "Windows cannot find XXX. Make sure you typed the name correctly, and then try again." problem, be sure to make backup first!If the process causing "Windows cannot find" problem is currently run, it will recreate the malfunctioning autorun entry you deleted. Fixing "Windows can't find" problem manually can be a tedious task if you are professional and dangerous task if you are newbie. Be sure to seek for help of professional if you don't know exactly what you are doing. Never commit your friends to solve your computer problems, especially with "Windows cannot find Somefile.exe. Make sure you typed the name correctly, and then try again." if you are not sure if they are known the exact solution. Many companies provide solutions for this threat. In fact, solving your problem with such Fix-Wizards is as easy as one mouse click. Just type something like "Windows Cannot Find Fix Wizard" in your favorite search engine and download the solution.

Credits : SSHguy1

bypass the recycle bin when deleting files

now there are two ways to do this
1st : bvefore deleting any thing make sure u press the shift key and keep it pressed
that way the files u delete wont go to the recycle bin they will be deleted imediatly
but u have to do this evey time u decied to delete any file.

2nd : this is the one i use

Right-click on the Recycle Bin and choose "Properties".

On the "Global" tab, check the box that says, "Do not move files to the Recycle Bin...."

and even better uncheck the box

display the delete confirmation dialog

now if u have this box unchecked u wont have to confirm the deleteing
just press delete the file is gone

Credits : NFT team

Saturday, July 05, 2008

How to make a folder in the Quick Launch Bar

For those of us that have lots of launch icons for programs, webpages, etc. in the Windows Quick Launch Bar, did you know you can make a folder to organize and store even more Icons for the above mentioned and launch them with the same quickness? If you are not using Quick Launch, you are missing out. Open the "Quick Launch" by right clicking on the "Start" button and then "Properties" and on the window that opens, click the "Taskbar" tab and put a check mark in "Show Quick Launch" > then read on:

Here's how to do it in Windows XP: Right click the My Computer Icon, the click "Explore" then expand (click the +) of the (C:) 'Active Partition', and then expand the "Documents and Settings" (You need at this point to make sure you are not hiding "Hidden Files and Folders" by sliding up to the "Tools" on the task bar of "My Computer's" window, and then "Folder Options...", and then "View" and look down the list to "Hidden Files and Folders" and put a tick mark in the "Show Hidden Files and Folders" if you don't have that checked already) - now back to: ->... after the expansion of "Documents and Settings", look down to <"your user name"> and expand the "+" sign there. Under your <"user name"> expand the (+) by "Application Data" and look down to "M*cros*ft" - expand the (+). Now down to "Internet Explorer" and guess what - expand the (+). Now you will see a folder named "Quick Launch". If you highlight it and look in the right panel -> all the Quick Launch Icons that you have in your Quick Launch Bar will be present (if you are using the "Quick Launch" feature of Windows).

To make a folder among your icons, just right click in an open place in the right hand panel within your icons, and click on "New" and then "Folder" and then name it whatever you want. You can now drag the "Quick Launch" icons to it and drop them in the folder to help you organize. Now you can have the most used shortcut icons visable on the taskbar, and the least used in the folder and just by opening or as described in the next hint, just highlight the folder and they will appear.

The way to do the above is: If you slide the moveable bar on the Taskbar [make sure you don't have it locked and if it is, clear it by right clicking in a blank space before your tray (that's where your clock is) and untick to unlock the "Lock Taskbar"].

Now with the Taskbar unlocked, you can slide the little bar marker over toward the "Start" button and cover some icons and the folder you made. It will open when you hover over it with your mouse and your icons will expand, just like a menu. To 'see' your hidden icons and the folder you created, you will notice you now have ">>" showing on the Toolbar. Just click it with your left mouse button and the hidden shortcuts inside will slide open.

I found this to be very handy and I think you will also. Sorry if this is too detailed for our more experienced users, but remember, we have beginners here also!


How to recover MOST of scratched CD data discs

I learn an old thecnique to how to recover damaged or scratched disks
with some lost of data. In this case i have one borrowed game - MAX PAYNE 2
with a chunck of 4 mb lost with a scratch in CD1 Install. Here we cover some
special thecniques of how to create a full working CD from the scratched one.

First some tools will be needed:

1. Alcohol 120%
2. UltraISO
3. Windows XP/2000 (not tested on 95/98/me)
3. Small piece of cotton
4. Dry cleaner paper
5. Finally, oil for cooking.

First step - preparing the CD

Get the cotton and drop some water, start cleaning vertically the surface of CD.
Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece
of cotton, drop some oil for cooking and start to wet the surface like you are
washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the
microsurface of the scrath. It's okay. Seems the oil helps the laser of the CD/DVD driver
to read the surface again. Sure this will work with small unreadable scratchs - some hard
scratchs loose parts of the surface of the CD where we have data and it's lost forever.
But if it is loosed try anyway. Whith this tip 80% of the small scratched CD's coud be

Second Step - testing the CD

With Alcohol 120% make an ISO - image making wizard - and lets see if the app can
read the loosed surface. In my case Alcohol 120% had recovered 60% of the data.
This is not enough. Have tryed other appz, they do not recover all the data. But the
CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?

third step - making the new CD

With the main copy system of windows explorer you can do it. Just create one folder
with the same name of the CD label for future burn reference, and copy the CD content
to the folder. When the CD copy process find the scratch, in majority of the cases, it's
slow down the reading and will recover ALL loosed data.If not, it just tell you there's
an unreadable sector. In this case your CD is lost. But it's not my case, finally
windows explorer got all the data from the scratch and made a copy in the folder.
with the ultraISO, wrote the original CD label, drop the content of the folder and
save as Iso. You can Test the new CD just mounting the iso in the Alcohol 120%. In my
case i did ISO of the two discs from MAX PAYNE 2 and tested installing from the mounted
ISO. Works like a charm. I got the 4 mb lost again. So, I have burned the CD and now i
have a working copy from the scratched one.

