Showing posts with label Basic computer tips. Show all posts
Showing posts with label Basic computer tips. Show all posts

Saturday, October 9, 2010

Authenticate the wireless network card tips

Q: is the home wireless router, two laptop Internet access, a wireless network can be used normally, the other can be the Internet, but that has been prompted to verify the identity of being, but on what will be dropped after the re-connection over a Society has also dropped, I do not know how this is going.

 A: This may be encrypted or password due to the reason. PA-PSK WPA2-PSK General encryption methods are: no encryption, WPA-PSK encryption, WPA2-PSK encryption. WPA2 There is generally a little older do not support WPA2 wireless card plus password, it is necessary the corresponding models with wireless LAN management procedures can be used. Know the reason, it is now to remedy.

First, right-click the desktop lower right corner of the small computer wireless connection icon and select "Repair" try.

WPA-PSK Second, change the router's encryption to WPA-PSK or not encrypted, and check the computer wireless network card are the same encryption settings.

TPLink821 Third, the installation TPLink821 wireless management procedures, management procedures using the wireless connection, it prompts to select encryption, as long as the router's encryption options are set the same no problem.

Monday, April 6, 2009

FTP errors

Error messages:

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.

220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

All About FTP


Setting Up A Ftp:
Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
You'll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or www.ask.com and asking 'What is my IP?'
After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm
First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).
The below options are then chooseable:
-Launch with windows
-Activate FTP Server on Start-up
-Put into tray on startup
-Allow multiple instances
-Show "Loading..." status at startup
-Scan drive(s) at startup
-Confirm exit
You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the 'options' text on the left column.
To protect your server, you should check 'login check' and 'password check', 'Show relative path (a must!)', and any other options you feel you'll need. After doing so, click the 'advanced' text in the left column. You should then leave the buffer size on the default (unless of course you know what you're doing), and then allow the type of ftp you want.
Uploading and downloading is usually good, but it's up to you if you want to allow uploads and/or downloads. For the server priority that will determine how much conventional memory will be used and how much 'effort' will go into making your server run smoothly.
Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click 'Log Options' from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
But, if you would like to see what is going on with the lowest possible space taken, click 'Screen' in the top column. You should then check off 'Log successful logins', and all of the options in the client directory, except 'Log directory changes'. After doing so, click 'Ok' in the bottom left corner.
You will then have to go into 'Setup -> User Accounts' (or ctrl & u). From here, you should click on the right most column, and right click. Choose 'Add', and choose the username(s) you would like people to have access to.
After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: was faked). For the 'Home IP' directory, (if you registered with a static server, check 'All IP Homes'. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose 'Add'.
From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options 'Read', 'List', and 'Subdirs', unless of course you know what you're doing. After doing so, make an 'upload' folder in the directory, and choose to 'add' this folder separately to the center column. Choose 'write', 'append', 'make', 'list', and 'subdirs'. This will allow them to upload only to specific folders (your upload folder).
Now click on 'Miscellaneous' from the left column. Choose 'enable account', your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you'd like to have. Now click 'Ok'.
**Requested**
From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.
Post your ftp info, like this:
213.10.93.141 (or something else, such as: 'f*p://example.getmyip.com')
User: *** (The username of the client)
Pass: *** (The password)
Port: *** (The port number you chose)
So make a FTP and join the FTP section
Listing The Contents Of A Ftp:
Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip
1. Put in the IP of the server. Do not put "ftp://" or a "/" because it will not work if you do so.
2. Put in the port. If the port is the default number, 21, you do not have to enter it.
3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
5. Click "Take the List!"
6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.
If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.
If you get this error message:
StatusCode = 550
LastResponse was : 'Unable to open local file test-ftp'
Error = 550 (Unable to open local file test-ftp)
Error = Unable to open local file test-ftp = 550
Close and restart FTP Content Maker, then try again.
FTP errors

Saturday, June 7, 2008

Take control of any Windows PC on the Internet with CrossLoop

TechRepublic Article here

Takeaway: Whether it is for troubleshooting or collaboration, sometimes you just need to see what is on a user's screen to really know what is going on. The free software utility CrossLoop makes connecting any two personal computers as easy as typing a phone number and clicking Connect.

