Showing posts with label Article. Show all posts
Showing posts with label Article. Show all posts

Choosing a Good Domain Name

A domain can not only drive traffic to your website, it can also become the name that people remember when they think of a certain product or idea. It can go on to become a recognized brand and make a lot of money for the person that owns it. However, the truth is that, domain can play a critical role in your website’s success. But how do you pick a good domain name when all of the good ones are already taken? There are thousands of web sites, and every time you think of a good domain name for your own web site, it winds up being taken, or too close to someone else’s.

So far more than 100 million domains have been registered, and the process will not be stopping any time soon. Finding good domain names is going to get more difficult as the days go by. Some of the steps to help you get a domain are discussed here.

If you are wondering about the techniques that will help you to identify good domain names, read on.

They are simple and short

It is a known fact that people tend to remember things that are simple and short. Good domain names are short. Always select a short domain name for your website. Domain name should be less than 15 characters. As for the number of words, one-word domains are gold, two-word ones are good, three-word domains are average, and above that it is usually a bad idea.

Quotes.com is a superb domain and probably worth millions of dollars. ProQuotes.com is a good two-word domain worth thousands of dollars. ProQuotesNow.com is an average domain and could be used for a website. YourProQuotesNow.com is plain worthless.

They are easy to remember

Most users do not have the time to bookmark sites. They just memorize the domains of their favorite websites and type them whenever they want to visit one. If your domain is complex and not easy to remember you will lose these visitors along the way. Using a complicated domain name can interfere with the user’s desire to memorize the name.

Brcwr.com is a short domain name, but is not easy to remember at all, so it would be a bad idea to use it for your website (unless the initials represent the name of the website or a memorable message.

They have Easy Spellings

Your domain name should not contain words that are difficult to spell. Using words that have complicated spellings can result in the user landing in some other site. To simplify the user experience, do not use unknown foreign words or those that have complicated pronunciation.

CappuccinoBar.com might be problematic for English speaking visitors. Cappuccino is an Italian word, and not everyone is aware where the doubles are placed.


They have a .com extension

A .com domain extension enjoys the maximum popularity in the world. Additionally, most people have the tendency to remember this domain extension. Except in special cases, using .com domain extension can be a great idea. A simple and memorable domain name can enhance your site traffic greatly. Therefore, before deciding about a domain name, pay attention to all these factors.

They don’t contain hyphens or numbers

You should avoid hyphenated (-) domain name. If confuse to visitors that where hyphen sign used. Hyphen sign becomes domain name complex and domain name not easily memorable. They suffer the same problem of domains not using a .com extension or with complex spelling.

They are descriptive

Many visitors will come to your site through the search engines and via direct links on other websites. That is, they will come if the domain that they will see will be appealing. Having a descriptive domain name will give visitors an idea of what your site is about even before they enter it. If related keywords are present in the domain it might also help your search engine rankings.

Final remark


The most important thing to remember when choosing a domain is to make sure you pick one that is going to be reflective of you for the next several years.



What is Secure Sockets Layer (SSL)

You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc.
A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information

Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar withhttp:// protocol and https:// protocol, You might be wondering what they mean. HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a secure communication.

Cryptography

If two users want to have a secure communication they can also use cryptography to accomplish it

For example: 

TFDVSF=Encrypted Text

SECURE= Decrypted Text

You might be wondering how i Decrypted it, Here i have used Algorithm=+ for the communication and the key is "1", What comes after S is T so as you can see that S is converted into T, What comes After is to letter E from the word secure if converted into F and so on, To help you understand this more better I am adding a Video


So If the hacker starts sniffing from between he will get Encrypted text and as the Hacker does not know the keys so he cant decrypt it, but if the attacker or hacker is sniffing from the starting point so he will get the key and can easily Decrypt the data

Standard Communication VS Secure communication

Suppose there exists two communication parties A (client) and B (server)

Standard communication(HTTP)

When A will send information to B it will be in unencrypted manner, this is acceptable if A is not sharing Confidential information, but if A is sending sensitive information say "Password" it will also be in unencrypted form, If a hacker starts sniffing the communication so he will get the password.This scenario is illustrated using the following figure


Secure communication(HTTPS)

In a secure communication i.e. HTTPS the conversation between A and B happens to be in a safe tunnel, The information which a user A sends to B will be in encrypted form so even if a hacker gets unauthorized access to the conversion he will receive the encrypted password (“xz54p6kd“) and not the original password.This scenario is illustrated using the following figure



How is HTTPS implemented?

