Saturday, October 31, 2009

How to enjoy Chatting on your network with WinChat ?

Today tip will help you to start the chat with other computer users at the same network without internet connection. WinChat is an instant messaging program which is built-in feature of window XP. There are not so many features in this messaging program as other messaging programs just like Windows Live Messenger and ICQ. This program is free from spam and viruses and more secure than other instant messenger programs.
Follow the given steps to use the winchat chatting program:
-When you want to run winchat, first click on Start button and type winchat in Run option then press Enter for next.
-Next you should go to Conversation Menu and then click the dial option.

-Here choose that person you want to chat with on your network (when you will click on dial then you will get list of that persons with which you are going to connect on your network even if they are running winchat or not. If you dial any body of your list they are not responding or ignoring you, then they may not be running the winchat.

-When any body is running winchat he will hear a ringing sound. Both you and your networking sharing person will free to chat with each other when your recipient clicks the answer button.नि
t

Thursday, October 29, 2009

How to set security on your Recycle Bin properties?

Today day tip is very useful to manage the security of Recycle Bin properties because by default everyone can change the recycle bin sittings using windows default rights. If you want to restrict your users to modify these settings, simply edit the "Permissions for BitBucket" and set the read only rights for all users. Using windows registry editor you can set the Recycle Bin rights for all user.
The best technique to edit the windows registry, always backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to edit computer registry for Recycle Bin properties:
To enable this feature, you will need to be logged into your computer with administrative rights.
-First click on Start button then type Regedit in Run option.

-Here locate the location to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\BitBucket
-Here in left side panel, right click on "BitBucket" keys and click on Permissions option.
-Now "Permissions for Bitbucket" dialog box will appear to manage the user's rights.
-Here select the user name or group "Everyone" from the list under the "Group or user names" category and then allow read only permissions for selected user under the "Permissions for everyone" section.
-Now click on Apply button to save these settings and again click on Ok button to finish the process.
-Close the registry editor and restart your computer after any changes to go into effect.
-To verify these sittings, simply right click on Recycle bin and go to "Properties" dialog box and any changes here will give you a message "You do not have permission to modify the settings for the Recycle Bin".

Monday, October 26, 2009

Wireless Stereo Tips


There are devices on the market which allow you to hook up your computers media to wireless speakers and a wireless stereo system. They come with a remote control which will allow you to browse through your media library and music will stream to the wireless stereo speakers.


-Troubleshooting wireless stereo equipment

If you notice performance issues with your wireless home stereo system, there are a few things you can check. First, make sure that the batteries in the wireless stereos and devices are charged and working well. Make sure that the wireless stereo is not covered up as to prevent adequate transmission. Finally, make sure that any devices which may cause interference are separated from the wireless stereo system.


-How Wireless Stereos work

The wireless stereo transmits a signal to the wireless speaker via radio waves instead of traditional wires. The same holds true for radio wave remote controls, which increases flexibility of placement and range of use. With a wireless home stereo system, you will be able to place the stereo and speakers virtually anywhere in the home and not have to worry about wires, plugs, cables or extenders.


For an ultimate speaker performance, choose from a wide variety of
quality discount computer speakers from The Speaker Company.


-Wireless Stereo

Wireless stereo speakers are speakers which play from a computer or wireless stereo system without being hooked up via wires. You can also purchase devices which let you browse your computer music library and play the music on a wireless home stereo system.


-Wireless Stereo Benefits

Using a wireless stereo system will decrease cable clutter, allow greater flexibility with where to place your speakers and stereo and offers a high level of portability. You can move the speakers to where you are and leave the base wireless stereo where it is. Wireless home stereo systems are a great way to listen to music in your home.

Saturday, October 24, 2009

How to recover corrupted PowerPoint file using TEMP folder?

Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become corrupted when you are trying to save it or if you were working on it and your PowerPoint application or windows crashed due to power failure. Windows saves a duplicate copy of working file as a temporary version. There is no need to use any third party software to manage these types of corrupted files, because you can recover them from TEMP folder.
Follow the given steps to recover the corrupted files in MS PowerPoint:
-First click on Start button then click on Search option to start your search process.
-Here type the *.TMP in "All or part of the file name" box then choose the "Local Hard Drives" option in "Look in" box.
-Now click on Search button to start the search process of temporary files on your system local drives.
-After some time, windows locate the list to temporary files. Here arrange the all temp files as Date modified.
-Now open the PowerPoint and try to open these temp files or double click on that file to run in PowerPoint.

Friday, October 23, 2009

How to increase the Browsing and Downloading speed in Windows Vista?

With windows Vista you have noticed the slow internet speed. The web browsing and downloading speed is very slow as compare to previous versions of windows. You can open the same sites in windows XP and server 2003 with the normal speed.
Follow the given steps to increase the Vista browsing speed:
First go to Advance tab in Internet Explorer and turn off the TLS (Transport Layer Security) encryption option. Here to fix problem with some secure pages turn on the SSL 2.0 (Secure Sockets Layer) feature and click Ok button to close it.

Follow the major fix for this problem:

-In windows Vista, the TCP autotuning feature is enabled by default. Some web servers do not respond properly to this feature, so it appears that some sites open with very slow speed.
-To use this feature, you will need to be logged into your computer with administrative rights.
-First click on Start button and type CMD in Run option then press Enter.
-At Command Prompt, type the following command and press enter.
-netsh interface tcp set global autotuninglevel= disabled
-This command will disable the TCP autotuning feature. Now close the command Prompt and restart your computer after any changes to go into effect.
-netsh interface tcp set global autotuninglevel= normal
-Now close the command Prompt and again restart your computer after any changes to go into effect.

Thursday, October 22, 2009

WiMAX Wireless Broadband Info

WiMAX stands for World Interoperability for Microwave Access that enables the actual broadband wireless network with high speed. WiMAX operate same like WiFi but WiFi operate with some limitation like it is base band technology and cover only 100 feet radius with slow speed. WiMAX covers a radius of 50 Km and work with the speed of 70 Mbps. WiMAX is the replacement of the wired broadband. In wired broadband connection, we can transmit data with 512 Kbps to 10 Mbps speed and more, for example DSL broadband and cable broadband. In future all new desktop and notebook computers will be incorporated with WiMAX technology. With this technology you will be connected to the internet even you are driving your car with the speed of 120 Km.
-Objective of WiMAX
Superior Performance
Flexibility
Advanced IP-Based Architecture
Attractive Economics
IEEE 802.16 Specifications
Range 30 mile radius from the base station for LOS (line-of-sight).
Range 4-6 miles radius from the base station for NLOS (Non-line-of-sight)
Maximum data speed supported as 70 Mbps.
Licensed frequency band: 2- 11 GHz
Un-licensed frequency band: 10- 66 GHz
Line of sight is not needed between user and the base station unless very high date rates are required at the user premises.

Tuesday, October 20, 2009

How to move your mouse cursor without mouse?

You can control your mouse pointer with keyboard keys in all windows versions. When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can performs all tasks same like a normal mouse.
Follow the given steps to activate the keyboard mouse:
-To edit this feature, first you should log onto your computer with administrative rights.
-To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.
-To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.
-Click on Settings button, if you want to adjust the mouse cursor detail settings.

-Here a new dialog box will appear with the title “Settings for MouseKeys", now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.
-Now using Numeric keypad, you can move your mouse pointer. The controls are:
1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions.
Key 5 is used as mouse click button.
-Insert key used to hold down mouse button.
+ Sign used to double click on any object.
-Delete button used to release the mouse.
-Click on NumLock button to disable this keyboard mouse feature.

Friday, October 16, 2009

Selecting a Scanner

Types of Scanners

Scanners come in a variety of configurations. The type you should consider depends on both your planned scanning needs and your budget.


* Drum scanners. This type of scanner provides the highest level of image quality. They are typically found at professional printing businesses. In a drum scanner, the original is attached to a cylindrical drum and rotated past the sensing elements. These scanners are very expensive, with capabilities that go well beyond the needs of desktop scanning.