For more images of CrossLoop in action, check out the TechRepublic image gallery: here

Under certain circumstances, connecting two personal computers over the Internet can get more complicated than many are willing to accept. Tools like Microsoft's Remote Assistance can be intimidating to the novice user and frustrating for the experienced user trying to gain access. Adding hurdles such as firewalls and routers to the mix means that many just give up on the whole idea of remote assistance.



Similar complaints are often heard about collaboration software. While the concept of two-heads-are-better-than-one is applicable to many situations in the business world, getting those two heads together presents challenges beyond just the personalities involved. There are several collaboration applications available; some are expensive and some are part of the operating system, but very few are as easy to implement as they should be.

However, one tool I have come across seems to have found the answer with a simple interface and an ease of operation that will make many other vendors of such software envious. CrossLoop connects any two personal computers running Windows with a deceptively simple interface that is essentially a box with an access number and a connect button. CrossLoop works through firewalls and routers without any additional configuration and encrypts all of the information flowing back and forth between the machines. The simplicity of setting up CrossLoop and getting two computers connected is remarkable when compared to the hoops most of us have to jump through to get the same result with other applications.

CrossLoop

The CrossLoop software can be downloaded from the TechRepublic Software Library. The 1.6-MB installation file is an executable file, so starting the installation process is as simple as double-clicking.

Shutting Down Xp In Different Ways

There are so many different ways to turn off your Windows XP computer, let's look at some of them:


  • The standard approach - click the Start Button with your mouse, then select the Turn Off menu and finally click the Turn Off icon on the Turn Off computer dialog. blink.gif
  • Press Ctrl+Esc key or the Win key and press u two times - the fastest approach.
  • Get the Shutdown utility from Download.com - it add the shut down shortcuts for you. Else create them yourself using approach
  • Create a shutdown shortcut on your desktop. Right click on the desktop, choose New Shortcut and type shutdown -s -t 00 in the area where you are asked to specify the location of the program file. Now you can just double click this icon to turn off the computer. The best location would be your quick launch bar.
  • Press the Win key + R key to open the run window. Type shutdown -s -t 00. [s means shutdown while t means the duration after which you want to initiate the shutdown process].

    If some open processes or application won't let you turn off, append a -f switch to force a shut down by closing all active processes.
  • Win+M to minimize all windows and then Alt+F4 to bring the Turn Off computer dialog.
  • Open Windows Task manager (by right clicking the Windows Task bar or Alt+Ctrl+Del) and choose Shut down from the menu. Useful when the Windows are not responding.
  • open task manager--->click on shutdown--->hold the ctrl key and click on Turn off::::::: pc will be turned off in 3 secs.. fastest method other than hard shutdown

Connecting two Lans in Different Locations

Connecting 2 Lans in Different Locations
Let’s say you are currently operating an office of 10~50 users, running Windows Server 2000/2003, mainly to share printers and files. You need to open a new office or add new location to work from. You want to create a WAN or VPN so that the users can still access files on the server. Your current Internet setup is ADSL Modem, to a Router, to a switch. Server connects to the Switch and the rest of the office connects to a switch also. Also, another possibility is to say you just want to connect your Home to your Network at work. Or even two different networks in your building.

What you basically want is a network like the attached Image below. Set up each site as its own network but using different private address ranges. If you have a different private addressing scheme in place at the main site (eg 192.168.2.xxx or something) then keeping that is fine, just make sure that the one you use at the new site doesn't overlap. When you connect the two sites, they'll just see each other as one big network, so in that diagram below the people in the new site will be able to ping 192.168.1.2 and just get to the right machine at the old site. Everyone will be on the same gateway as programmed into each router




There are two basic options for how you connect the two sites.