HTTPS protocol can be implemented by using Secure Sockets Layer (SSL), A website can implement HTTPS by purchasing SSL certificate.

Which websites need SSL Certificate?

The websites where a private conversation is occurred, Websites related to online transactions or other sensitive information needs to be protected needs to SSL Certificate 

How to identify a Secure Connection?
In Internet Explorer and google chrome, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.

If you are making an online transaction through Credit card or any other means you should check if https:// secured communication is enabled.

An Introduction To Keyloggers, RATS And Malware

Confucius, one of the greatest Chinese philosophers, said "I listen and I  forget. I see and I remember. I do and I understand." And this is exactly the way how this book is presented.

  1. You can read the book and get to know the basics.
  2. You can watch step by step guides and get "inside it".
  3. You can practice everything you've learnt in the book and finally UNDERSTAND it.

And this is why this book is so unique. You can read, you can watch and you can practice every aspect you got to know.


"An Introduction To Keyloggers, RATS And Malware" by Rafay Baloch is completely dedicated to newbies who are looking forward to play with keyloggers, RATs and various other forms of malware, or are curious to know how they can protect their PC's from getting infected with Trojan, worms and other forms of viruses.

The book takes you right from the basics to some advanced types of attacks. In this book Rafay have also reviewed various types of best keyloggers out there so you can find it easier to choose the best one according to your needs.

By reading this e-book I am very confident that you will be able to protect your computer from most of these types of attacks.

Learn All About Spyware

A very detailed look at what spyware is, how it attaches itself to computers, and the common methods of prevention.
There are a lot of PC users that know little about "Spyware", "Malware", "hijackers", "Dialers" and many more. This post will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares

There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
This Little site keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).

There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these:

Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

 Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

 Try: Spy Sweeper (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

 Try: HijackThis (http://free.antivirus.com/hijackthis/) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.

If you would like to prevent "spyware" being install.

 Try: SpywareBlaster (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

 Try: SpywareGuard (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

 Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

 Try: SpySites (http://camtech2000.net/Pages/SpySites_Program.html) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam (http://www.stopmessengerspam.com/) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.


All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "Spyblaster" "S&D Spybot" "Spy Sweeper" & "Admuncher" to protect your PC. A weekly scan is also recommended

Virus Free Scan

Kaspersky Online Scanner
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://www.kaspersky.com/virusscanner

BitDefender Online Scanner
Free and effective malware cleanup directly from your browser. It features all required elements for thorough antivirus scanning and effective cleaning: it scans your system’s memory, all files, folders and drives’ boot sectors, providing you with the option to automatically clean the infected files.
http://www.bitdefender.com/scanner/online/free.html

HouseCall
HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. It is now faster, more powerful and browser independent!
http://housecall.trendmicro.com/

There are many other Online Scanners which are free and easy to use, like Computer Associates Malware Scanner, ESET , Avast....

How to Own a Hacker - Reverting Keyloggers and Stealers

In my previous article I've been writing about How to know if you are infected with RATs or Keyloggers. Here i will show you how to revert those keyloggers, RATs, or stealers, and find who sent them to you.

What is Reverting?

Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action.

For this we will need a keylogger server using ftp. It can be found on warez sites, youtube etc. You basically need the following things:
•    Keylogger, passstealer
•    Cain and Abel
•    Virtual machine
(so you don't get infected, and what if the hacker is using better protocol that would be epic fail).

Getting Started:
Execute the keylogger on your virtual machine


Now run Cain and Abel and do the following things as per stated order















Wait for sometime and then check back the passwords area















As you can see the keylogger used ftp protocol to transfer the logs. Ftp protocol isn't very safe since it doesn't encrypt the data. Anyways you should see the IP address where your PC is sending packets. And also the username and password. This might not work if the server is using other protocol like http, smtp, etc. you'll most probably get junk values in user and pass box if those protocols are used.