* Flatbed scanners. This type of scanner provides a flat glass surface onto which the original is placed. The illumination and sensing elements move under the glass to scan the image. Flatbed scanners are available in a wide range of sizes, prices, and capabilities. Some flatbeds offer a transparency scanning adapter as an option.


* Single sheet scanners. This type of scanner is designed for single sheets of paper. You insert one edge of the paper in a slot and the scanner grabs it, feeds it past the sensing array, and passes it out the other side. Some single sheet scanners are even integrated into keyboards. Such scanners were originally designed for digitizing documents and images for archiving, and many models are not suitable for creating high-quality images.


* Sheet-fed scanners. These scanners take a stack of pages and scan them in sequence while you get coffee. Some even do duplex (2 sided) scans. They are very useful in some situations but not much use to the philatelist.


* Photo scanners. This type of scanner is designed to scan snapshots up to approximately 4´6 inches in size. Some are separate desktop units; others install directly into a computer much like a diskette drive.


* Hand scanners. This type of scanner requires the user to manually scan an image. Hand scanners look something like an overgrown mouse. To scan, you manually drag the unit over the original document. Handheld scanners are suitable only for small originals that are no wider than the scanner itself. In theory, most hand scanners permit you to scan a wide original in two or more passes and "stitch" the scans together into a final image. This, however, never works as well as the manufacturers claim.


* Slide scanners. This type of scanner is designed for scanning slides (transparencies) rather than opaque originals, such as photographic prints. While rarely relevant for scanning philatelic material, a dedicated slide scanner is the best choice for scanning slides. Some flatbed scanners come with transparency adapters but they do not provide top quality results, particularly with small slides such as 35mm. Slide scanners have very high resolution, typically a minimum of 2400 dpi, required for getting all the details out of your slides. Many slide scanners also have the ability to scan color negatives and to convert the negative image to a positive image.


For philatelic purposes, a flatbed scanner is undoubtedly the most versatile. You can scan anything from a single stamp to an entire stock book or album page. A hand scanner may be a viable alternative, particularly if your budget is tight. Their width limitation does not matter so much for stamps and covers. I have also seen single sheet scanners and photo scanners used successfully for philatelic purposes, although they require that the item being scanned be sandwiched between clear plastic sheets for feeding into the scanner.

Thursday, October 15, 2009

Print Envelopes and Labels in Word

Word provides a suitable way to print envelopes and labels. You can print mailing and return addresses on an envelope, or addresses on a mailing label.

To create and print an envelope, follow these steps.



Choose Envelopes and Labels from the Tools menu. The Envelopes and Labels dialog box will appear as shown below.


Click the Envelopes tab to display options of Envelopes.


Enter (or Edit) the mailing address in the Delivery address box.


Enter (or Edit) the return address in the Return address box Or select the Omit check box to omit a return address.


Click Options button to specify the envelope size, the type of paper and other options. Click "Add to Document" button to add or attach the envelope to the current document for later printing or editing.


Click Print button to print the envelope.

You can also add graphics to the return address of your envelope. To add graphic, follow these steps.



Select mailing address in the document.


Open the Envelopes and Labels dialog box.


Click Add to Document (or Change Document) button.


Click the Page Layout view icon in the Status bar.


Insert or create the graphic in the document.


Position the item on the envelope.

Wednesday, October 14, 2009

Stop XP Pop-ups

First off, never trust a company that exploits a technology to advertise that they can prevent it. Second, yes you can stop these. You are probably familiar with Windows (a/k/a MSN) Messenger which is used for Instant Messaging. There is another program called Messenger that is used in networks to transmit and send Alerter service messages between clients and servers.
Even though you'll never use it, unless you are on a network, by default it is turned on, causing an open hole in your XP firewall for pop-up advertising to get through. Here's what to do if you want to stop Messenger...
Go to Control Panel / Administrative Tools / Services (or Start / Run and type in " services.msc "). This will bring up a long list of Windows services that are running or available on your system.
Find "Messenger" and double click to open the Properties box. In the "Startup Type" field, change the setting to "Disable". If any services depend on Messenger and fail to start, then change to "manual".
Click OK to save changes.