Sounds too bizzarre, but works. Course you can jump the cleaning process and try to copy
the content with Windows explorer. But in my case did not work without oil...

Any comments are welcome.


Formatting a Partition Greater than 32 GIGs with FAT32

WindowsXP will only format a partition greater than 32 GIGs as NTFS.
If you want to format it with FAT32:

1. You can use a regular Win98 Boot disk and use that version of FDISK to create the partition (with Large Hard Drive Support)
2. Reboot with the same boot disk and format

3. WindowsXP will then be able to use the partition with no problems 


Adding SafeBoot to the Boot Menu

You can add Safeboot as an option to the normal XP boot screen

Open a command prompt

Copy the current c:\boot.ini to another name (just in case)

With your favorite text editor, edit c:\boot.ini

Copy then edit the current boot line to another line. For example:
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect
might copy and then change to:
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional Safeboot" /fastdetect


Click on the BOOT.INI tab

Highlight the second line with the additional name of Safeboot

Check the /SAFEBOOT box with option you want

Minimal - Minimal set of drivers
Network - With Network Support
Dsrepair - Directory Services Repair
Minimal (Alternate Shell) - Standard Explorer Desktop

You will now have this option every time you start XP 


Identify Faulty Device Drivers

If you are having problems with lockups, blue screens, or can only get to safe mode,
often the problem is due to a faulty device driver.

One way to help identify them is through the use of the Verfier program

Start / Run / Verifier

Keep the default of Create Standard Settings

Select the type of drivers you want to confirm

A list of drivers to be verified on the next boot will be shown.


If your computer stops with a blue screen, you should get an error message with the problem driver

To turn off the Verifier, run verifier /reset 

credits : NFT TEAM

Understanding Firewall

What is a network firewall?

A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic.

Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don’t have a good idea what kind of access you want to permit or deny, or you simply permit someone or some product to configure a firewall based on what they or it think it should do, then they are making policy for your organization as a whole.

Why would I want a firewall?

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people’s walls with spray paint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect. Usually, a firewall’s purpose is to keep the jerks out of your network while still letting you get your job done.

Many traditional-style corporations and data centers have computing security policies and practices that must be adhered to. In a case where a company’s policies dictate how data must be protected, a firewall is very important, since it is the embodiment of the corporate policy. Frequently, the hardest part of hooking to the Internet, if you’re a large company, is not justifying the expense or effort, but convincing management that it’s safe to do so. A firewall provides not only real security–it often plays an important role as a security blanket for management.

What can a firewall protect against?

Some firewalls permit only Email traffic through them, thereby protecting the network against any attacks other than attacks against the Email service. Other firewalls provide less strict protections, and block services that are known to be problems.

Generally, firewalls are configured to protect against unauthenticated interactive logins from the ‘outside’ world. This, more than anything, helps prevent vandals from logging into machines on your network. More elaborate firewalls block traffic from the outside to the inside, but permit users on the inside to communicate freely with the outside. The firewall can protect you against any type of network-borne attack if you unplug it.

Firewalls are also important since they can provide a single ‘choke point’ where security and audit can be imposed. Unlike in a situation where a computer system is being attacked by someone dialing in with a modem, the firewall can act as an effective ‘phone tap’ and tracing tool. Firewalls provide an important logging and auditing function; often they provide summaries to the administrator about what kinds and amount of traffic passed through it, how many attempts there were to break into it, etc.

What can’t a firewall protect against?

Firewalls can’t protect against attacks that don’t go through the firewall. Many corporations that connect to the Internet are very concerned about proprietary data leaking out of the company through that route. Unfortunately for those concerned, a magnetic tape can just as effectively be used to export data. Many organizations that are terrified (at a management level) of Internet connections have no coherent policy about how dial-in access via modems should be protected.

It’s silly to build a 6-foot thick steel door when you live in a wooden house, but there are a lot of organizations out there buying expensive firewalls and neglecting the numerous other back-doors into their network. For a firewall to work, it must be a part of a consistent overall organizational security architecture. Firewall policies must be realistic, and reflect the level of security in the entire network. For example, a site with top secret or classified data doesn’t need a firewall at all: they shouldn’t be hooking up to the Internet in the first place, or the systems with the really secret data should be isolated from the rest of the corporate network.

Another thing a firewall can’t really protect you against is traitors or idiots inside your network. While an industrial spy might export information through your firewall, he’s just as likely to export it through a telephone, FAX machine, or floppy disk. Floppy disks are a far more likely means for information to leak from your organization than a firewall! Firewalls also cannot protect you against stupidity. Users who reveal sensitive information over the telephone are good targets for social engineering; an attacker may be able to break into your network by completely bypassing your firewall, if he can find a ‘helpful’ employee inside who can be fooled into giving access to a modem pool.

Last, firewalls can’t protect against tunneling over most application protocols to trojaned or poorly written clients. There are no magic bullets, and a firewall is not an excuse to not implement software controls on internal networks or ignore host security on servers. Tunneling ‘bad’ things over HTTP, SMTP, and other protocols is quite simple and trivially demonstrated. Security isn’t fire and forget.

What about viruses?

Firewalls can’t protect very well against things like viruses. There are too many ways of encoding binary files for transfer over networks, and too many different architectures and viruses to try to search for them all. In other words, a firewall cannot replace security-consciousness on the part of your users. In general, a firewall cannot protect against a data-driven attack–attacks in which something is mailed or copied to an internal host where it is then executed. This form of attack has occurred in the past against various versions of sendmail and ghostscript, a freely-available PostScript viewer.

