Monday, December 14, 2009

Protocols

Protocols are set of rules and procedures for communicating. There are many protocols are used but some are commonly used protocols. They are:
TCP/IP
NetBEUI
DECnet
X.25
IPX/SPX and
AppleTalk
But the most important protocol is TCP/IP. In this protocol data transmission is managed by dividing the data into different pieces called packets. Each packet of data contains a part of actual data, source computer address, destination address, and information for reassembling data at destination computer. These packets of data travel along the fastest available path in the network. This type of data transmission is called packet switching and is used in internet communication. This is the reason that the protocol is also called Internet Protocol.
TCP/IP is divided into 3 usable classes and 2 experimental classes. Class A, B, C are usable classes and D, E are experimental classes. We can not use experimental classes in network.
Classes Range
A 1.X.X.X 126.X.X.X
B 128.X.X.X 191.X.X.X
C 192.X.X.X 223.X.X.X
D 224.X.X.X 239.X.X.X
E 240.X.X.X 254.X.X.X
127.X.X.X is used for troubleshootin

Protocols

Protocols are set of rules and procedures for communicating. There are many protocols are used but some are commonly used protocols. They are:
TCP/IP
NetBEUI
DECnet
X.25
IPX/SPX and
AppleTalk
But the most important protocol is TCP/IP. In this protocol data transmission is managed by dividing the data into different pieces called packets. Each packet of data contains a part of actual data, source computer address, destination address, and information for reassembling data at destination computer. These packets of data travel along the fastest available path in the network. This type of data transmission is called packet switching and is used in internet communication. This is the reason that the protocol is also called Internet Protocol.
TCP/IP is divided into 3 usable classes and 2 experimental classes. Class A, B, C are usable classes and D, E are experimental classes. We can not use experimental classes in network.
Classes Range
A 1.X.X.X 126.X.X.X
B 128.X.X.X 191.X.X.X
C 192.X.X.X 223.X.X.X
D 224.X.X.X 239.X.X.X
E 240.X.X.X 254.X.X.X
127.X.X.X is used for troubleshootin

Monday, November 30, 2009

How to clean a Motherboard to save computer life?

Motherboard is the main part of your computer that contains all hardware components. Your computer motherboard could fry, if you do not keep it clean on periodically basis. Dust is the main cause to heat up your system and heat link to hardware failure. You can save your computer maintenance cost if you clean your computer on the regular basis. This will improve the cooling and performance of the motherboard components.

-To clean your motherboard first unplugs your system power from the electrical outlet.
-Using the screwdriver remove the side covers of your computer case and put them to one side.
-Check all data and power cables connections. Inspect all motherboard PCI and AGP slots.
-Remove all add-on card of your motherboard for example RAM, modem, VGA, sound card and LAN card.
-Now blow the air around all the motherboard sides and keeping away your blower nozzle 4 to 5 inches away from main board components. You can use vacuum cleaner also for this purpose but compressed air is the better solution to clean a system.
-At the end assemble back all cards, cables and side covers of your system.
-I recommend you doing this after every three months if you want to save your system life.

Wednesday, November 18, 2009

How to install and uninstall a webcam?

First read the instructions from your camera manufacturer and follow them carefully to ensure proper installation of your camera. You must follow all guidelines specific to your camera.

Correct camera installation involves inserting the camera setup/installation CD, following all steps described in your installation booklet, and restarting your computer. Plugging in the camera's USB cord at the incorrect time during the camera software installation procedure can cause various problems. After installation reboot your system

To uninstall your webcam:

-Uninstall any existing camera installations. Click "Start," "Settings," "Control Panel," and "Add/Remove Programs."


-Unplug the camera's USB cord from the computer and Reboot your computer.

Tuesday, November 17, 2009

How to prevent users from writing to USB drives?

Today USB drive also known as key chain drive is becoming the most popular removable storage device to move data to different locations. USB drives are available in the market with different features, for example password protected, compatible with all windows versions and extra storage capacity (up to 65 GB).

A common security issue at organizations is how to prevent their workers to write data onto USB drives using their PCs, because a user can easily move confidential data for other location.

If you have windows XP with SP2, then you can disable the writing option to USB drives.


Follow the given steps to disable the USB writing option:


-To edit the computer registry, first you should log onto your computer with administrative rights.


-First click on Start button and type "Regedit" in Run option.


-Here locate the location to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control


-Here in right side panel, click right to create a key with the name "StorageDevicePolicies".


-Now in left side panel, select "StorageDevicePolicies" key, again right click to create new DWORD value then label it "WriteProtect".

Set its value to "1". But again enable this option set its values "0".


-Now close the registry editor and restart your computer after any changes to go i
nto effect.

Sunday, November 15, 2009

How to Enable the Windows Task Manager?

Windows Task Manager is used to view the status of running applications, active processes, CPU and Page file usage history and active user in windows environment. As a system administrator you can mange the all features of Windows Task Manager, you can end task any running application and set the priority of any running process according to application importance. By default Windows Task Manager Status is enabled, but a user can also disable or enable it manually. But some time a registry hack applies on windows task manager to disable it and your system give you a message” Task Manager has been disabled by your administrator.” then you should enable it with editing the system registry or using Group Policy Editor.
Before proceeding further, first scan your system with up-to-date antivirus, and then follow the given steps to enable it using group policy editor.
To enable this feature, you will need to be logged into your computer with administrative rights.
-Now click on Start button and type “Gpedit.msc” in Run option then press OK.
-In Group Policy Editor, expand the “Administrative Templates” > “System” then “Ctrl+Alt+Del Options”, under the User Configuration option.
-Now in right side of panel “Ctrl+Alt+Del Options” double click on “Remove Task Manager” to change it setting. Here set the option “Disable” to “Enable” or “Not configured” and your task manager is available once again.

Saturday, November 14, 2009

How to use Google advanced hidden Calculator?

Normally search engine keep the record of website addresses along with the important words for description of each web page, but the interesting thing is that you can use Google search box as calculator. Using the Google calculator you can perform standard and advanced scientific functions. Google built-in calculator can solve your routine mathematical problems for example (simple Arithmetic function, Trigonometric, Inverse trigonometric, Hyperbolic and Logarithm functions). One important feature of this calculator to evaluate the Constants values, units of measurement and currency conversion also.
Follow these examples with different type of calculations:

-Arithmetic Function
First open the Google.com and type the value like 100+500-10= in search box and press search button to show the result.

-Logarithm Functions
To calculate logarithm base 10 values, type log (100) in search box and press search button to show the result.

-Advanced Math Function
To calculate cos90 value, type cos(90) in search box and press search button to show the result.

Currency Conversion
To convert the 100 USD in British pounds, type 100 USD in British pounds and press search button to show the result.

Friday, November 13, 2009

How to recover windows startup missing files using Recovery Console?

Some time windows missing the startup files due to the power failure, virus's attack and any other illegal action by user. You can solve the windows startup problem with running the windows recovery console feature. Almost all windows serious problem can be solved using windows recovery console function. You can enable or disable the services, copy and paste data from one drive to others, format any drive and many others. Recovery console is normally used to recover the windows missing files from copying any other hard disk and CD drive to your hard disk or enable/disable the windows services. For repair windows using recovery console, you should have the bootable windows CD.
-First boot your computer using bootable windows CD. To boot from CD, first change the booting order setting in your system BIOS.
-When first blue screen will appear, press R to start the windows recovery console.
-Here you are prompted for Administrator password, type password or press
-enter if the administrator password is blank.
-Now at command prompt, type the command that you want to use for system recovery.
Enable: used to enables the windows drives or services.
Bootcfg: used to modify the Boot.ini files.
Copy: used to copy file from one location to target location.
Del: used to delete any file.
Cls: Clear the screen
Disable: used to disable the windows drivers or services.
Diskpart: used to manage the hard disk volumes.

Thursday, November 12, 2009

How to clean a CD/DVD-Drive?

If your CD drive creating problem to read CD disc, taking time to read and showing message there is no disc in the drive. These are the symptoms of dirty or weak CD-drive lens, because dirty lens can create errors in reading or writing and soon will not work at all.
Follow the given steps to care and clean a CD-Drive.
-First make sure your discs are clean, unscratched and you are loaded it properly.
-Always use laser lens cleaner to clean drive lens.
-Insert the laser lens cleaner disc and play it for 2 to 3 min.
-Using CD drive cleaner properly clean the CD-ROM laser from dust. If your drive still creating problem then open it and clean the lens with a cotton swab.