Tuesday, October 13, 2009

IP Addressing

IP stands for internet protocol. Basically it is a unique identifier for a computer on the internet. It is numerical address with four numbers separated with dots and the format of an IP address is a 32-bit.Each number can be start from 0 and ends with 255. For example IP address looks like this: 131.200.1.1

Every computer on the internet using unique IP address and this IP address can be static and dynamic. A server has a static IP address that does not change. When a computer dialing internet through modem then that computer has a IP address that is assigned by the local ISP. Your local ISP assigned you unique IP address for each session and it may be different each time.

You can connect to any server using this IP address. if you simply type http://131.200.1.1 and arrive at the machine that contains the Web Server for the specified IP address.

TCP/IP is divided into 3 usable classes and 2 experimental classes. Class A, B, C are usable classes and D, E are experimental classes. We can not use experimental classes in network.

Classes Range

A 1.X.X.X 126.X.X.X

B 128.X.X.X 191.X.X.X

C 192.X.X.X 223.X.X.X

D 224.X.X.X 239.X.X.X

E 240.X.X.X 254.X.X.X

127.X.X.X is used for troubleshooting.

Saturday, October 10, 2009

How to set security on your Recycle Bin properties?

Today day tip is very useful to manage the security of Recycle Bin properties because by default everyone can change the recycle bin sittings using windows default rights. If you want to restrict your users to modify these settings, simply edit the "Permissions for BitBucket" and set the read only rights for all users. Using windows registry editor you can set the Recycle Bin rights for all user.
The best technique to edit the windows registry, always backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to edit computer registry for Recycle Bin properties:
To enable this feature, you will need to be logged into your computer with administrative rights.
First click on Start button then type Regedit in Run option.

Here locate the location to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\BitBucket

Here in left side panel, right click on "BitBucket" keys and click on Permissions option.

Now "Permissions for Bitbucket" dialog box will appear to manage the user's rights.
Here select the user name or group "Everyone" from the list under the "Group or user names" category and then allow read only permissions for selected user under the "Permissions for everyone" section.

Now click on Apply button to save these settings and again click on Ok button to finish the process.
Close the registry editor and restart your computer after any changes to go into effect.
To verify these sittings, simply right click on Recycle bin and go to "Properties" dialog box and any changes here will give you a message "You do not have permission to modify the settings for the Recycle Bin".

Tuesday, October 6, 2009

What is Internet Fax?

Internet fax is a type of online service that provides subscribers with the ability to send and receive faxes without a fax machine. Instead, Internet access and an email account is all that is required.
To use an Internet fax service, a subscriber signs up for a small monthly fee and is assigned a fax number. When a fax is sent to the subscriber's number, the service accepts the fax, turning it into a file that is forwarded to the subscriber's existing email address.
To send an Internet fax, the subscriber creates an email. The fax content can be written in the body of the email, and attachments are normally permitted. The destination fax number is entered in the "To" field, along with "@" and the Internet fax service name. For example, if the fax number were 1-550-234-5678, the email would be addressed to
15502345678@site.com. In the "Subject" field the user enters the name of the recipient, "Attn: Mr. Jam" for example.

A small toolbar, available for download from the Internet fax service, is used as a plug-in inside the email program. Clicking on the "Send" button on the toolbar sends the email to the Internet fax service. Upon receipt, an automated program converts the email to a fax format, then faxes to the number supplied in the "To" header. The recipient receives the fax normally, through his or her fax machine.
This service can be very convenient. Of the many advantages, your assigned fax number is active 24 hours a day, so that your account can accept faxes around the clock. Contrast this with using a fax machine, which relies on your phone system being free to accept a fax. For those that use one phone line for fax, telephone, and dial-up, an Internet fax service is especially handy. Internet fax services also save paper and fax toner, and do not rely on a serviceable fax machine. All faxes are sent and received as files. They can be printed by choice, but it isn't necessary.
A further advantage of an Internet fax service is that the subscriber does not need to be familiar with faxing software or fax machines. The convenience of sending and receiving faxes by using the familiar email interface appeals many people.
One of the best features of Internet fax services is that many offer toll-free fax numbers for the U.S. and Canada, so that your U.S. and Canadian clients can fax you for free. Sending faxes is also free of phone charges for the subscriber, as he or she is only sending emails.
When looking into Internet fax services, consider a service that offers a secure website. This provides a mobile "portal" to send/receive faxes while you're on the road or away from home. Confirmation of sent faxes should be standard, so you can be sure your client got your communication. The ability to send to more than one fax number at a time can also be valuable. Check for a page capacity, as some services may limit the amount of pages the subscriber can send/receive in a month.