The first is to run a private link between them. Typically this would be something like ISDN, frame relay or Ethernet, depending on distance, speed requirement and how much money you have to throw at it. This is generally the more expensive option, although it's also the most reliable.

The other is to give each site a decent (cable/ADSL) Internet connection and set up a VPN pass-through. By configuring the VPN on the two routers, the machines at each end have no idea what's in the middle; they just see the other site as a network which is reachable through the router. This is generally cheaper, but you're relying on your ISP for performance. If you do this, pay particular attention to the upload speeds your ISP offers, because the transfer speed between the sites will be kept to the slower of the sending site's upload and the receiving site's download. Normal ADSL is capable of up to 1.5 Mbps uploads, but many ISPs throttle it to far less.

For the VPN method, some of the higher-end consumer gear can set up a VPN tunnel over an Internet connection. For the direct link, you'll be looking at a proper Cisco router or similar brand. Although, Cisco now owns Linksys and their BEFSX41 router will also work just fine.(See *-Note)

The important thing I don't want to forget to mention is that you need to look for in the specs is the ability for the router to maintain a VPN connection by itself. Just about every consumer router will support 'VPN pass-through', which is just letting the PCs behind the router do VPN stuff, but only some will maintain the VPN tunnel themselves.

The other thing you'll need at each end is a static IP address on the Internet connection -- dynamic DNS and IPsec VPNs generally don't mix.

*-Note! The BEFSX41 Linksys Instant Broadband™ EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint is the perfect solution for connecting a small group of PCs to a high-speed broadband Internet connection or a 10/100 Ethernet backbone. The Router can be configured to limit internal users’ Internet access based on URLs and/or time periods - URL filtering and time filtering. For enhanced protection against intruders from the Internet, the Router features an advanced Stateful Packet Inspection firewall. Use the Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint to create IPSec VPN tunnels, so you can securely connect to the corporate server from your home office—or any location when you’re on the road. The Router provides a dedicated port for DMZ hosting and acts as the only externally recognized Internet gateway on your local area network (LAN). With the performance and security features of the Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint, your network will take advantage of the Internet while keeping its data secure.

Another Option is a WRVS4400N Wireless-N Gigabit Security Router with VPN, Secure, high-speed wireless networking for growing businesses or gaming family.
• Wireless-N offers greater speed and coverage than Wireless-G, while at the same time being backwards compatible with 802.11b and g devices
• SPI Firewall, and Intrusion Prevention secure the work from outside threats
• QuickVPN IPSec VPN tunnel support provides secure remote user connectivity
• Support for WMM provides improved QoS over wireless connections for better video and voice performance

The WRV200 Wireless-G VPN Router with RangeBooster, Secure, smart wireless networking for growing Businesses.

• RangeBooster (MIMO) technology for dramatically increased range
• SPI Firewall, Encryption, and VPN support makes your network secure
• Multiple BSSIDs and VLANs provide separate secure networks
• Enhanced QoS for both Wireless and wired provide improved quality voice/video

Task Manager has been disabled

Task Manager has been disabled by your administrator Solved !

The problem is whenever you try to open Task Manager, the following error may occur:

“Task Manager has been disabled by your administrator”
Cause:
This error is caused if the DisableTaskMgr restriction is enabled.

Solution:

To enable Task Manager, try one of these methods:

Method 1


Click Start, Run and type this command exactly as given below [Just copy and paste] :

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Pol icies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

Just copy the following code into notepad and save the file asEnableTM.reg and double click on it.

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\System]
“DisableTaskMgr”=dword:00000000

Method 3 (try only if u r good with registry editing)
  • Click Start, Run and type Regedit.exe
  • Navigate to the following branch:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion \Policies\System


  • In the right-pane, delete the value named DisableTaskMgr
  • Close Regedit.exe
Method 4: Using Group Policy Editor - for Windows XP Professional
  • Click Start, Run, type gpedit.msc and click OK.
  • Navigate to this branch:
User Configuration/Administrative Templates/System/Ctrl+Alt+Delete Options/Remove Task Manager


  • Double-click the Remove Task Manager option.
  • Set the policy to Not Configured.