Sunday, November 8, 2009

How to display text message warning before windows Logon?

You can insert legal warnings or any interesting messages for others just before logon to windows based computer. This is very useful if you want to give a message to new users about the uses of computer. You can create this banner message using the windows registry editor but make sure before modifying your system Registry about its backup because Registry contains all information how your system runs. This backup will help you to restore Registry in case any problem occurs after modifying.
To edit the computer registry, first you should log onto your computer with administrative rights.
-Click Start button then type regedit in Run option then press Enter for next.
-Here locate the location to:
HKeyLocalMachine\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\WinLogon
-Here in right side panel, double click on the key LegalNoticeCaption and give it a value you want to see in the menu bar. For example “Welcome Screen for All Users”.
-Now again in right side panel, double click on the key called LegalNoticeText and change the value you want to see in the dialog box. For example “You may not succeed later when trying to logon without a password.”
-Now close the registry editor and restart your computer after any changes to go into effect.

How to manage the compatibility issues of Office 2007 to earlier office versions?

By default all Microsoft Office 2007 applications use the different files extensions than the earlier versions. All earlier Office applications used the file extensions as .doc, .xls and .ppt for Word, Excel and PowerPoint respectively, but now Office 2007 applications uses the .docx, xlsx and .pptx file extensions for Word, Excel and PowerPoint respectively. These all new file extensions are not compatible with all previous versions of Office applications, that is why Office 2002 and Office 2003 applications cannot open and read the .docx, xlsx and .pptx file extensions.
However, you have an option in Office 2007 to save the files with in older files extensions, But if you are frequently using the older versions of the file and also if the files created by you are to be shared on other computers which have earlier versions of Office, you may want to save all your new documents in the older format, but that would create duplicate files. There is better option in Office 2007 applications to change the default saving file format to the older format and then the new file format in Office 2007 will be changed to .doc, .xls and .ppt for Word, Excel and PowerPoint respectively.
Today we will set the older file format for Word 2007 and other applications will be discussed in the next tips. Follow the given steps to set the default older file format for Word 2007:
-First click on Start button, go to Program then click on Microsoft Word 2007 to run the word application.
-Now click on File menu in the top left corner then click on Word Options button to change the default word options.

-In the left side panel, click on Save option, and now "Customized how documents are saved" option will appear in right side panel.

-Here find the "Save File in this format" option and click on drop down box to select the different format. Now you will find many options here, select the Word 97-2003 Document (*doc) option.

-Now click on Ok button to save the settings and all new Word files will be created in the format you set as default

Saturday, November 7, 2009

How you find Signs of viruses in your Computer?

Some time your run an infected file and e-mail attachment on your computer but you might not realize that you've introduced a virus until you notice something is not quite right.
Here are some indicators that you will find if your computer viruses infected:

The first and basic sign your computer must runs more slowly than normal after viruses attack.
Your computer stops responding after some time and stuck without any warning and sign or may be after some warning.

Your computer crashes and restarts every few minutes with a message because some viruses tries to break windows security system then system automatically restart and after restart your system may be not in position to run properly and create any application failure problem.

Data on your Hard disk create problem or disks and disk drives are inaccessible.

You see unusual error messages after some time on your system like scan your system, your computer attempt by any other remote computer.

You see distorted menus and dialog boxes disturbing
your routine work.

Friday, November 6, 2009

How to Troubleshoot a LAN Adapter

If your network adapter can not connect with network, please check the following:

1. Make sure your adapter is defective, or not
We can run Diagnostic program which bundled in our shipping driver diskette to check the adapter's hardware. Please follow below instructions to run the Diagnostic program. a. Make sure that the adapter is completely plugged in PC's slot.b. Remove any add-on adapters from slot, except for VGA adapter.c. Disable PnP OS support in BIOS.d. Boot from DOS-only environment.e. Before run Diagnostic program, please don't run any drivers.f. If the adapter tests fail, try to use another slot.

2. Check the LED status. If you have installed driver and re-boot PC completely, please check the network adapter and connected device's LED. The LED of adapter and connected device should show the same link-speed.
a. If the LED does not flash, please check your cable. We can take a sample test. Plug the UTP cable into Up-link and normal port ofhub. If both LEDs of connected port are flash, the UTP cable should be fine.Use Crossover or Straight-Through cable
b. If the LED shows incorrectly. we can try to force line-speed of adapter.The default parameter of our adapters is "auto-sensing". For some of Auto-Negotiation incompatible issues, we must force the line-speed of adapter. Please refer the readme file to set the line- speed.

3. Check cabling system Fast Ethernet cabling system and rule

4. Make sure your configuration of Network Operating System is correct. Please refer to the read me file to install driver. Below hints to check the configuration of your Network Operating System.
a. Microsoft Windows 98/Me/2000 and NT. Because the default protocol of Windows 98/Me/2000 and NT is TCP/IP, so we must assign IP address for each PC. If you don't know how to assign IP address for each PC or don't connect to Internet, we can install NetBEUI protocol.

Thursday, November 5, 2009

How to Install a printer driver on a Windows 2000-based computer

To install a printer driver locally on a Windows 2000 computer:
1. Click Start, point to Settings, and then click Printers.
2. Double-click Add Printer to start the Add Printer Wizard.
3. Click My Computer, and then click Next.
4. Click Add Port, click Local Port, and then click New Port.
5. In the Port Name box, type the path to the printer in the following format, where server is the name of the print server and printer is the name of the printer:
6. Click OK, and then click Close.

Wednesday, November 4, 2009

How to Install an Internal Modem on system

Installing an internal modem is not an easy task. You have to open the computer to install modem cards. Given steps applies to all computer system.
-Shut down the computer and disconnect all peripheral devices from the computer, then remove the computer's cover.
-Find a slot that matches the pins. PCI modems have fewer pins and fit into a smaller slot than ISA modems. Put new modem into that slot if it will physically fit.
-First unscrew the metal plate on the slot holder on the back panel, and insert the modem in that slot.
-Screw modem into slot holder if it has a screw hole.
-Reconnect the monitor, keyboard, and mouse. Connect the modem to phone line.
-Reboot the computer.
-If Windows detects modem upon startup, follow the on-screen instructions to install the driver and additional software. If Windows doesn't detect the modem, manually complete the installation using the Add New Hardware control panel.
-Follow instructions in your modem manual to configure the modem in Windows.
-Adjust the modem settings to match your telephone service and personal preferences.
-You can verify that your modem is working properly by using the diagnostics that are available through the Phone and Modem Options icon in Control Panel. On the Modems tab, click the modem that you want to test. Click Properties, then click Diagnostics
, then click Query Modem.

Sunday, November 1, 2009

Reduce the shutdown time of Windows 2000 and XP

You can reduce the shutdown time of windows 2000 and XP using some tricks. Actually windows XP take time to close all running programs and applications before shutdown, but you can minimize this time if you have little knowledge about editing windows registry.
Follow the given steps to reduce the shutdown time:
-First click on Start button then type Regedit in Run option. Here locate the location to:
-Go to Hkey_Current_User\Control Panel\Desktop
-Here in right side panel, double click on AutoEndTasks and here its default value is 0. Now change it to 1.
-Now in same side panel double click on value name WaitToKillAppTimeout. Its default value data is 20000; now change this value of WaitToKillAppTimeout to 3500.
-Now close the registry editor and restart your computer after any changes to go into effect.

Saturday, October 31, 2009

How to enjoy Chatting on your network with WinChat ?

Today tip will help you to start the chat with other computer users at the same network without internet connection. WinChat is an instant messaging program which is built-in feature of window XP. There are not so many features in this messaging program as other messaging programs just like Windows Live Messenger and ICQ. This program is free from spam and viruses and more secure than other instant messenger programs.
Follow the given steps to use the winchat chatting program:
-When you want to run winchat, first click on Start button and type winchat in Run option then press Enter for next.
-Next you should go to Conversation Menu and then click the dial option.

-Here choose that person you want to chat with on your network (when you will click on dial then you will get list of that persons with which you are going to connect on your network even if they are running winchat or not. If you dial any body of your list they are not responding or ignoring you, then they may not be running the winchat.

-When any body is running winchat he will hear a ringing sound. Both you and your networking sharing person will free to chat with each other when your recipient clicks the answer button.नि
t

Thursday, October 29, 2009

How to set security on your Recycle Bin properties?