Organizations that are deeply concerned about viruses should implement organization-wide virus control measures. Rather than trying to screen viruses out at the firewall, make sure that every vulnerable desktop has virus scanning software that is run when the machine is rebooted. Blanketing your network with virus scanning software will protect against viruses that come in via floppy disks, modems, and Internet. Trying to block viruses at the firewall will only protect against viruses from the Internet–and the vast majority of viruses are caught via floppy disks.

Nevertheless, an increasing number of firewall vendors are offering ‘virus detecting’ firewalls. They’re probably only useful for naive users exchanging Windows-on-Intel executable programs and malicious-macro-capable application documents. Do not count on any protection from attackers with this feature.

so its doesn't matter which firewall you use .... zonealarm,kerio,comodo,oupost etc......

Credits : NFT team

Lost bookmarks From MozillaZine Knowledge Base

This article deals with lost or missing bookmarks, recovery methods and preventing future losses. If changes you make to your bookmarks are not being saved or if you can't add new bookmarks, see the article Bookmarks not saved.

* 1 Step-by-step bookmark recovery
o 1.1 Preventing future problems
* 2 Multiple profiles and profile in use
* 3 Corrupt localstore.rdf
* 4 Firefox 2 installer error
* 5 Finding your bookmarks
* 6 Restoring bookmarks from backup
* 7 Other methods of recovery
* 8 Bookmarks always missing after restart
* 9 Prevention
* 10 Related bug reports

Step-by-step bookmark recovery

If you don't see your bookmarks when you open Firefox or Mozilla Suite, the bookmarks file may have been damaged or the contents deleted. Firefox automatically makes up to five daily bookmark backups, with newer backups replacing the older copies, so you must act quickly, before they are all overwritten. However, there are other reasons why your bookmarks may be missing, so it is important that you follow all of these steps:

1. Firefox and Mozilla Suite store user data in a separate place for each user account on your computer. Make sure you are logged on to your computer with your usual logon name.
2. Mozilla browsers allow you to store different sets of bookmarks and other user data in separate profiles. Make sure you are using the correct Firefox or Mozilla Suite profile (see Multiple profiles and profile in use, below).
3. If bookmarks appear in the Bookmarks Manager but not in the main menu, and they can't be edited, try the fix for a corrupt localstore.rdf file, given below.
4. If bookmarks are missing after installing Firefox 2 on Windows, see Firefox 2 installer error (below).
5. If your problem is still not solved after doing the above, see Finding your bookmarks and Restoring bookmarks from backup (below). To identify the correct backup file, you can open and view bookmarks files with your browser.
6. Other methods of recovery

Preventing future problems

* You can minimize the likelihood of future problems by following these suggestions (below).
* If bookmarks are always lost after restarting, it may be because Firefox or Mozilla Suite is not properly shutting down. Read Bookmarks always missing after restart (below).

Multiple profiles and profile in use

Firefox and Mozilla Suite allow different users to have different settings and bookmarks. You may have inadvertently switched to another profile. Start the Firefox or Mozilla Suite Profile Manager and if multiple profiles are listed, select the other profile. If you receive a message that the profile is "in use" or if you are unable to start the original profile, read this article.

Corrupt localstore.rdf

(Firefox) If your bookmarks appear in the Bookmarks Manager but not in the main menu and can't be edited, this can be caused by a corrupt localstore.rdf file [1]. You can fix this by either deleting the localstore.rdf file from the profile folder or, in Firefox 1.5 and later, by starting in Firefox Safe Mode and selecting the option to reset toolbars and controls, then clicking the "Make changes and restart" button, as explained in this article.

Firefox 2 installer error

Bookmarks may appear to be missing after upgrading to Firefox 2. This problem is caused by the installer not properly closing Firefox before doing the upgrade (bug 357922, fixed in Firefox To restore the missing bookmarks and fix other problems that may be related to the upgrade, you should reinstall Firefox.

1. If you don't have the installer already, download it.
2. Uninstall Firefox (your other settings will be unaffected).
3. Restart your machine (advanced users can instead kill firefox.exe processes using the Task Manager ).
4. Run the installer.

Finding your bookmarks

* In Firefox 1.5 and above, five daily bookmark backup files are saved in the bookmarkbackups folder, located in the Firefox profile folder. Important: You must recover one of these five backups before they are overwritten by newer versions.

* Firefox and Mozilla Suite store bookmarks in file "bookmarks.html", located in the profile folder. There is also a "bookmarks.html" file in the program folder, but this one is only a template and does not hold your bookmarks.

To make sure you have the right file, you can open the bookmarks.html file or any bookmark backup file using "File -> Open File" from the Firefox or Mozilla Suite menu to review the contents (see this article for details).

To find all bookmarks files anywhere on your computer, you can use your operating system’s file and folder search feature to locate find bookmarks* (be sure to include the asterisk, with no space). Windows users: Read the information here, as the profile folder containing your stored bookmarks is hidden by default.

Restoring bookmarks from backup

* The import bookmarks feature of the Bookmarks Manager will add the contents of any bookmark backup to your current bookmarks.

* Firefox: "Bookmarks -> Organize (or Manage) Bookmarks... -> File -> Import... -> from File"
* Mozilla Suite: "Bookmarks -> Manage Bookmarks... -> Tools -> Import..."
2. When the file picker appears, navigate to the folder that contains the bookmarks file you wish to use and select that file. Windows 2000 and XP users can navigate to the bookmarks backup folder typing "%APPDATA%" in the file field and pressing Enter, going into Mozilla then Firefox, then Profiles, then xxxxxxxx.default (where xxxxxxx is any sequence of numbers and characters), then the bookmarkbackups folder [2].