So i open the ipaddress http://66.220.9.50/


Guess what its our very own drivehq.com =D. Now login using ftp password that we got from the sniffer and get going. I would recommend to steal the logs quietly like a ninja, so you can get others logs as well. Of course you can change the pass if you want but it won't send any further logs

How to Know if You Are Infected with RATs or Keyloggers

 In this post i am going to show you how to find out when you are infected with a RAT or Keylogger, without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a RAT or a Keylogger work, which would mean, if you are not connected to internet, you don't have to worry about being infected with RAT or Keylogger. Ok, so for those who have internet connection and think they are being infected with a Trojan, here is a little guide that can solve your problem.

1. Now every program has their own process which can be seen on task manager. So the first thing to do is to find out which process the Trojan is being attached to. If you see some unknown process search that on google. A good hacker will always makes sure he hides its process with a Windows based Process, for eg. svchost.exe or something like that.

2. If you cant find, then the next thing you can do is use cmd (to open cmd prompt, Click on Start--->Accessories-->Command prompt).

3. Once Command Prompt is opened, use this command: netstat -an |find /i "listening"

Note: The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool!

Now we wonder What this Command does? This command will show all the opening ports. Now check for any unknown port.

4. You can skip step 3 if you want, and can do this instead.

Open command prompt and type netstat -b

Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.
Look out for SYN Packets and the Foreign address its been connecting with , check the process its been associated with, check the ports also. If you find that its connecting to some unknown ports, then you can say you have been backdoored.

5. Go to your task manager. On the top of it, click on View---> select Column---> Tick on PID (Process Identifier).
Match the suspicious Process with the Processes In task manager, check PID also.

Now most of the RATs resides on Start up. How to delete them from start up?

a) Go to regedit ---> HKLM\Software\Microsoft\Windows\Current version\Run
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at
HKCU\Software\Microsoft\Windows\Current Version\Run
OR
Open Cmd prompt & type start msconfig. Go to Startup tab, you can check the startup process there.

I hope This Tutorial was easy and comprehensive

Connect Mobile To Your Personal Computer

Connecting mobiles to PC have always been difficult but that could really easy if you understand the basics of connecting mobile to PC and transfer your ringtones* games* Data between your mobile and PC.
Recognize Connecting Capabilities Of Mobile:
First you have to check what are the connecting abilities of your mobile. I mean by how many different ways your mobile can connect to other devices.
The most common connecting ways are:
1. Bluetooth
2. Infrared
3. Cable Connection
So at least one of them should be there in your mobile.
If You Have BLUETOOTH enable mobile:
Materials Needed: Bluetooth Dongle For PC
Bluetooth Enabled Phone
Mobile's Software ( PC Suite e.g.*)
First we would like to tell you about Bluetooth dongle* it is and electronic USB device which is connected to your PC and then you PC can receive and send all type of Bluetooth signals and that is the key point for this type of connection. First connect your Bluetooth Dongle To your PC and install its driver as if provided. Then switch on your mobile's Bluetooth reception so you can send Bluetooth signals to PC.Then run your installed PC software for that mobile* which you are trying to connect. For NOKIA mobiles PC Suite is provided if you buy mobile and same is the case for other companies so you should have your PC software of your mobile otherwise you can download from internet. Now you are on your on way to send Data from PC to your device.
__________________



If You Have INFRARED enable mobile:
Materials Needed: Infrared Dongle For PC
Infrared Enabled Phone
Mobile's Software ( PC Suite e.g.*)
First it would be better if you get to know what is Infrared Dongle. It is an electronic USB device which helps your PC to send and receive infrared signals and this is device which would act as a bridge between your mobile and PC.
Turn on infrared reception in your phone and connect infrared dongle with your PC. Now you have to align you device horizontally with your infrared dongle so now you are connected to your PC.
Open / run you mobile PC software to start communicating with your mobile.
For NOKIA mobiles PC Suite is provided if you buy mobile and same is the case for other companies so you should have your PC software of your mobile otherwise you can download from internet.
Now you are on your on way to send Data from PC to your device
__________________