Today day tip is very useful to manage the security of Recycle Bin properties because by default everyone can change the recycle bin sittings using windows default rights. If you want to restrict your users to modify these settings, simply edit the "Permissions for BitBucket" and set the read only rights for all users. Using windows registry editor you can set the Recycle Bin rights for all user.
The best technique to edit the windows registry, always backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to edit computer registry for Recycle Bin properties:
To enable this feature, you will need to be logged into your computer with administrative rights.
-First click on Start button then type Regedit in Run option.

-Here locate the location to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\BitBucket
-Here in left side panel, right click on "BitBucket" keys and click on Permissions option.
-Now "Permissions for Bitbucket" dialog box will appear to manage the user's rights.
-Here select the user name or group "Everyone" from the list under the "Group or user names" category and then allow read only permissions for selected user under the "Permissions for everyone" section.
-Now click on Apply button to save these settings and again click on Ok button to finish the process.
-Close the registry editor and restart your computer after any changes to go into effect.
-To verify these sittings, simply right click on Recycle bin and go to "Properties" dialog box and any changes here will give you a message "You do not have permission to modify the settings for the Recycle Bin".

Monday, October 26, 2009

Wireless Stereo Tips


There are devices on the market which allow you to hook up your computers media to wireless speakers and a wireless stereo system. They come with a remote control which will allow you to browse through your media library and music will stream to the wireless stereo speakers.


-Troubleshooting wireless stereo equipment

If you notice performance issues with your wireless home stereo system, there are a few things you can check. First, make sure that the batteries in the wireless stereos and devices are charged and working well. Make sure that the wireless stereo is not covered up as to prevent adequate transmission. Finally, make sure that any devices which may cause interference are separated from the wireless stereo system.


-How Wireless Stereos work

The wireless stereo transmits a signal to the wireless speaker via radio waves instead of traditional wires. The same holds true for radio wave remote controls, which increases flexibility of placement and range of use. With a wireless home stereo system, you will be able to place the stereo and speakers virtually anywhere in the home and not have to worry about wires, plugs, cables or extenders.


For an ultimate speaker performance, choose from a wide variety of
quality discount computer speakers from The Speaker Company.


-Wireless Stereo

Wireless stereo speakers are speakers which play from a computer or wireless stereo system without being hooked up via wires. You can also purchase devices which let you browse your computer music library and play the music on a wireless home stereo system.


-Wireless Stereo Benefits

Using a wireless stereo system will decrease cable clutter, allow greater flexibility with where to place your speakers and stereo and offers a high level of portability. You can move the speakers to where you are and leave the base wireless stereo where it is. Wireless home stereo systems are a great way to listen to music in your home.

Saturday, October 24, 2009

How to recover corrupted PowerPoint file using TEMP folder?

Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become corrupted when you are trying to save it or if you were working on it and your PowerPoint application or windows crashed due to power failure. Windows saves a duplicate copy of working file as a temporary version. There is no need to use any third party software to manage these types of corrupted files, because you can recover them from TEMP folder.
Follow the given steps to recover the corrupted files in MS PowerPoint:
-First click on Start button then click on Search option to start your search process.
-Here type the *.TMP in "All or part of the file name" box then choose the "Local Hard Drives" option in "Look in" box.
-Now click on Search button to start the search process of temporary files on your system local drives.
-After some time, windows locate the list to temporary files. Here arrange the all temp files as Date modified.
-Now open the PowerPoint and try to open these temp files or double click on that file to run in PowerPoint.

Friday, October 23, 2009

How to increase the Browsing and Downloading speed in Windows Vista?

With windows Vista you have noticed the slow internet speed. The web browsing and downloading speed is very slow as compare to previous versions of windows. You can open the same sites in windows XP and server 2003 with the normal speed.
Follow the given steps to increase the Vista browsing speed:
First go to Advance tab in Internet Explorer and turn off the TLS (Transport Layer Security) encryption option. Here to fix problem with some secure pages turn on the SSL 2.0 (Secure Sockets Layer) feature and click Ok button to close it.

Follow the major fix for this problem:

-In windows Vista, the TCP autotuning feature is enabled by default. Some web servers do not respond properly to this feature, so it appears that some sites open with very slow speed.
-To use this feature, you will need to be logged into your computer with administrative rights.
-First click on Start button and type CMD in Run option then press Enter.
-At Command Prompt, type the following command and press enter.
-netsh interface tcp set global autotuninglevel= disabled
-This command will disable the TCP autotuning feature. Now close the command Prompt and restart your computer after any changes to go into effect.
-netsh interface tcp set global autotuninglevel= normal
-Now close the command Prompt and again restart your computer after any changes to go into effect.

Thursday, October 22, 2009

WiMAX Wireless Broadband Info

WiMAX stands for World Interoperability for Microwave Access that enables the actual broadband wireless network with high speed. WiMAX operate same like WiFi but WiFi operate with some limitation like it is base band technology and cover only 100 feet radius with slow speed. WiMAX covers a radius of 50 Km and work with the speed of 70 Mbps. WiMAX is the replacement of the wired broadband. In wired broadband connection, we can transmit data with 512 Kbps to 10 Mbps speed and more, for example DSL broadband and cable broadband. In future all new desktop and notebook computers will be incorporated with WiMAX technology. With this technology you will be connected to the internet even you are driving your car with the speed of 120 Km.
-Objective of WiMAX
Superior Performance
Flexibility
Advanced IP-Based Architecture
Attractive Economics
IEEE 802.16 Specifications
Range 30 mile radius from the base station for LOS (line-of-sight).
Range 4-6 miles radius from the base station for NLOS (Non-line-of-sight)
Maximum data speed supported as 70 Mbps.
Licensed frequency band: 2- 11 GHz
Un-licensed frequency band: 10- 66 GHz
Line of sight is not needed between user and the base station unless very high date rates are required at the user premises.

Tuesday, October 20, 2009

How to move your mouse cursor without mouse?

You can control your mouse pointer with keyboard keys in all windows versions. When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can performs all tasks same like a normal mouse.
Follow the given steps to activate the keyboard mouse:
-To edit this feature, first you should log onto your computer with administrative rights.
-To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.
-To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.
-Click on Settings button, if you want to adjust the mouse cursor detail settings.

-Here a new dialog box will appear with the title â€Å“Settings for MouseKeys", now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.
-Now using Numeric keypad, you can move your mouse pointer. The controls are:
1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions.
Key 5 is used as mouse click button.
-Insert key used to hold down mouse button.
+ Sign used to double click on any object.
-Delete button used to release the mouse.
-Click on NumLock button to disable this keyboard mouse feature.

Friday, October 16, 2009

Selecting a Scanner

Types of Scanners

Scanners come in a variety of configurations. The type you should consider depends on both your planned scanning needs and your budget.


* Drum scanners. This type of scanner provides the highest level of image quality. They are typically found at professional printing businesses. In a drum scanner, the original is attached to a cylindrical drum and rotated past the sensing elements. These scanners are very expensive, with capabilities that go well beyond the needs of desktop scanning.


* Flatbed scanners. This type of scanner provides a flat glass surface onto which the original is placed. The illumination and sensing elements move under the glass to scan the image. Flatbed scanners are available in a wide range of sizes, prices, and capabilities. Some flatbeds offer a transparency scanning adapter as an option.


* Single sheet scanners. This type of scanner is designed for single sheets of paper. You insert one edge of the paper in a slot and the scanner grabs it, feeds it past the sensing array, and passes it out the other side. Some single sheet scanners are even integrated into keyboards. Such scanners were originally designed for digitizing documents and images for archiving, and many models are not suitable for creating high-quality images.


* Sheet-fed scanners. These scanners take a stack of pages and scan them in sequence while you get coffee. Some even do duplex (2 sided) scans. They are very useful in some situations but not much use to the philatelist.


* Photo scanners. This type of scanner is designed to scan snapshots up to approximately 4´6 inches in size. Some are separate desktop units; others install directly into a computer much like a diskette drive.


* Hand scanners. This type of scanner requires the user to manually scan an image. Hand scanners look something like an overgrown mouse. To scan, you manually drag the unit over the original document. Handheld scanners are suitable only for small originals that are no wider than the scanner itself. In theory, most hand scanners permit you to scan a wide original in two or more passes and "stitch" the scans together into a final image. This, however, never works as well as the manufacturers claim.