Rename Your PC PENTIUM Name

Rename Your PC PENTIUM Name and Make it Personalized
(This requires using Regedit to Modify)

If you Hold Down your Key and Hit Key,
Your will see a similar Screen

This is how to change the Registry Hardware Name of your CPU

If you are not comfortable with using "Regedit" Stop Reading Now and go have a beer.

GO TO START>RUN>TYPE REGEDIT
>HKEY_LOCAL_MACHINE>HARDWARE>DISCRIPTION>SYSTEM>CE NTRAL


PROCESSOR>ProcessorNameString>
Select the Processor by Number, Hint, the 1st Processor is Number 0
Then Navigate to and dbl clk to bring it up and you can create a Custom Name String for your CPU
Close Regedit

I changed mine to read

Intel(R) Pentium(R) 4 SirD 2.79GHz

The Change is immediate and Now it reads like this:


Just another way to waste a little time and personalize your equipment in case of theft

Friday, June 6, 2008

NOTEPAD "world trade centre trick"

NOTEPAD "world trade centre trick"..

Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....

Open your Notepad in ur computer and type the flight number i.e Q33N... Increase the Font Size to 72, Change the Font to Wingdings. U will be amazed by the findings.

Monday, June 2, 2008

Internet Cleaner


Internet Cleaner helps you remove all traces of your online and offline activity, including the list of recently visited sites, browser cache and cookies (IE, Firefox, AOL, MSN, Mozilla, Opera and Netscape Navigator are supported),
lists of recent documents in various applications (MS Office, Paint, Media Player, WordPad, Acrobat Reader, ACDSee and more) and protect your privacy by erasing the traces of Messenger, Email, News, P2P programs.

Download

Friday, May 30, 2008

Web Video Downloader for Firefox




  • Capture video, download video and save video fast from Internet.
  • Capture Flash SWF content with one-click at the same time.
  • Fetch video of different formats including flv, swf, wmv, asf, avi, mov, rm, rmvb.
  • Easy to download Youtube video and many other video sites and blogs.
  • Clean, user-friendly, easy-to-use and super light.
  • Support all popular video sites, including YouTube, Google, MySpace, and more >>* Work as a simple Firefox extension (add-on).
  • Safe execution from Mozilla Firefox browser, without redirections to other web sites.
  • Automatically detect Web video or Flash files for video capturing and downloading.
  • Pick the actual URLs of online Web videos and Flash files.
  • One-click to start video capture at once.
  • Fast speed to complete video downloading process.
  • Easy to pause and resume video download.
  • Keep history of downloaded video and Flash files automatically.
  • Display the number of captured videos in the toolbar.
  • Provide a free FLV player for you to play downloaded FLV video offline.
  • An advanced version of our popular freeware Sothink SWF Catcher.
  • Offer more considerate features compared with other software.
Video Down loader - here

Saturday, April 26, 2008

Top ten Cyber security tips

For Teens, their teachers and families


Be a responsible cyber citizen-

  • If you use the Internet, you're a citizen of a global community—a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws.
Use anti-virus software

  • A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!
Do not open email from unknown sources-

  • Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension—even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe.
Use hard-to-guess passwords and keep them private-

  • Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don’t give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words.
Protect computers with firewalls-

  • Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer.
Do not share access to your computers with strangers. Learn about file sharing risks -

  • Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other
    program help files to learn how to disable file sharing. Do not share access to your computer with strangers!
Disconnect from the Internet when not in use-

  • The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can’t enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer.
Back-up your computer regularly-

  • Help your family back up all household computers onto external media such as CD’s or diskettes.
Regularly download security protection update “patches”-

  • Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own.
Help your family to check computer security on a regular basis.-

  • Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.