* Alternate method for advanced users: Rename the backup file "bookmarks.html". Replace "bookmarks.html" file in the profile folder with the renamed backup. Make sure the browser is not running when you replace the bookmarks!

Other methods of recovery

* Check the Recycle Bin/Trash for a file called "bookmarks.html".
* (Windows) Run the error-checking tool Chkdsk (Windows 2000, XP) or ScanDisk (Windows 95, 98, ME) to see if you can recover any file fragments that contain your lost bookmarks. Look for files with names like FILE0001.chk or FILE0002.chk on the root directory (the files may be inside folders named FOUND.000 or similar). Open each file in Wordpad or Notepad and, if it contains bookmark data, rename it with an .html extension (for example, rename FILE0001.chk to bookmarks1.html). Finally, import the file using the Mozilla Suite or Firefox Bookmarks Manager [3].
* Use a file undelete utility to see if you can recover the file [4] [5]

Bookmarks always missing after restart

This may occur on Windows systems because Firefox (or Mozilla Suite) is not properly shut down before you power down or restart the computer. This can be caused by a faulty or misconfigured plugin or extension, or even malware, causing Firefox to remain in memory. To see if this is your problem, perform the following steps:

1. Use Firefox to browse the web for a while, then open the Windows Task Manager, select the Processes tab and find firefox.exe in the list.
2. Use "File -> Exit" from the Firefox menu to close Firefox, then wait for firefox.exe to disappear from the Task Manager Processes list (this may take a few seconds if many tabs were open, or Firefox was using a lot of memory). If the firefox.exe process disappears and doesn't come back, this is normal, so if your bookmarks are always missing whenever you restart the computer, it could be related to bug 333907 which may cause .rdf file corruption. To avoid it, exit Firefox before shutting down your PC.
3. If firefox.exe remains in the Processes list, end the firefox.exe process by selecting it in the Windows Task Manager and clicking "End Process".
* If the process disappears and doesn't come back, you may have an extension or plugin issue causing Firefox to persist in memory (for example, firefox.exe may remain active after running a Java applet). You should make sure all plugins and extensions are up to date and seek support if the problem persists.
* If the process disappears but comes back, you probably have a virus, or some other malware. Anti-virus software may not be able to detect it. If yours doesn't, seek support. See also Firefox.exe always open.


* Do not power down your computer with Firefox/Mozilla Suite running.[6]
* Be careful when using Firefox Safe Mode. If you use the option to reset bookmarks to Firefox defaults, this will delete your bookmarks.
* You can also lose your saved bookmarks by accidentally deleting them in the Bookmarks Manager.
* Some "computer clean-up" programs like System Wiper may delete your bookmarks. Make sure you do profile backups before using such programs.
* Periodically save your bookmarks to the backup location of your choice:
o Firefox 1.5 and earlier: "Bookmarks -> Manage Bookmarks... -> File -> Export..."
o Firefox 2: "Bookmarks -> Organize Bookmarks... -> File -> Export..."
o Mozilla Suite: "Bookmarks -> Manage Bookmarks... -> Tools -> Export..."
* You can increase the number of saved Firefox backups by modifying the value of the browser.bookmarks.max_backups preference to the desired number.
* Instead of backing up just your bookmarks, you can also back up your entire profile. See also Guide: Bookmark Back Up Extensions/Utilities and More.

Credits : NFT team & MozlliaZine KB

Vista DOES have a compatibilty mode.

Run Applications In Compatibility Mode In Vista

If you upgrade to Windows Vista, one of the things you may discover is that not all of your older programs will work under Vista. Many software vendors are working to release Vista-compatible versions but in the mean time, you can try running the applications in Compatibility Mode.

Open Windows Explorer.
Location the application executable.
Right click the executable and click the Properties option.
Select the Compatibility tab.
Select the Run This Program in Compatibility Mode option.
From the drop-down list, choose the operating system you ran before upgrading to Vista.
If necessary, select the option to run the program as an administration.
Click OK.

Sometimes it works, sometimes it doesn't but it's worth a try anyway. 

Credits : NFT team

How to integrate Windows XP Service Pack 2 files into the Windows XP installation folder

View products that this article applies to.

Article ID : 900871
Last Review : June 20, 2006
Revision : 3.0


This article describes how to integrate Microsoft Windows XP Service Pack 2 (SP2) files into the Windows XP installation folder. You can use the /integrate switch or the Update.exe utility to perform this task. These tools help you run an in-place upgrade to Windows XP SP2 if the original Windows Setup CD is an earlier version of Windows XP.



Method 1: Use the /integrate switch

1. Create two new folders on the computer. For example, create the C:\XPCD\i386 and C:\XPSP2 folders.
2. Copy the files and folders in the i386 folder from the original Windows XP CD to C:\XPCD\i386.
3. Download the Windows XP SP2 network installation package to C:\XPSP2. To download the installation package, visit the following Microsoft Web site:

Note If the operating system uses a language other than English, change the language to English before you download. The Change Language option is listed in the middle of the download page.

4. Click Start, click Run, type cmd, and then click OK.
5. At the command prompt, type cd C:\XPSP2, and then press ENTER.
6. Type WindowsXP-KB835935-SP2-ENU.exe /integrate:C:\XPCD, and then press ENTER.
7. The Windows Service Pack 2 Setup Wizard starts and notifies you that Windows XP SP2 files are being integrated into the Windows XP installation folder. Follow the instructions in the Windows Service Pack 2 Setup Wizard.
8. Click OK when you see the dialog box that indicates that the integrated installation has completed successfully.
9. After you complete the integration process, run an in-place upgrade to Windows XP SP2. To do this, click Start, click Run, type C:\XPCD\i386\winnt32, and then click OK.