* Slide scanners. This type of scanner is designed for scanning slides (transparencies) rather than opaque originals, such as photographic prints. While rarely relevant for scanning philatelic material, a dedicated slide scanner is the best choice for scanning slides. Some flatbed scanners come with transparency adapters but they do not provide top quality results, particularly with small slides such as 35mm. Slide scanners have very high resolution, typically a minimum of 2400 dpi, required for getting all the details out of your slides. Many slide scanners also have the ability to scan color negatives and to convert the negative image to a positive image.


For philatelic purposes, a flatbed scanner is undoubtedly the most versatile. You can scan anything from a single stamp to an entire stock book or album page. A hand scanner may be a viable alternative, particularly if your budget is tight. Their width limitation does not matter so much for stamps and covers. I have also seen single sheet scanners and photo scanners used successfully for philatelic purposes, although they require that the item being scanned be sandwiched between clear plastic sheets for feeding into the scanner.

Thursday, October 15, 2009

Print Envelopes and Labels in Word

Word provides a suitable way to print envelopes and labels. You can print mailing and return addresses on an envelope, or addresses on a mailing label.

To create and print an envelope, follow these steps.



Choose Envelopes and Labels from the Tools menu. The Envelopes and Labels dialog box will appear as shown below.


Click the Envelopes tab to display options of Envelopes.


Enter (or Edit) the mailing address in the Delivery address box.


Enter (or Edit) the return address in the Return address box Or select the Omit check box to omit a return address.


Click Options button to specify the envelope size, the type of paper and other options. Click "Add to Document" button to add or attach the envelope to the current document for later printing or editing.


Click Print button to print the envelope.

You can also add graphics to the return address of your envelope. To add graphic, follow these steps.



Select mailing address in the document.


Open the Envelopes and Labels dialog box.


Click Add to Document (or Change Document) button.


Click the Page Layout view icon in the Status bar.


Insert or create the graphic in the document.


Position the item on the envelope.

Wednesday, October 14, 2009

Stop XP Pop-ups

First off, never trust a company that exploits a technology to advertise that they can prevent it. Second, yes you can stop these. You are probably familiar with Windows (a/k/a MSN) Messenger which is used for Instant Messaging. There is another program called Messenger that is used in networks to transmit and send Alerter service messages between clients and servers.
Even though you'll never use it, unless you are on a network, by default it is turned on, causing an open hole in your XP firewall for pop-up advertising to get through. Here's what to do if you want to stop Messenger...
Go to Control Panel / Administrative Tools / Services (or Start / Run and type in " services.msc "). This will bring up a long list of Windows services that are running or available on your system.
Find "Messenger" and double click to open the Properties box. In the "Startup Type" field, change the setting to "Disable". If any services depend on Messenger and fail to start, then change to "manual".
Click OK to save changes.

Tuesday, October 13, 2009

IP Addressing

IP stands for internet protocol. Basically it is a unique identifier for a computer on the internet. It is numerical address with four numbers separated with dots and the format of an IP address is a 32-bit.Each number can be start from 0 and ends with 255. For example IP address looks like this: 131.200.1.1

Every computer on the internet using unique IP address and this IP address can be static and dynamic. A server has a static IP address that does not change. When a computer dialing internet through modem then that computer has a IP address that is assigned by the local ISP. Your local ISP assigned you unique IP address for each session and it may be different each time.

You can connect to any server using this IP address. if you simply type http://131.200.1.1 and arrive at the machine that contains the Web Server for the specified IP address.

TCP/IP is divided into 3 usable classes and 2 experimental classes. Class A, B, C are usable classes and D, E are experimental classes. We can not use experimental classes in network.

Classes Range

A 1.X.X.X 126.X.X.X

B 128.X.X.X 191.X.X.X

C 192.X.X.X 223.X.X.X

D 224.X.X.X 239.X.X.X

E 240.X.X.X 254.X.X.X

127.X.X.X is used for troubleshooting.

Saturday, October 10, 2009

How to set security on your Recycle Bin properties?

Today day tip is very useful to manage the security of Recycle Bin properties because by default everyone can change the recycle bin sittings using windows default rights. If you want to restrict your users to modify these settings, simply edit the "Permissions for BitBucket" and set the read only rights for all users. Using windows registry editor you can set the Recycle Bin rights for all user.
The best technique to edit the windows registry, always backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to edit computer registry for Recycle Bin properties:
To enable this feature, you will need to be logged into your computer with administrative rights.
First click on Start button then type Regedit in Run option.

Here locate the location to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\BitBucket

Here in left side panel, right click on "BitBucket" keys and click on Permissions option.

Now "Permissions for Bitbucket" dialog box will appear to manage the user's rights.
Here select the user name or group "Everyone" from the list under the "Group or user names" category and then allow read only permissions for selected user under the "Permissions for everyone" section.

Now click on Apply button to save these settings and again click on Ok button to finish the process.
Close the registry editor and restart your computer after any changes to go into effect.
To verify these sittings, simply right click on Recycle bin and go to "Properties" dialog box and any changes here will give you a message "You do not have permission to modify the settings for the Recycle Bin".

Tuesday, October 6, 2009

What is Internet Fax?

Internet fax is a type of online service that provides subscribers with the ability to send and receive faxes without a fax machine. Instead, Internet access and an email account is all that is required.
To use an Internet fax service, a subscriber signs up for a small monthly fee and is assigned a fax number. When a fax is sent to the subscriber's number, the service accepts the fax, turning it into a file that is forwarded to the subscriber's existing email address.
To send an Internet fax, the subscriber creates an email. The fax content can be written in the body of the email, and attachments are normally permitted. The destination fax number is entered in the "To" field, along with "@" and the Internet fax service name. For example, if the fax number were 1-550-234-5678, the email would be addressed to
15502345678@site.com. In the "Subject" field the user enters the name of the recipient, "Attn: Mr. Jam" for example.

A small toolbar, available for download from the Internet fax service, is used as a plug-in inside the email program. Clicking on the "Send" button on the toolbar sends the email to the Internet fax service. Upon receipt, an automated program converts the email to a fax format, then faxes to the number supplied in the "To" header. The recipient receives the fax normally, through his or her fax machine.
This service can be very convenient. Of the many advantages, your assigned fax number is active 24 hours a day, so that your account can accept faxes around the clock. Contrast this with using a fax machine, which relies on your phone system being free to accept a fax. For those that use one phone line for fax, telephone, and dial-up, an Internet fax service is especially handy. Internet fax services also save paper and fax toner, and do not rely on a serviceable fax machine. All faxes are sent and received as files. They can be printed by choice, but it isn't necessary.
A further advantage of an Internet fax service is that the subscriber does not need to be familiar with faxing software or fax machines. The convenience of sending and receiving faxes by using the familiar email interface appeals many people.
One of the best features of Internet fax services is that many offer toll-free fax numbers for the U.S. and Canada, so that your U.S. and Canadian clients can fax you for free. Sending faxes is also free of phone charges for the subscriber, as he or she is only sending emails.
When looking into Internet fax services, consider a service that offers a secure website. This provides a mobile "portal" to send/receive faxes while you're on the road or away from home. Confirmation of sent faxes should be standard, so you can be sure your client got your communication. The ability to send to more than one fax number at a time can also be valuable. Check for a page capacity, as some services may limit the amount of pages the subscriber can send/receive in a month.

Monday, October 5, 2009

Protecting Document with Password

u can protect your document by applying password so that unauthorized person can not display as well as modify your document. You can apply two types of passwords:
Password to open the document:
If it is applied then you have to give the correct password to open the document, otherwise you cannot open the document.
Password to modify the document:
If it is applied then you have to give the correct password to modify the document, otherwise your document is opened but you cannot modify the document. It means that your document becomes read-only.
To apply a password to document, follow these steps.
* Open Save As dialog box by selecting "Save As" command from File menu.
* Click "Tools" button of Save As dialog box and choose "General Options" from drop down menu, "Save" dialog box appears as shown in figure below.
* Enter first password in "Password to open" text box and second password in "Password to modify" text box (if required) and click "Ok" button of dialog box. Microsoft Word will open "Confirm Password" dialog box for the confirmation of passwords. The maximum length of password is 15 characters.
* Re-enter the password to open and password to modify and click "Ok" button of Confirm Password dialog boxes one by one.
* Click "Save" button of Save As dialog box.

Saturday, October 3, 2009

General Packet Radio Service (GPRS)

GPRS protocol is a packet-switch protocol; define for web applications in GSM network. In other words Internet on GSM network is standardized as GPRS network. GPRS has digital structure and this structure based on Time Division Multiple Access (TDMA) technique. One TDMA frame has 8 time slots (TSs). These TSs can be allocated to users, and single TS can be shared by several active users for uplink and downlink purposes. Different coding schemes are used to enhance data rate from 9Kbps to 150 Kbps per user, and it takes 0.5 to 1 second. Security features in GPRS is provided by GSM network.