A Quick way to print a Document

There are many ways to prints a document, but you can print a document quickly if you put a shortcut to the printer on your desktop and drag a document icon to it, no need to open file for printing just drag a file to printer icon and get your print.

To do this, first click Start button, Settings, then Printers ( first make sure you installed your printer driver). When the Printers window opens, hold down Ctrl and drag the printer icon to your system desktop.

Now you can drag a document icon and drop it in printer icon on your desktop. Here you will get a print quickly and with out open a file.

Computer Tips and Tricks

Computer training is possible through formal education like online Computer tips, Networking Tips , Hardware Tips , Registry Tricks and other computer science programs also.

It is no great mystery that major shifts in cultural and societal processes are marked with new advances in technology. This is also true of information technology. The printing press, the camera, the telephone, the computer, the Internet and the cell phone, are all inextricably linked to major changes in human culture. The printing press is linked to the rise of social movements. The photograph and telephone are linked to the birth of the Industrial Revolution. The advent of early computers and television coincides with the first steps towards global consortiums like the League of Nations. Information media changes how we perceive the world around us. The following profiles are two examples of current media that are expected to make a difference in how information is generated and perceived.



ComputerBigLab.com has been designed as a free introductory level, online computer related website, providing tutorials on computer hardware, software, operating systems, and basic troubleshooting, IT glossary, IT certifications and IT interview questions and answers.

If you just want to learn more about your computer's hardware, networking, Certifications and other IT related information, here's a good place to start! Read the tutorials, then try the exercises and computer Tests provided. If you have trouble with the review questions, tutorials or any other please let us know.

The computer computer tips, Interview questions, networking and Free tests may also be helpful for those preparing for Certifications exams, preparing for the interview of computer related jobs, and for students, teachers and the IT professionals.

ComputerBigLab.com intended to help all the students, teachers, & other computer / IT professionals of the Computer Science & Computer Technology Field. We have sorted out much information to help them all.

We are continuously updating our website. If you have any questions, suggestions and feedback please let us know.

We can improve our website in a very progressive way with your help. Your feedback is always welcomed.

Computer Science and Computer Technology has become the vital part of the education throughout the world.

Computer training is possible through formal education attending one of the many colleges or university offering both IT and computer science programs.

The study skills lesson plans should be so structured that it is dynamic and capable of being altered to suit the student’s growing and changing needs. This helps to make the students more focused in their approach, as they are continually involved in the process of change. After all the students are the ultimate beneficiaries. This however does not mean that the content can be ignored. There should be adequate coverage of any topic so that a certain degree of mastery is indicated.

Whatever study skills lesson plans are drawn up, remember there is no end to it. All plans have only beginnings, for human beings are unique, and it is this uniqueness, which is conceptually infinite. Whatever plan we draw up will be inadequate, but we do require a basic framework from which to operate.

Restore Show Desktop on taskbar

It's a common issue when you are dealing with spyware or other software unistallation on Windows XP your favorite Show Desktop icon to disappear from taskbar. Here is one relatively simple way how you can restore this useful icon:
  • Create file named: Show Desktop.scf
  • Open notepad and paste this content:
[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop
  • Save the file
  • Go to C:\Documents and Settings\your_username\Application Data\Microsoft\Internet Explorer\Quick Launch
  • Paste the file there.

The Great Browser Question - Which to use?