Method 2: Use the Update.exe utility

1. Follow steps 1 through 5 of Method 1.
2. At the command prompt, type WindowsXP-KB835935-SP2-ENU.exe –x, and then press ENTER.
3. When you are prompted, make sure that C:\XPSP2 is listed as the destination folder for the extracted files, and then click OK to extract the files.
4. At the command prompt, type C:\XPSP2\i386\update\update /s:C:\XPCD. The Windows Service Pack 2 Setup Wizard starts and notifies you that Windows XP SP2 files are being integrated into the Windows XP installation folder.
5. Click OK when you see the dialog box that indicates the integrated installation has completed successfully.
6. After you complete the integration process, run an in-place upgrade to Windows XP SP2. To do this, click Start, click Run, type C:\XPCD\i386\winnt32, and then click OK.

• Microsoft Windows XP Professional
• Microsoft Windows XP Professional
• Microsoft Windows XP Service Pack 1a
• Microsoft Windows XP Home Edition
• Microsoft Windows XP Home Edition
• Microsoft Windows XP Service Pack 1a

Keywords: kbhowto kbinfo KB900871

credits : KB articles & NFT team

Some Google tricks is famous as a search engine and it's full
of tricks. Here are a few new tricks you haven't seen

Google does calculations. For example, to find out how
many times the number 8 goes into the number 720, just
type 720/8 in the search box and press the Enter key to
get the results. You can use the standard + and - keys to
add or subtract. Use the / key to divide and the * to

You can also use google to convert measurements. For example,
type "100 meters in feet" (without the quotes) and press the
Enter key for the results.

Use a dash to eliminate a word you don't want in your search
results. For example, if you were looking for a Hilton hotel
and not the Paris Hilton, you'd type Hilton-Paris as your
search criteria.

Place quotes around your search query terms to direct Google
to search for the terms together. For example, "George Bush"
will avoid any reference to foliage.

If you want to limit your search to a certain domain type,
place a colon after your search and then type the domain
extension. For example,

To limit your search to a specific language sites, click on
Preferences (to the right of the search bar) and click next
to the languages you wish to read search results. Scroll down
to the bottom of that page and click Save Preferences.

Finally, you can enter a zip code, a +, and then a local search
result you wish to find. For example, type 90210+kitchen cabinets
to produce a list of cabinetmakers in Beverly Hills. This works
really well if you are looking for a restaurant.

Credits : NFT team

How to explain RSS

How to explain RSS to your friends, family & clients

RSS is something I use everyday for my own personal use that speeds up my use of the internet tenfold. Sadly, most people outside the industry still haven’t cottoned on to it yet. So I’m going to try help you to explain it to them.

Step 1: Explain what RSS is and what it the abbreviation stands for?
RSS stands for Really Simple Syndication - when selling the idea of RSS to people it’s best not to dwell on the name too much - it’s a stupid name which I’m sure is partly responsible for the lack of popular uptake - instead focus on what RSS is and what it does and tell them RSS will save them time.

RSS is a simple way for people to see when a website has updated. A good example for this is news. If a big news story has broken you’ll want to be informed as and when information becomes available so you’ll probably keep checking your favoured news website every 20 minutes to see if it’s changed but with RSS you don’t need to bother as you’ll be informed as and when changes are made.

Explain all the different terminology and let’s people know it all means the same thing. Feeds, RSS, Atom, feedreaders, aggregators and all that bullshit really confuses people. It confuses me and I’m supposed to know what I’m doing.

Thanks to heavy promotion by BBC TV/Radio and Ricky Gervais in the UK, podcasts are relatively big news so a good idea might be to explain that RSS is like a podcast but with text instead of music/talking.

Step 2: Eliminate any confusion about RSS being like email updates
Having explained the basics of RSS to people most of them assume it’s similar to email updates whereby they put in their email address and get told when the site has updated but, ensure they know that RSS differs to email updates in a few crucial ways.

Unsubscribing is often much easier - it’s as easy as deleting an email
Your email inbox does not become crammed
and most importantly you don’t have to give anyone your email address. Bye-bye spam!
Step 3: Explain how you use RSS to do non-geeky things
Some great examples of using RSS are:

Keeping track of a news websites when you’re bored at work.
Keeping track of eBay searches to see if that new must-have item is being sold and at what price
Personally, I use RSS alot, to read blogs about web design but if I explain that to people they quickly get bored. Luckily I also use RSS for music (which is a much better example) - I read a lot of mp3 blogs and as soon as they post a new album to download I know about it straight away with RSS. I also frequent the ticket selling website Scarlet Mist on which you can swap/buy unwanted tickets at face value. Tickets posted on there go really quickly so with RSS I can find out about them straight away.

Letting people know what real-world things they can do with RSS will help sell it to them.

Step 4: Explain to them how they can read RSS.
People can download special RSS software (feedreaders) like Greatnews, or read RSS through their browsers including:

Internet Explorer 7 (and not IE6)
or Safari on a mac
Some mobile phones are even now equipped with RSS readers so you can download RSS feeds from anywhere. I use my mobile phone to check for news headlines or football results when I’m bored and waiting for something.

Whatever they use to read RSS, the appearance is nearly always identical. A list of websites that are marked as bold if they have new items you haven’t read yet. A wesbite with nothing new will not be bold. Hey presto, it’s now obvious which sites are worth visiting but it gets better, you can also view the summaries (sometimes even the entire updated text) of the updates and then choose to visit the site only if the content is interesting. This allows better time management. People no longer have to check the site to see if it has updated and they no longer have to visit the site if the updated content is of no interest to them.