GPRS Architecture

Global System for Mobile Communication (GSM) circuit-switch architecture does not support the GPRS packet-switch architecture. Thus, GPRS requires its own network architecture. Several networks and databases e.g. Mobile Station (MS), Base Station Subsystem (BSS), Home Location Register (HLR), Visitor Location Register (VLR) in existing GSM network are modified in GPRS network.

GPRS architecture introduces the following network nodes to GSM architecture.



Serving GPRS Support Node (SGSN)


Gateway GPRS Support Node (GGSN)


Mobile Station (MS)


Base Station System (BSS)


Home Location Register (HLR)


Visitor Location Register (VLR)

Friday, October 2, 2009

What is ADSL?

ADSL stand for asymmetric digital subscriber line, here asymmetric means data speed does not same in both directions (upload and download) and provides high speed on already exiting telephone lines and same time you can use internet and as well as your line for phone. It is faster than DSL and but ADSL downstream speed (downstream rate ) is different with upstream speed (sending rate ). ADSL is much easier to install and provides much faster data transfer rate. ADSL support data upstream rate is 16 Kbps to 640 Kbps and data downstream rate is 1.5 to 9 Mbps. Normally ADSL and download and upload speed is averagely 10 time more than a normal dial up connection.
Your DSL connection to the Internet will always on, there is not need to dial your ISP each time to use internet and the main requirement for ADSL connection is modem. There are many option in modem hardware for example: USB ADSL Modem, PCI ADSL Modem, and ADSL Router, but mostly used USB Modem because easy to install. For 1 or 2 computer the USB modem is best but for more than 3 computer you should use Ethernet ADSL modem. ADSL connections are more useful in applications like videoconferencing, to run online movies and upload and download heavy files. This connection is ideal for today business requirements.

Wednesday, September 30, 2009

Why does my monitor go black after about 15 minutes of not using the computer?

Windows has a Power Management setting that will shut your monitor off after a specified amount of time. If you don't like when it's shutting the monitor off, you can change it by doing the following:
1. Hit the Start button, Settings, Control Panel (XP users: hit the Start button, Control Panel , then go to Performance and Maintenance link). Then, open the Power Management icon .
2. Look for the " Turn off monitor " drop box. Select the amount of time you want the computer to wait before shutting off the monitor, or tell it not to shut the monitor off at all.

Friday, September 25, 2009

Creat your own screensavers

If you have your pictures in computer and also like using a screen saver then you can create your own pictures slide show screen saver. You can use any third party application to run your picture as slide show. But windows XP also supports this feature and takes any picture that stored in your computer “My Pictures” folder to run in random order as a screen saver.
Follow the given steps to create your pictures screen saver.
First store all your pictures in your computer “My Pictures” folder.
Right click on empty area of your desktop and then click on properties.
Now select Screen saver tab on top of the dialog box.
Here click on Screen saver list and choose My Pictures slideshow option.
Now check its preview and press ok button.

Monday, September 21, 2009

Disabling Run or Find from the Start Menu

Start Regedit
Go to HKey_Current_User \ Software\ Microsoft \Windows \ Current Version \ Policies \ Explorer
Right click on the right panel and add a New / DWORD
Name it NoFile or NoRun
Give it a value of 1
Logoff or Reboot the computer

Sunday, September 20, 2009

Overview of the Linux file system

/bin All commands which are used by normal users
/etc System conf files
/var Server data logs Mail proxy cache
/dev All devices name stored in /dev
/sbin All commands which are used by supper user
/boot Linux kernel ( vmlinuz , initrd ) Grub directory
/usr All gui tools installed in /usr
/proc System information’s ( picture of RAM )
/home User's home dir's
/tmp Temporary files
/media Auto mounted devices mount point in /media

Saturday, September 19, 2009

Hidden User Account

For my next trick I will make a user account disappear, yet remain a full functioning account. Today's Security Tip is another way to lock down your system, and it does this by hiding specified user accounts. This feature is only available in XP and 2000, so unfortunately the rest of you are out of luck. This process does involve an easy registry edit, but if you're uncomfortable with that you might want to think twice about attempting this.

Normally when you log into XP, you see the startup screen where you see all the icons for the users who can access. What this tip does is allow you to hide a desired account from this screen. If you want to log on as this user you have to press Cntrl+Alt+Del twice at the Welcome screen to make a Windows Security dialog box appear. Here you can type in the user name and password of the hidden account and log in. Limited Users shouldn't be able to see any sign of you except for the listing in the Documents and Settings folder. Other administrative users will be able to see your hidden account in Control Panel/User Accounts, so keep this in mind when you're planning this out.
All right, now down to the good stuff. If having a hidden account sounds like your cup of tea, and you have no problem with small Registry augmentation, then let's go:
* First we need to open up the Registry Editor. Go to Start/Run and type "regedit" and click OK
* You should be looking at the Registry editor, and what we need to do now is navigate to H-KEY\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist . You will not see this folder if you do not have "show hidden system files" turned on.
* Once here we need to create another DWORD value. This is easier than it sounds, right click on the User list label file on the left side of the screen and select New>DWORD . You'll see the new entry in the right pane of the window, rename this value the name of the user account you want hidden (exactly how it is listed in the Startup screen, case sensitive) and leave the value at 0.
* Close your Registry Editor and restart the PC. When the Welcome screen comes up you'll notice that there's no icon for the user you just concealed. So how do you log in? This is where you press Cntrl+Alt+Del 2x's and the Windows Security Dialog box will come asking you to authenticate (name/password) after this the system should log you in.
Here's one more thing you might want to keep in mind, Windows logon screen. This is the screen where you see the available users you can choose to log in as. You can turn this option on/off in the User Accounts ( Start/Control Panel/User Accounts then "Change the way Users log in or off" and "Use Windows Welcome Screen" and you need to turn it off if you plan on using a hidden account and there are no other accounts on the system. The reason why is that the Windows doesn't have any user accounts to display in the Welcome screen, so it will continuously reboot. Now if you do run into this or any problems simply enter Safe mode at the next boot, this will allow you to go to the User Accounts Window and fix any problems. If you find that you can't log in at all with your hidden account go back and look at the registry value you created. Make sure you're spelling the user name is correct and that it's in the right location in the registry.

Friday, September 18, 2009

Forbidden file and folder names in windows 2000 and XP

Today an interesting tip about some names which windows has reserved. You can say there are some restricted words that cannot be assigned to name of files and folders. If you create a folder on your desktop and try to rename it with name “con” (or others reserved words) then the message will be appear in windows 2000 “Cannot rename New Folder: A file with the name you specified already exists. Specify a different filename” or “Cannot create or replace file: The filename you specified is invalid or too long. Specify a different filename”.
In windows XP when you try to rename a folder with reserved word then it automatically reverts the folder back to its original name.

You can give surprise to your friends with this interesting tip and show them this trick with that restricted words
The following are reserved names, which cannot be assigned to a folder or file (normally):
CON
PRN
AUX
NUL
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
COM9
LPT1
LPT2
LPT3
LPT4
LPT5
LPT6
LPT7
LPT8
LPT9