What is a browser? Simplest possible terms it's the program that allows you to surf web pages. For most people that use Windows their browser of choice is Internet Explorer, but why? Well, simple answer to that is that it comes built in with your Windows system and it's highly integrated (perhaps too much so) into the Windows operating system. For most people IE is just fine and you don't really need another browser, but did you know that there are other browsers out there? Did you know some of them have really cool features? Well, there is this brave new world of browsers out there and it's time that you take a look and test drive other browsers, after all, just because you have Windows doesn't mean that you have to use IE. Here is the breakdown of what's out there at the moment

Mozilla - Oh, you gotta love open source, it sometimes produces the best programs out there and Mozilla is a happy result of this open source community. So, let's do a brief little history on Mozilla...many years ago in a galaxy far far away there was a browser that competed with Dark Empire (also known as Microsoft)...this brave browser was called Netscape Navigator. Well, years of struggle, and finally Netscape on deaths door does something that few expected, it gave away its source code and made it open source and asked a band of rebels to take the challenge of making a better browser than IE...lo and behold MOZILLA was born...yes Mozilla, the first distribution of it basically made this loud thudding sound...oh god was it bad, but still it kept growing, getting better, and soon became THE BEST BROWSER. Yes, it's grown so big now that it will be stepping on Tokyo soon and the cries of, "Mozilla is coming, Mozilla is coming" will be dubbed with an out of sync English accent. Seriously though, Mozilla is faster than any browser out there, it meets almost all the internet standards perfectly, and it's a very stable browser. For my money it's the best value, oh and it's free, yes I mentioned that right? Yes, well it is free. You can download Mozilla here www.mozilla.org . Many Linux users will be familiar with this browser since it comes as standard fair in most of the Linux distributions now.



Internet Explorer - Okay, so, this is the one most people use. Internet Explorer has come a long way and it's in many ways one of the things Microsoft succeeded with by paying attention to the internet standards that are currently out there. I find that Internet Explorer meets many of the HTML, CSS, XML, ASP, PHP, and pretty much any other webpage standard you want to throw at it...why is this good? Well, it means that the webpage will be displayed as the author intended it to be displayed. So, it is a very good web browser, however, I find on older systems like Win 95, 98, ME, if you screw up your IE, you screw up your whole damn operating system. This is where IE is just too integrated into the operating system and this is where you could end up in a little bit of trouble.

Opera - The innovative little browser that could. What makes this browser interesting is the features it adds beyond the basics of web browsing. One thing I like is the popup blocker included in the program. Yes those annoying popup ads are bye bye and they stay that way. It's a small, relatively fast browser, and generally I like it. It is web compliant, umm, mostly compliant, okay so I have used it and gotten some funky looking pages from time to time. The Con's of this browser - It costs, umm, $30 the last time I checked...if you don't pay you can have a freeware version that's supported with advertising. It sort of makes me cringe to pay anything for a web browser, mainly because the best browser is free, but I can't fault Opera for wanting to make money, not every program can be open source. I think Opera will have it's market in Palm devices because of it's ability to render pages small and to still make them look like web pages. Give it a download here www.opera.com if you want to give it a try.

Avant - This is more of an add-on to Internet Explorer, so it won't get really that big of a write up. Originally it was called IE Opera, umm, yeah good name considering there was already a browser named Opera, but anyway, so they became Avant. Pluses about this browser, it has a very effective popup blocker and some quick mouse gesture things, so it's more of an add-on to IE and it does work rather nice, but, it's still basically Internet Explorer.

Netscape Navigator - I put this browser last, because, well, basically Mozilla and Netscape are indistinguishable at the moment. Netscape is basically Mozilla only they make you register to use the browser, which isn't that bad, but still it's basically Mozilla or is Mozilla basically Netscape. The line is getting blurred a bit. The positives about Netscape, well, I used them loyally for years, so I'll always have a bit of loyalty towards them. Second, I liked that they knew when they needed help and opened their source code. One other pro is that their email client that comes attached with the browser will accept AOL mail, so if you want an email client for you AOL account this is the way to go (AOL bought out Netscape a few years ago). Basically Netscape is Mozilla that you have to register to use...but still, it is a good browser and has some interesting integrations in it, like ICQ, AIM, etc.

So that's the list, did I miss some browsers, umm, yeah, probably I did, but I'll make this list longer as new browsers come out. Which browsers do I use, I like Mozilla, it is the fastest most stable...that would be my choice, but any of the browsers listed will do a good job, you just have to pick a browser that's best for you. Mozilla is coming...oops, sorry, I couldn't resist.