Step 5: Go a bit geeky and explain to your clients how RSS will improve their sites.
A website can do (at least) two things with RSS:

Produce their own RSS feed for many purposes
Use other RSS feeds to increase their content
With the correct permissions you can use RSS from another website to make your website a little bit more interesting. Example: If your client has a website trying to get people to visit a UK city then they could include a RSS feed from a local news site that gives people headlines about that city which will give them potential visitors a better feel for the place or they could include the RSS from BBC weather on that city so people from abroad can see what the weather is like (actually, scratch that, as it may decrease the number of people wanting to visit if they knew how poor UK weather can be!)

Using RSS in this way gives a website’s content another dimension but thankfully, it doesn’t detract from the original source i.e. if you supply an RSS feed from your site and someone else uses it on their site, there’s a strong chance that people will eventually find their way back to your site and your visitors will increase. Most RSS suppliers stipulate that you include a link back to their site and make it obvious (although not glaringly so) that the content is theirs. So clients shouldn’t be dissuaded from allowing other websites to use their RSS as it will probably benefit their site more than it will harm it.

Further reading
The BBC does a fantastic job of explaining RSS to people with it’s microsite Feed factory. The BBC display a link to this microsite next to every link to an RSS feed.

credits : NFT team

How to change all file extensions in a folder,

This post also applied to other actions such as copying, removing to manage and organize your Linux file system more effectively.

To make sure that you do not destroy your real files, I use the folder /tmp resided the home directory to carried out this tutorial. You can create a new one if you like.

mkdir /tmp
cd tmp

Now, I'm standing in the folder /tmp. Currently, this is a empty working directory. I make 100 new files in the extension .dot as the following:

for x in {1..100}; do touch "file$"; done

And 200 new files as Gif images

for x in {1..200}; do touch "myimage$x.gif"; done

Now, how can I rename all files .dot to .bak in the folder /tmp? The following command can solve this problem.

for x in *.dot; do mv "$x" "${}.bak"; done 

credits : NFT team

Make your computer faster using this tweak method.

Make your computer faster using this tweak method.

Step 1. Disable the luna theme

Right click on your desktop to open a popup menu.
On the pop-up menu, select the Properties option.
When the Display Properties window appears, notice the Themes roll down box.
Click on the roll down box and select the Windows Classic option.
Click OK.

Stap 2. Fasterbootup

Open the Start menu by clicking on the Start button.
Click on the Run... item.
Into the "Open:" text box, type "msconfig",
Now go to the "BOOT.INI" tab
and check the "/sos" box,
now go to "startup" tab and uncheck all apps you dont need
Click Apply. but dont restart your computer

Step 3. Disabling Services

Open the Start menu by clicking on the Start button.
Click on the Run...item.
into the "Open:" text box, type "services.msc".
Now disable all this services:

>> Alerter
>> Background Intelligent Transfer
>> ClipBook
>> Help and Support
>> Indexing Service
>> Messenger (this is not MSN Messenger)
>> Net Logon
>> NetMeeting Remote Desktop Sharing
>> Performance Logs and Alerts
>> Portable Media Serial Number Service
>> Smart Card (only i you dont use one)
>> Uninterruptable Power Supply
>> Windows Time
>> Wireless Zero Configuration 

credits : NFT team

right-click functionality

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website. 

credits : nft team

How to disable auto-start applications on windows startup?

Using this tip, you can minimize the startup time of windows XP and Vista also. You can disable some optional windows applications like windows messenger, Yahoo messenger, QuickTime and many others auto startup programs that run automatically when you start your computer.

Follow the given steps to disable the windows auto run applications:

To use this feature, you will need to be logged into your computer with administrative rights.

Click Start button and type msconfig in Run option then press Enter for next.

A small System Configuration Utility dialog box will appear with many options like General, System.ini Win.ini, Boot.ini, Services, Startup and Tools.

Now select Startup tab and uncheck the applications that you want to disable from windows startup.

Now click on Apply button to implement the changes then click on Ok button to end the configuration process.

Again close the all program and restart your computer after any changes to go into effect.

credits : nft team

How to exit a Java App cleanly!

Exit Java Application

Have you ever started a java app from an SSH session and when you are done you try to exit the SSH session and it's not exiting. Another symptom would be to call the java app from a script and the script never regains contol from the Java App. The solution is simple...

Your program still has descriptors for stdin, stdout and stderr open and sshd is waiting for them to close. Either have your program close those descriptors or redirect them to /dev/null. You probably also want to use "nohup" to prevent the program from exiting on SIGHUP. Here is an example that should help you....

nohup java -cp . Test /dev/null 2>&1 & 

credits : nft team

Determine the length of all audio CD tracks, Very fast with Excel

This macro will list the duration of all the tracks on an audio CD inserted in your CD ROM.