Thursday, September 17, 2009

How Firewalls Work

There are mean people out there that want very badly to get into your system or network. Maybe they want to steal information, to simply cause as much destruction as possible, or to use your system for their own uses. If you're online a lot or have a broadband connection, the attempts to enter your system may be relentless.
I feel that there are three main areas of defense against these threats: Anti-virus (of course), Firewall, and Spyware removal. With some programs being more important than others, but none being without importance. What I would like to do is give all of our readers at least a good concept of what these Firewalls and Anti-virus programs do to protect your system. I'm going to attempt to highlight the functions of these utilities and even some good practices that you can implement.
This week I'll be discussing the first line of defense between you and the Internet firewall. A firewall isn't going to stop you from getting a lot of viruses out there, unless it's the kind of viruses that proactively scans systems for open ports like the 32.Sasser that has recently stepped onto the virus scene. Where firewalls really come into play is in the area of Internet or Network access.
There are two basic types of firewalls: hardware and software.
A common hardware firewall is a routers. In a small network it sits in-between your PC and modem. These firewalls feature the ability to hide your PC from others on the Internet by assigning you private IP addresses through a process called NAT (Network Address Translation) or DHCP (Dynamic Host Configuration Protocol).
I may have lost some people there who are not familiar with IP addressing. This can get confusing rather quickly. To put it simpler: a router will take the Internet address that your ISP has doled out to you and give the PCs the are connected to the router a generic private IP address (not valid for the internet). The other primary job is to close ports (these are numbers that are associated with certain jobs, for example most email clients and servers use SMTP port 25 and POP3 port#110) ports can be a vulnerability as seen in the past and a hacker can have an easy time getting into your PC with ports wide open to the world. When hackers try to scan your network for known vulnerable ports the Firewall simply drops the packets because they contain data that no PC on the network requested.
Software firewalls are a little bit different and they have good points and bad points. First let me start by saying that it is always better to have a firewall then not to. The main difference between the two styles of firewalls is that one is an external device that runs on it's own hardware. The software firewall is an application that runs on your PC. This is the one down side I believe because it's one more application running on your PC while you're trying to surf the web and can cause resource overhead and slow things down in older PCs. In concept the firewalls really are the same, except that one of the biggest differences is a software firewall doesn't have any address translation services (i.e. NAT or DCHP).
Software firewalls do have some really great features however. For instance, a software firewall is great for someone who is new to this area of PCs and wants to learn more. I say this because most of these firewalls have a reasonably easy to understand interface different from the more "Techie" looking router interfaces.
Software firewalls also have a feature for Internet access that I think is very informative, for example in most of the software firewalls I have come across when a program tries to access the internet the firewall will pop up and ask you if you want this action to be allowed every time, prompt every time, or deny Internet access to the program. Most software firewalls will also notify you when someone from outside is hitting your firewall and a lot of times you get the IP address of the party on the other end of the actions. Both of these features can be used to further protect your PC, in some cases you might even be able catch a hacker trying to get into your PC by getting their IP address and then asking there ISP what this IP address is doing pinging your IP address.
I've actually helped one of customers do this they called me up and said that there firewall kept making noises and popping up with windows saying that there was some activity on here firewall. She said that this had been going on for a couple of days. Well we opened up the interface and looked at the log describing what the activity was and from whom it originated. There were a bunch of pings hitting her firewall, but the software gave us the IP address, and from there we opened up a command line and pinged the IP address back and it came up with their ISP's domain name. She called that ISP and talked to them about this address and what has been going on. I wouldn't be surprised if he was kicked from his Internet service.

Tuesday, September 15, 2009

Turn on a screensaver with adding a shortcut

-You can run screensaver on your system with a single click, If you have any screensaver file like .scr extension, or first download it using Internet, there are many free sites for screensaver downloading.
-If you have not any .scr file then please go to Start button, and click on Search button. Here in search windows type *.scr and search all screen saver file from your hard disk.
-Here you will find a list of screensavers in the results. Pick a screensaver you want. You can preview it by double-clicking it.
-Right click on the file, choose Send To, and then click Desktop (create shortcut).
-To activate the screensaver, double-click the icon on your desktop.

Monday, September 14, 2009

Defragmenter Program to Optimize the Placement of Files

This utility program is used to re-organize the files and un-used space on the hard disk, so that operation system can access data more quickly and easily. When operating system stores data on the disk, it stores the data in the first available sector on the disk. In this case data of a file is stored on disk in a scattered form; it is referred to as “File is fragmented”. The fragmentation slows down the data accessing speed of computer. You can improve the performance of your computer by de-fragmenting your hard disk. In De-fragmentation process, the data of each file is stored in continuous sectors. There are many third party software’s available in market for this purpose but you can use windows built-in utility program called Disk Defragmenter. To start disk defragmenter utility, first make sure all running program are closed.
To run disk defragmenter utility, go to the Start button and type dfrg.msc in Run option then press ok. Now here a disk defragmenter window will appear. Select any drive and press defragmenter button. If you have a large hard disk, this process can take several hours. I recommend you doing this after one month if you want to improve the performance of your computer.

Sunday, September 13, 2009

Windows Repair Installation

Some time windows missing the startup files due to the power failure, virus's attack and any illegal action by user. You can solve the windows startup problem with running the windows repair installation. Almost all windows serious problem can be solved using windows repair function. For repair windows XP, you should have the bootable windows CD.
First boot your computer using bootable windows XP, CD. To boot from CD, first change the booting order setting in your system BIOS.
When first blue screen will appear, do not choose any option here; simply press the Enter button to go for next option.

Next you will get "Windows License agreement" page, simply press F8 button to accept this agreement.

Now in second blue screen press the R on your keyboard to repair the windows XP installation. This recovery function repaired the all-missing windows features.

In half an hour windows will complete all recovery process. This recovery process will not disturbed your Desktop and My Document data. May be your some windows sitting will change after completing process.

Thursday, September 10, 2009

How to compress files in Winrar using advanced parameters?

Today tip will help you to manage the computer disk space using file compression utilities. You can run the data compression utility with advanced compression parameters to compress 15% more than normal method that you do not access often. Common file compression utility include Winrar is the more powerful and popular tool than other compression tools. You can download this tool from any free utilities website. Download it and run the easy setup.
Fellow the given steps to compress your data with advanced parameters:
After installation launch winrar, the first screen will appear with many options.
Now right click on your file and then select the option "Add to archive" from the context menu.

Here a window dialog will appear with title "Archive name and parameters". In General tab, click on "Compression Method" button to select the "Best" option from dropdown menu.

Now select the Advanced tab and click on Compression button to display the advanced compression parameters.

Now under the "Text Compression" area, select "Force" radio button and change the "Prediction order" value to 63 then change "Memory to use" type to 128. Now click Ok button to finish the process.

This all compression method will help you to compress your data 15% more than normal method.

Wednesday, September 9, 2009

Automatic Screen Refresh Tips

When you are working on your local computer and want to refresh any changes in your system automatically. For example some times you are watching sports results, online Stock Exchange rates and any changes to your hard drive but these changes are not usually refreshed until you press the F5 key on your keyboard.
To refresh your screen automatically you should edit your system Registry. But the best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to change the updates automatically.

-First click on Start button then type Regedit in Run option.
-In Registry Editor panel go to the path:
HKEY_LOCAL_MACHINE / System / CurrentControlSet /
Control / UpdateMode
-Here in right hand side panel edit the DWORD value to be between 1 and 5.
-Now restart your computer after any changes to go into effect.

Tuesday, September 8, 2009

Tips to Print the Whole Page

If you are browsing any website and want to print it in readable form without any extra graphics. There is a option on many websites " Print " to print a page in text format only, otherwise you can print out any webpage with its background colors and with out background colors using Internet Explorer setting. Generally Internet Explorer setting "Print background colors and images" is disable, if you are printing webpage without background colors, then you can speed up your printing and save printer ink. But important thing to always preview WebPages before you print, in Internet Explorer go to File menu, then click on Print Preview option.
To enable or disable print background colors option, open your system Internet Explorer.
Click the Tools menu and then go to Internet Options and open it. Here click the Advanced tab then scroll down to find the option Printing section.
Now check the option "Print background colors and images" then Apply and ok.

Sunday, September 6, 2009

Indicate Secure Sites for save Transactions

Today there are many application of e-commerce such as home banking, buying stocks, collaboration electronically with business partners around the globe, marketing and advertising products, providing services to the customers using internet. But you should avoid sending your personal information like your bank account numbers, credit card numbers and password using any unknown site. Always use secure websites for this purpose because secure websites safe your private information from others using encryption and some authentication standards. Internet Explorer always display a small lock icon on the task bar when we open any secure site and start domain name with https\\.

Saturday, September 5, 2009

Take your contacts with you using Export option.

A cool tip to move your contacts list using Microsoft Outlook, because there is no any option to copy it. But using a Import and Export method you can create a printable or moveable document.
To create this text list, first open Microsoft Outlook. Here go to File option then you will find option Import and Export, to run the Import/Export wizard Click here then Next.
Here you can select what to import and export, Select "Export to a file" under "choose an action to perform" option then click Next button. Next you will get option "create a file of type" here you can specify the file type. In next step you will select which folder you want to export.
Select "Save Exported File as" option and give it a name and location. Click Next and Finish it. Now you have one easily moveable file and you can move it any where with you.

Friday, September 4, 2009

How to use shortcut keys in gmail account?