Work in On-screen Keyboard

This might seem like a silly tip or even a silly function, but I've already found a use for it once and I'm sure that you'll be able to use it at some point. Windows XP comes with a built in on screen keyboard. Basically a graphic of a keyboard comes up and acts like your keyboard, you can use your mouse to hunt and peck around. What uses does this have and what did I use it for? Well, it's good for people with disabilities, where it would be easier to use a mouse than trying to type or it's great to use when your keyboard goes loco on you. Yes, we've all had our keyboard go nuts. Here is how you launch it:

  • Go to start
  • Go to run and type OSK
  • Then the keyboard comes on

It's just that simple. It's best to make a desktop icon for it or a shortcut, because if your keyboard should go out on you, it would be handy to have it. All you do to create the shortcut is to:



  • Right click on the desktop
  • Click the new shortcut button
  • Type osk, click next twice, and there you have it.

Moving The Taskbar

I bet you didn't know that you could move your taskbar if you wanted. Mostly I leave mine at the bottom, like the rest of the population, but occasionally I feel like going wild and have the taskbar at the top of my computer. The Taskbar is that thin bar at the bottom where you can see all your open programs, the start menu, the clock, etc. Now, in WinXP they made it very nice to move it. This is how:

* Right Click on the Taskbar
* Click, Lock the Taskbar, until there is no check there
* Left Click on the task bar and move it to where you want it...it will always rest up against an edge, so top, left or right.
* Then click, Lock the Taskbar, again and it won't move from that spot.



These are the same instructions for Windows 98, ME, 2k, only you don't have to unlock the taskbar, you just left click on it and move...this was easier, but also you sometimes accidentally moved the task bar when you didn't want it to move, ugh. Well, there you have it, now put your taskbar to the top and see if you like it.

Monday, April 21, 2008

Pop-Ups Something To Be Worried About

Pop-ups are the annoying ads and other things on the Internet that open on your monitor as you're surfing the web. Their main goal is to either get you to visit a certain website or to collect your name and email address for marketing purposes.

These pop-ups are usually caused by something called Javascript, which is a simple programming language built into the web page you're visiting.

Sometimes these pop-ups can be useful. It may ask you for your login information or something else to log you into the website, or it might give you more information on something without taking you away from the page you're looking at. Music sites, for example, often use a pop-up for their players. These reasons are all legitimate uses and are quite a bit more acceptable than some of the advertising pop-ups.

The Javascript language can set the size of the window, where it's displayed on the screen and even whether or not the close button gets displayed. If the menu bars and close button are hidden, it can be next to impossible to get rid of the pop-up, unless you either enter what it's asking for or close your browser completely.

Some of these pop-ups can cause other problems as well. They may be poorly programmed, or they may be intentionally malicious and can cause many windows to be opened. And when you close one, several more open to replace it. When this happens, the only way to get rid of them is to close the browser.

A recent type of pop-up is created using software called Flash and can even be made to follow your mouse around the screen as you move it.

One of the more notorious uses of pop-ups is in adware, which often opens pop-ups related to the web pages you're looking at, even if it's not from that website. This adware is supported by advertising, which is why it uses these pop-ups to get your attention. It usually comes along with some other program, which may actually be useful, and gets installed at the same time. If you don't read the license agreement closely when you install it, you might miss the fact that this is going to happen even though they tell you (although it's usually hidden somewhere in the middle of the agreement, where most people never see it).

Another form of pop-up is called the pop-under. It opens a window behind the main window and you won't see it until you close your main browser window. These types are less annoying, but can still be a pain.

The main problem with pop-ups is the nuisance they cause, and almost every web browser has some kind of pop-up killer included these days.

You can also get specialized pop-up killer software that will catch most of the pop-ups that the browsers miss, giving you an almost 100% pop-up free internet experience.