Monday, October 5, 2009

Protecting Document with Password

u can protect your document by applying password so that unauthorized person can not display as well as modify your document. You can apply two types of passwords:
Password to open the document:
If it is applied then you have to give the correct password to open the document, otherwise you cannot open the document.
Password to modify the document:
If it is applied then you have to give the correct password to modify the document, otherwise your document is opened but you cannot modify the document. It means that your document becomes read-only.
To apply a password to document, follow these steps.
* Open Save As dialog box by selecting "Save As" command from File menu.
* Click "Tools" button of Save As dialog box and choose "General Options" from drop down menu, "Save" dialog box appears as shown in figure below.
* Enter first password in "Password to open" text box and second password in "Password to modify" text box (if required) and click "Ok" button of dialog box. Microsoft Word will open "Confirm Password" dialog box for the confirmation of passwords. The maximum length of password is 15 characters.
* Re-enter the password to open and password to modify and click "Ok" button of Confirm Password dialog boxes one by one.
* Click "Save" button of Save As dialog box.

Saturday, October 3, 2009

General Packet Radio Service (GPRS)

GPRS protocol is a packet-switch protocol; define for web applications in GSM network. In other words Internet on GSM network is standardized as GPRS network. GPRS has digital structure and this structure based on Time Division Multiple Access (TDMA) technique. One TDMA frame has 8 time slots (TSs). These TSs can be allocated to users, and single TS can be shared by several active users for uplink and downlink purposes. Different coding schemes are used to enhance data rate from 9Kbps to 150 Kbps per user, and it takes 0.5 to 1 second. Security features in GPRS is provided by GSM network.



GPRS Architecture

Global System for Mobile Communication (GSM) circuit-switch architecture does not support the GPRS packet-switch architecture. Thus, GPRS requires its own network architecture. Several networks and databases e.g. Mobile Station (MS), Base Station Subsystem (BSS), Home Location Register (HLR), Visitor Location Register (VLR) in existing GSM network are modified in GPRS network.

GPRS architecture introduces the following network nodes to GSM architecture.



Serving GPRS Support Node (SGSN)


Gateway GPRS Support Node (GGSN)


Mobile Station (MS)


Base Station System (BSS)


Home Location Register (HLR)


Visitor Location Register (VLR)

Friday, October 2, 2009

What is ADSL?

ADSL stand for asymmetric digital subscriber line, here asymmetric means data speed does not same in both directions (upload and download) and provides high speed on already exiting telephone lines and same time you can use internet and as well as your line for phone. It is faster than DSL and but ADSL downstream speed (downstream rate ) is different with upstream speed (sending rate ). ADSL is much easier to install and provides much faster data transfer rate. ADSL support data upstream rate is 16 Kbps to 640 Kbps and data downstream rate is 1.5 to 9 Mbps. Normally ADSL and download and upload speed is averagely 10 time more than a normal dial up connection.
Your DSL connection to the Internet will always on, there is not need to dial your ISP each time to use internet and the main requirement for ADSL connection is modem. There are many option in modem hardware for example: USB ADSL Modem, PCI ADSL Modem, and ADSL Router, but mostly used USB Modem because easy to install. For 1 or 2 computer the USB modem is best but for more than 3 computer you should use Ethernet ADSL modem. ADSL connections are more useful in applications like videoconferencing, to run online movies and upload and download heavy files. This connection is ideal for today business requirements.