You can operate your Gmail account using keyboard shortcuts keys instead of mouse to navigate. Basically keyboard shortcuts keys help you to save time and you can perform any tasks without leaving the keyboard keys. Many computer applications help you to create your own custom shortcuts keys to enjoy even more flexibility.
Useful Gmail account Shortcut keys
Shortcut keys Action
f Press simple f help you to forward email message to next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail

a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.

Thursday, September 3, 2009

How to configure Stub area in OSPF protocol?

The area feature is used in OSPF to divide a large network into small segments. Any changes in one area will not cause any problem in other areas, thus reducing routing table size and processor overhead also.
There are three main types of area:
Stub area
Totally stub area
Not-So-Stubby area (NSSA)
The main purpose of stub area is to block the flooding from AS external advertisements in OSPF and only OSPF injects a default router into a stub area. In this tip we will discuss here only about stub area and the remaining areas will be discussed in the next tips.
Follow the network topology of three different routers in given figure:

There are some common OSPF configuration and Executable commands:
In this example we will not configure router C as stub area because it is backbone router and does not participate in area 1. So we will be concerned here only with router A and router B.
OSPF configuration on Router B as stubby area
In global configuration mode
Router-B(config) # router ospf 1 (Here 1 indicates the process identification number)
Router-B(config-Router) # network 20.0.0.0 0.255.255.255 area 1 (Here 20.0.0.0 indicates the network ID and 0.225.255.255 wildcard mask with area 1)
Router-B(config-Router) # network 30.0.0.0 0.255.255.255 area 0 (Here 30.0.0.0 indicates the network ID and 0.225.255.255 wildcard mask with area 0)
Router-B(config-Router) #area 1 stub (Here 1 indicate the area ID and area 1 is designated as stubby area)
Router-B(config-Router) #exit (exit from ospf 1 on router B)
OSPF configuration on Router A as stubby area
In global configuration mode
Router-A(config) # router ospf 1 (Here 1 indicates the process identification number)
Router-A(config-Router) # network 210.100.10.0 0.0.0.255 area 1 (Here 210.100.10.0 indicates the network ID and 0.0.0.255 wildcard mask with area 1)
Router-A(config-Router) # network 20.0.0.0 0.255.255.255 area 1 (Here 20.0.0.0 indicates the network ID and 0.225.255.255 wildcard mask with area 1)
Router-A(config-Router) #area 1 stub (Here 1 indicate the area ID and area 1 is designated as stubby area)
Router-A(config-Router) #exit (exit from ospf 1 on router A)

Wednesday, September 2, 2009

How to create digital photo album presentation in PowerPoint?

In Microsoft PowerPoint, you can create a digital photo album of your scanned photographs to represent as slide show presentation. Using this feature, you can display your business photo album on the web. Once you have converted it into HTML document, PowerPoint will allow you to publish this album to the internet. You can create unlimited albums and also add unlimited photos in each album.
Follow the given steps to create a digital photo album of your scanned photographs:
-First create a folder of your scanned pictures or transfer from your digital camera or download from the web.
-Now click on "Picture" option from the "Insert" menu then click on "New Photo Album" option.
-Here a small dialog box will appear with "Photo Album" title. Now click on "File/Disk" button under "Insert picture from" area to add first picture in album.
-Here you can add unlimited picture in one album. If you want to get pictures from scanner or camera then click on "Scanner/Camera" button.
-Now you can add effects to your pictures, for example rotates picture to different directions, background colors, picture brightness and contrast levels.
-Now under "Album Layout" area, you can choose the best picture layout, Frame shape and add design template also for your photos album.
-Once you have selected the all required pictures and layouts for your photo album then click on "Create" button to start the process.
-Now "Save" the file and then run this photo album in Slide Show.

Saturday, August 29, 2009

How to add Items to the Start Button using Registry?

The best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to change the Start button setting.
-First click on Start button then type Regedit in Run option.
-In Registry Editor go to left hand panel, and find HKey_Classes_Root / Directory / Shell
-Here Right click on Shell folder option and add any new key with descriptive name and Press Enter.
-Now Right click on that key and give the full path of that program you are interested to add in start button. For example if you want to add MS excel, then full path may be C:\program file\msoffice\msexcel.EXE.
-Now close all open programs and check the changes in your computer Start button.

How to add Items to the Start Button using Registry?

The best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to change the Start button setting.
-First click on Start button then type Regedit in Run option.
-In Registry Editor go to left hand panel, and find HKey_Classes_Root / Directory / Shell
-Here Right click on Shell folder option and add any new key with descriptive name and Press Enter.
-Now Right click on that key and give the full path of that program you are interested to add in start button. For example if you want to add MS excel, then full path may be C:\program file\msoffice\msexcel.EXE.
-Now close all open programs and check the changes in your computer Start button.

Friday, August 28, 2009

Point to Point lease line configuration and tips

Point-To-Point Leased Line Implementation

Current configuration:
version 12.0
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname A-cisco
!
username B-cisco password 0 Jonn
!
interface SeriaIO/0
ip address 1.1. I.I 255.0.0.0 encapsulation ppp
ppp authentication chap
!
line con 0
transport input none
line aux 0
line vty 0 4
no login
!
end


Current configuration:
version 12.0
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname B-cisco
!
username A-cisco password 0 Jonn
!
interface SeriaIO/0
ip address 1.1. I.2 255.0.0.0 encapsulation ppp
ppp authentication chap
!
ip classless
no ip http server
!
line con 0
transport input none
line aux 0
line vty 0 4
no login
!
end

Thursday, August 27, 2009

Extended IP Access Control List and Configuration

Extended IP Access Control List

RouterA(config)#access-list 103 remark stop telnet to router A whose source ip 1.1.1.2

RouterA(config)#access-list 103 deny tcp host 1.1.1.2 host 1.1.1.2 eq 23
RouterA(config)#access-list 103 permit ip any

RouterA(config)#int s0/0
RouterA(config-if)#ip access-group 103 in

RouterA#show access-lists
Extended ip access list 103
Deny tcp host 1.1.1.2 host 1.1.1.1 eq telnet(2 matches)
Permit ip any (160 matches)

Wednesday, August 26, 2009

How to eliminate the needless visual effects for better windows performance?

This tip will help you to increase the performance of your computer by eliminating the needless visual effects. By default windows XP gives you many options in the graphics fields to enjoy maximum graphics. For example, you can add pictures on folders and drop shadow on icon to give you better look but it will effect on the performance of your computer, especially on an older computer. Window XP has many default graphics which is not so useful for a common user, if you re-adjust these graphics then there is less effect on the user activities but the performance of computer will be increase tremendously. Here I will tell you how to choose:
To edit these settings, first you should log onto your computer with administrative rights.
-Click Start button and type sysdm.cpl in Run box then press Ok button for next.
-Here a dialog box will appear with the title "System Properties", select "Advanced" tab.
-Here click on Settings button under Performance area.
-When you have done then "Performance Options" dialog box will appear with different options. Here select the Visual Effects tab and choose the settings you want to use for the appearance and performance of windows on this computer.
-Turns off all the visual effects in the option of "Adjust for best performance" and when you select the option "Adjust for best appearance" it will gives you opposite effect ,Everything will turns on. Selecting "Let Windows choose what's best for my computer" triggers, as you might guess, different choices on different computers. And to pick and choose individual effects yourself, choose "custom" then decide which ones you want.

Protecting Document with Password

You can protect your document by applying password so that unauthorized person can not display as well as modify your document. You can apply two types of passwords:
Password to open the document:
If it is applied then you have to give the correct password to open the document, otherwise you cannot open the document.
Password to modify the document:
If it is applied then you have to give the correct password to modify the document, otherwise your document is opened but you cannot modify the document. It means that your document becomes read-only.
-To apply a password to document, follow these steps.
* Open Save As dialog box by selecting "Save As" command from File menu.
* Click "Tools" button of Save As dialog box and choose "General Options" from drop down menu, "Save" dialog box appears as shown in figure below.
* Enter first password in "Password to open" text box and second password in "Password to modify" text box (if required) and click "Ok" button of dialog box. Microsoft Word will open "Confirm Password" dialog box for the confirmation of passwords. The maximum length of password is 15 characters.
* Re-enter the password to open and password to modify and click "Ok" button of Confirm Password dialog boxes one by one.
* Click "Save" button of Save As dialog box.

Monday, August 24, 2009

Standard IP Access Control List.