Open Excel
On the Tools menu, point to Macro, and then click Visual Basic Editor (or Alt F11)
Copy text between the lines below:
Option Explicit

Private Declare Function mciSendString Lib "winmm.dll" _
Alias "mciSendStringA" (ByVal lpstrCommand As String, _
ByVal lpstrReturnString As String, _
ByVal uReturnLength As Long, _
ByVal hwndCallback As Long) As Long

Sub AudioCD_InsertTime()

Static S As String * 30
Dim Cmd As String
Dim Counter As Integer, Answer As Integer
Dim Min As Integer, Sec As Integer
Dim NrTracks As Integer, Track As Integer
Dim TrackLength() As String

Answer = MsgBox("The audio CD must already be in the CD-rom drive." & vbCrLf & _
"No other software may use the audio CD.", vbExclamation + vbOKCancel)
If Answer <> vbOK Then Exit Sub

mciSendString "close all", 0, 0, 0
mciSendString "open cdaudio alias cd wait shareable", 0, 0, 0
mciSendString "status cd number of tracks wait", S, Len(S), 0
NrTracks = CInt(Mid$(S, 1, 2))

ReDim TrackLength(1 To NrTracks)
Dim i As Integer
For i = 1 To NrTracks
Cmd = "status cd length track " & i
mciSendString Cmd, S, Len(S), 0
TrackLength(i) = S
Next i

Counter = Counter + 1
Min = CInt(Mid$(TrackLength(Counter), 1, 2))
Sec = CInt(Mid$(TrackLength(Counter), 4, 2))
With ActiveCell.Cells(Counter, 1)
.Value = "00:" & Format(Min, "00") & ":" & Format(Sec, "00")
.NumberFormat = "[mm]:ss"
End With
If Counter = NrTracks Then Exit Do

mciSendString "close all", 0, 0, 0

End Sub
In the Visual Basic Editor:
Insert > Module
Paste the code.

Go back to Excel (use tab on Windows' Task bar) or close the Visual Basic Editor.
Put an audio CD in your CD ROM
Select any cell (suggest a cell on row 1 for this try out)
Then...... Tools > Macro > Macros (or Alt F8)
With your macro selected click .
You can copy the cells and paste into any text document.
Save the workbook for use next time.

credits : NFT team

Monday, June 30, 2008

Skype Lets You Make Free Phone Calls Online

Everywhere you turn phone companies offer 3 or 5-cent long distance phone calls, or even unlimited long distance for a flat fee monthly.

Now you can make reliable calls using the Internet for anywhere from 0 to 2.3-cents per minute.

Welcome to Skype, the Internet telephony company that has set the traditional telephone world on its ear.

Recently purchased by Ebay for 2.6 billion dollars, Skype stands ready to revolutionize worldwide voice communication simply because they enable you to carry on crystal clear voice communication with anyone else in the world with a either a phone or Internet connection.

What's the catch you ask?
Well, to make phone calls, you need a computer, a microphone, speakers, a modem, an Internet connection and the free Skype software you can download from

To make a free phone call, you need someone on the receiving end with a computer, Internet connection, and the Skype software installed.

To make a call from your computer to a land-based phone virtually anywhere in the world, you must pre-pay for calling minutes in blocks of 10 Euros (approximately $12 U.S.).

One block of calling minutes gets you about 500 minutes of calling time, or a little over 8 hours of talking time.

Skype uses a technology called IP telephony.

IP telephony first appeared commercially back in the lat 1990's with services like, which initially offered phone calls from computers to land-based phones in exchange for watching online advertising.

This model soon failed, but the thought of making ultra-cheap phone calls through a computer did not.

And, as the recent mega sale of Skype reveals, a market now exists that can put Internet telephony to work on a grand scale, or at least large enough to make eBay pony up with a lot of cash and stock to give it a try.

Once you install the software, you log onto the service and can make phone calls to other Skype users through their computers at no charge.

You can set up a call list, much like an instant messaging "buddy list" so with a couple clicks of the mouse you can ring your friends up for a chat.

Or, if you pre-pay for calling minutes, you can enter in the country code and phone number of your pals, click a button, and their phone or cell phone will ring.

Skype also allows you to hold conference calls with up to 4 other people at the same time, making it easy to hold group meetings.

Skype includes a group chat feature which allows you to hold a group chat session with up to 48 other people at the same time... excellent for "webinars" or even planning that next family reunion.

Skype also allows you to transfer files to and from other users, perfect for sharing photos, music and short video clips with your pals.

Tip: Get a good headset microphone.

It makes using the service more enjoyable and also eliminates the echo created by your own speakers feeding back into your PC's microphone. 

Notebook Computers in the Age of the Internet

Everyone knows that our world cannot exist without computers. Ever tried to make a purchase at a convenience store when their computers are down, ever waited for someone to make change when their register computer is down, or have you ever tried to find a book in a library when the system is down? If you have ever experienced one of these inconveniences, you know that our world hinges on whether or not our computers are working.

Remember when you told your teacher that the dog ate your homework? Did she believe you? Probably not. Now the excuse is my computer crashed, my printer wouldn't print, or we were out of ink. Even kids rely on computers to do their schoolwork. The days of pen and pencils are almost over. In fact most students know more about computers than their teachers or parents. They don't even remember a time without computers.

As computers become more and more intuitive and powerful, we must proceed with them. If you are still among the population that resents the encroachment of the computer, think about this scenario. If Eve in the Garden of Eden had access to the Internet, she could have looked up information about snakes. She would have found out that they have forked tongues and an evil reputation. Instead of listening to the snake's lies, she would have thrashed him with a tree branch. Think how much better our world would be now.

The best present any graduate can get this June is a desktop computer or a laptop. In my day, girls were given matching luggage to take their clothes to school. Yes, I know I am dating myself, but I do have a point. Today buy your child a computer and let them take their clothes is a paper sack. They don't care; an old gym bag will do. I know; schools have computer labs, but they are always full. Wouldn't you rather your son or particularly your daughter not be out of the dorm or apartment working on projects or papers? Also, when your newly graduated senior has moved away to school, e-mail will become your best friend. Even if you hate computers, you will learn to love them because they will become your link to your child. The nest will never be empty as long as you have e-mail.

Computers are links to the outside world. The world has never been more accessible or smaller. You have to keep up or you will be left behind and who wants to be the last straggler on the planet? Not me!

Using Shortcuts On Your Computer

I have worked in computer support for many years and it amazes me how people panic and exclaim "I can't do any work" because they suddenly find that their mouse doesn't work properly.

Anything you can do with a mouse can be done from the keyboard. In fact you can do a whole lot more with the keyboard and you can normally do it quicker as well!!

Here is a comprehensive list of keyboard shortcuts that you can use to make yourself more productive -

(Remember that when a shortcut has CTRL+X, it means you must press AND HOLD DOWN the Ctrl key and then push the X key on the keyboard)

CTRL+X Cut (whatever you have highlighted will be 'cut' and stored in the 'clipboard')

CTRL+V Paste. (Will copy whatever is in the 'clipboard' to the position the cursor is in your document)

CTRL+Z Undo. (your last action will be undone - e.g. if you pasted something - it will be removed)

DELETE Delete.

SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin.

CTRL while dragging an item Copy selected item.

CTRL+SHIFT while dragging an item Create shortcut to selected item.
F2 Rename selected item.

CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word.

CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word.

CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph.

CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph.

CTRL+SHIFT with any of the arrow keys Highlight a block of text.

SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document.

CTRL+A Select all.

F3 Search for a file or folder.

ALT+ENTER View properties for the selected item.

ALT+F4 Close the active item, or quit the active program.

ALT+Enter Displays the properties of the selected object.

ALT+SPACEBAR Opens the shortcut menu for the active window.

CTRL+F4 Close the active document in programs that allow you to have multiple documents open simultaneously.

ALT+TAB Switch between open items.

ALT+ESC Cycle through items in the order they were opened.

F6 Cycle through screen elements in a window or on the desktop.

F4 Display the Address bar list in My Computer or Windows Explorer.

SHIFT+F10 Display the shortcut menu for the selected item.

ALT+SPACEBAR Display the System menu for the active window.

CTRL+ESC Display the Start menu.

ALT+Underlined letter in a menu name Display the corresponding menu.

Underlined letter in a command name on an open menu Carry out the corresponding command.

F10 Activate the menu bar in the active program.

RIGHT ARROW Open the next menu to the right, or open a submenu.

LEFT ARROW Open the next menu to the left, or close a submenu.

F5 Refresh the active window.

BACKSPACE View the folder one level up in My Computer or Windows Explorer.

ESC Cancel the current task.

SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Press To:

END Display the bottom of the active window.

HOME Display the top of the active window.

NUM LOCK+ASTERISK on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN on numeric keypad (-) Collapse the selected folder.

LEFT ARROW Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW Display current selection if it's collapsed, or select first subfolder. 

That Does Not Compute!!

Do you remember that famous TV series called 'Lost in Space'.

There would be few who wouldn't remember the Jupiter II lost in space with the Robinson Family, Dr Zachary Smith, Major Don West and, of course, the Robot.

The Robots catch cry was "Danger, Danger Will Robinson" when trouble was lurking or "That does not compute" when something was not logical.

The phrase "That does not compute" springs to mind more often than not as I deal with Family, Friends and Customers with their computers, VCR's and other electronic equipment.

What doesn't compute is why you pay so much to use so little of the power of a device such as a modern day computer. You are paying $1500 - $2000 for a device to play games.

Now come on ... hands up all those people who bought a computer for their kids to play games ... OK ... there's one ... two ... three ... yes there's quite a few.

Now your saying to yourself "Well what else would I do with it because I don't run a business" and therein lies my point. You don't have to be running a business to get the most out of your computer ...


.... why NOT run a part time business and try and get some of that investment back.

Here is a list of personal/business uses for your 'toy' -

1. Build a Catalogue/Index of your favorite recipes

2. Research and build your family tree

3. Search the Internet for any sort of information

4. Create your own family or Business web site

5. Use it to run design software for quilts (this is a use one of my friends uses it for). There are tons of software programs out there that allow you to design almost anything.

6. Catalogue your collection of whatever you collect (stamps, comics, figurines, books, toy cars etc)

7. Shop online

8. Buy Goods like cars, white goods, furniture.

9. Sending and receiving email

10. Keep a list of personal and business contacts

11. Let your kids research their homework on the internet

12. Do an online course of study

13. Complete a degree or Diploma

14. Book Airline tickets, accomodation, holidays

15. Plan your holiday or trip online

16. Buy and sell goods through an online auction i.e. ebay

17. View and Buy a house

18. Design your own dream home

19. Put an inexpensive web camera on your PC and have a video conference

20. Do Video editing

21. Create Video tutorials of your favorite subject

22. Research your favorite pastime/hobby

23. Send a protest to your politcal representative

24. Scan, edit and store your photos

25. Write a book

26. Write your family history

27. Submit your tax returns electronically

28. Do your banking online

29. Pay your bills online

30. OK, I'll concede ... play some games as well!

This list is just off the top of my head ...

.... you can use your computer for any imaginable task e.g. In the not too distant future your computer will run your house for you.

The one thing that stops you from doing any or all of these things now is a lack of the basic understanding/knowledge of your computer. Sure your reading this article so that means you can receive email or browse the web but what happens if they don't work any more? Do you have enough basic knowledge to rectify the simple problems or would you rather wait for your computer to be 'fixed' by the local technician?

More than 80% of most computer problems could be resolved with just some basic computer know-how. I have known people to go without a computer for a few days only to find a cord was loose on their mouse.

Your first task after buying a computer should be to learn about the basics of your computer. There are online courses, college courses and tutors available to help you do just that.

So take the initiative and get the most out of your computer otherwise you are wasting your time money and 'That does not compute!'