RouterA#configure terminal
RouterA(config)#access-list 1 remark stop all traffic whose source ip 1.1.1.2
RouterA(config)#access-list 1 deny 1.1.1.2 0.0.0.0
RouterA(config)#access-list 1 permit any

RouterA(config)#int s0/0
RouterA(config-if)#ip access-group 1 in

RouterA#show access-lists
Standard IP access list 1
Deny 1.1.1.2
Permit any

Now verify these configuration on router with command us under:
RouterA#show ip int s0/0

Saturday, August 22, 2009

Break or recover the router password

-Turn the power switch off and back on to recycle the power.
-Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Break or another combination.
-At the > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.
>o
-Configuration register = 0x2102 at last boot
-Bit# Configuration register option settings:
-15 Diagnostic mode disabled.
-Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload.
-Type i to have the router reboot. The router ignores the configuration in NVRAM.
-The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog.
-Type enable ate the Router> prompt to go to privileged exec mode.
-Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.
-View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed.
-Enter the configuration mode by typing configure terminal. Change the line of enable passwords as necessary.
-All interfaces are in a shutdown state. Issue the no shutdown command on every interface that is to be used.
-Type config-register 0x2102 to return the router to normal operation at the next reloads.
-Exit configuration mode by pressing Ctrl-Z
-Save your changes by typing write memory or copy running-config startup-config.
-Reload the router and verify the passwords.

Friday, August 21, 2009

Run vs. Save when downloading programe

When you are downloading any program or file from the internet, for example any antivirus program or an email attachment from your friends. Here you will get a dialog box with three options to Run, Save or Cancel. Basically this is confirmation from a user "Do you want to run or save this file", even you can cancel it to abort the downloading.
Here if you select the Run option, only the setup file is downloaded as temp file in your computer temporary internet folder and your computer run this program setup automatically without your confirmation or virus scanning. This is unsafe for your computer if you are downloading this program from any new or unknown source.
But if you select other option Save, You can save this program on your computer in any location. Now you have the full source of program on your computer, you can scan the all program before open it.
Normally you should select the Save option, if you are downloading this program from any free software sites. You have extra security layer if you save the setup file before run it.

Thursday, August 20, 2009

Router basic Troubleshooting Tips

Router A# show interface serial0
Serial is up line protocol is up, it is the first message that shows us that your serial port is configure properly. It is just possible when you have already given IP address, run no shutdown and configures some other command.
There are some possible errors messages may occur after the command is given.
Serial is up line protocol is down, it means that check your router encapsulation configuration.
Serial is down, line protocol is down.
You have not given or define clock rate.
Cable not connected or not working.
Serial cable is not plug. Possible causes.
Serial is administratively down line protocol is down.
It means that router is shut down by administrator manually for troubleshooting purpose.

Wednesday, August 19, 2009

How to set security on your Recycle Bin properties?

This tip is very useful to manage the security of Recycle Bin properties because by default everyone can change the recycle bin sittings using windows default rights. If you want to restrict your users to modify these settings, simply edit the "Permissions for BitBucket" and set the read only rights for all users. Using windows registry editor you can set the Recycle Bin rights for all user.

The best technique to edit the windows registry, always backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.

Follow the given steps to edit computer registry for Recycle Bin properties:


To enable this feature, you will need to be logged into your computer with administrative rights.


First click on Start button then type Regedit in Run option.


Here locate the location to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\BitBucket


Here in left side panel, right click on "BitBucket" keys and click on Permissions option.


Now "Permissions for Bitbucket" dialog box will appear to manage the user's rights.


Here select the user name or group "Everyone" from the list under the "Group or user names" category and then allow read only permissions for selected user under the "Permissions for everyone" section.


Now click on Apply button to save these settings and again click on Ok button to finish the process.


Close the registry editor and restart your computer after any changes to go into effect.


To verify these sittings, simply right click on Recycle bin and go to "Properties" dialog box and any changes here will give you a message "You do not have permission to modify the settings for the Recycle Bin".

Tuesday, August 18, 2009

CONFIGURING STARTUP KEY:

* Go to Start/Run and in the blank field type "syskey" press enter, or OK.

* You should see a small window titled "Securing the Windows XP Account Database". From this Window select the "Update" button to move to the next window.

* The "Startup Key" is the next window. You'll see a couple of options there, but the one we are looking for says "Startup Key on floppy disk", along with some warning about how your system is going to startup now.

* After selecting this click OK, and a pop-up will alert you that the key has been changed. Another message follows asking you to insert a disk in drive A: (Floppy drive).

* Insert the floppy, click OK, and one more window will come up telling you that the Key has been changed and you need to have this floppy disk in order to log into Windows. That's exactly what we want.

When you're all done go ahead and eject the floppy (you might want to slide the little lock up on the floppy to insure you don't format it on accident), and restart the PC. Windows will appear to come up normally, but after it loads the kernel the "Windows XP Startup Key Disk" window pops-up. Grab your Startup Key floppy put it in the floppy drive, and select OK. You'll see Windows load up and bring you to your user logon screen.

I told you this is a cool trick and really helps lock down you PC. I hope you get some use out of
this, but please be careful.

Monday, August 17, 2009

Wireless Security

The ability to share an Internet connection is great and the ability to do this wirelessly is even better. Wireless networks are easy to install, you don't have to run cables, and you can roam around a location within the WLAN (wireless local area network), or physical range of wireless connectivity . These features are what makes wireless networks so popular with both end users, and hackers.

The one problem with wireless networks is the vulnerability of your network. A typical hardwired network has physical security due to limited access to the actual network and one opening to the internet (Gateway) has a firewall or two in place (or it had better). This can stop most unauthorized access to your network. The difficulty in setting up wired networks has discouraged a lot of people from installing networks in the first place.

Then a long came the wireless which, as I stated earlier in the article, made the home networking game more appealing and not as intimidating. Having a wireless network means that the physical security that is inevitable in a wired network is simply not there. Anyone in the range of your wireless network can see your network, and if not secured properly, can gain access. If your wireless access point isn't the router on your network then outsiders can slip in behind your firewall. This used to happen at my college, there was an apartment complex behind a portion of the school, and the other techs would piggyback on some guy's network. He had an unsecured wireless network, no one did anything bad to him, they just used him for Internet access but he never knew.

There are some practices you can perform to insure that no one is using your connection or trying to get on your personal network. First and foremost you need to get WEP (Wired Equivalent Protection) in place, which is an encryption that stops unauthorized users from accessing your network. There are at least two encryption types in 802.11b (128bit, and 64bit) and should probably be changed every other week or so. WEP encryption used to be completely the user's responsibility, but now I'm seeing hardware out of the box with at least one encryption key configured, forcing the user to configure his PCs in order to connect.

Using WEP is essential to wireless security, but don't rely on it alone, there are other security measures you can put in place as well. With some wireless units you can set a MAC address filters, witch can really beef up your security. A MAC address is an identification number the manufacturer stamps on a network device, and is (or should be) completely unique. If this security is in place then even if someone knows the WEP Key they still cannot get into the network because your wireless access device will deny it.

There are two other things you might want to do to tighten up your network: The first thing you should do is go through and change all of the default security settings, and passwords. The reason I said this is most Routers and access points usually have a lot of these configuration fields (i.e. username and password or the SSID ) filled out with generic values for ease of setup. The bad thing about this is that people can use these settings against you to gain access into your network. Secondly, with a lot of routers your SSID is set to broadcast by default, this means that it's broadcasting your network's name to the physical reaches of your network. Not good, even if your neighbors don't have the security rights to access your network they will constantly see it every time they boot up one of their wireless PC's.

Sunday, August 16, 2009

Creating Charts in Excel.

In excel, you can create chart very easily using the Chart Wizard. The chart created can be inserted into the same worksheet or into different worksheet of same workbook.

To create a new chart, follow these steps.

  • Select the data for which you want to create chart. For example to create chart of student marks, the worksheet with data is given below.

Name

Math

Urdu

Total

lilly

25

50

75

Joni

20

55

75

jhon

22

60

82

Eizo

21

45

66

  • Click the Chart Wizard button on the Standard Toolbar.

  • Select chart type, chart sub-type from dialog box and then click “Next” button, a dialog box is displayed with a sample of chart you have selected.

  • Check the Data range and correct it if required and also specify whether you want to plot chart of data series in rows or columns.

  • Click ”Next” button of dialog box ,Chart options dialog box appears.

  • Specify chart title, X-axis title Y-axis title, legends, Data-labels etc. Click” Next” button.

  • Specify chart location in dialog box. The chart can be created in different sheet. By default, the chart is inserted into the same worksheet.

  • Click the “Finish” button of chart location dialog box to complete the chart creating process.