If You Have mobile DATA CABLE:

Materials Needed: Connecting Cable
Mobile's Software ( PC Suite e.g.*)

First it is good if you have knowledge about connection cable. Sometimes it is provided with you mobile phones when you buy them and some time you have to buy them. It acts as a bridge between you mobile and your PC and transfer electrical signals from your mobile to your PC and PC to mobile.
This cable may connect at serial port at back of your PC or this cable may connect at USB port. Do as it is provided. Connect on end of cable to your mobile and other end with your PC.
Open / run you mobile PC software to start communicating with your mobile and start sending ringtones* games* themes e.t.c.
For NOKIA mobiles PC Suite is provided if you buy mobile and same is the case for other companies so you should have your PC software of your mobile otherwise you can download from internet.
Now you are on your on way to send Data from PC to your device
__________________

Camera Phones and Consumer Tips

While your new camera phone provides you with the flexibility to make a phone call and instantly take and transmit a photo.For this reason, we recommend the following consumer tips and requests that every camera phone users follows them: Camera phone users should always respect the privacy of others.
1. Users should always respect areas considered private by those who use them, for example: bathrooms, changing rooms, and gym locker rooms.
2. Users should always respect the sensitivity of many office and industrial environments where the viewing of proprietary materials is a concern.
3. Users should respect areas of photographic sensitivity, for example: museums, movie theatres and live performances.
4. Camera phones should not be used to take photos of individuals without their knowledge and consent. Special discretion is advised when using your camera phone to take photos of persons under 18 years of age.
5. Do not use camera phones while operating a motor vehicle. It is also illegal to send messages which would be regarded as harassing, menacing or otherwise offensive.
6. Users should be aware that some organizations ban the use of camera phones in some areas.

Symbian Tips and Tricks

Note: We are Not responsible for any damage, try at ur own risk

Tip 1 : Do u know how to use the edit button (abc or pencil button)?
Heres how... in the inbox for example; u wanna delete multiple sms, simply hold the edit button, scroll down, and then, press c to delete the marked sms. The edit button can also b used to copy and past text in sms, simply hold it and scroll across, choose copy. pretty good for placing song names in ngages

Tip 2 : ….happens, on a smartphone, its inevitable u do something wrong, and tis calls for a format of fone. to format the fone, press *#7370#, then enter the lock code, which is the sec code of the fone. NOTE: batt must b full, else if format is disrupted by low batt, consequences will b disatrous
I heard the code *#7780# works too, pretty much the same i tink.
for 6600 users, to format the fone, theres an alternative way. Press and hold <3>, <*>, and the buttons, then power on fone, keep holding on the 3 buttons, till u come to a format screen. tis method ONLY works on 6600, and need not enter the sec code. BUT sec code wun be reset to default 12345.

Tip 3 : TO NGAGE USERS; Did u know u can install .sis files simply using the cable given? Juz plug it in, place the .sis file anywhere on e: (the mmc), not in any folders, root of e:, disconnect, then look for it in manager.

Tip 4: Save on battery and system memory being used by regulary checking the task manager which can be accessed by holding down the menu button!!

Tip 5: Type *#06# to display your IMEI serial number, very valuable for the unlocking your phone to other sim cards

Tip 6: Type *#0000# to view which firmware version you are running

Tip 4a: Set the screen saver to a short time out period to prolong battery life.

Tip 4b: Avoid restarting the phone, or repeatedly turning it on and off. This helps increase battery life.

Tip 7: If you would like to avoid being "blue jacked", keep bluetooth turned off, or set your phone's visibility to hidden.

Tip 8: Don't want to carry a watch and a phone? Set the screen saver to show date and time, then you can ditch the watch.

Tip 9: Save memory when installing apps, by installing over bluetooth. This can be done using the nokia phone suite and a bluetooth serial connection. Only works with .SIS files, so java still has to be sent to the phone, but will save space when using .SIS files.

Tip 10: Operator logos
Use a filemanager like FExplorer or SeleQ to add the folders: "c:/system/Apps/phone/oplogo". Add a .bmp picture to folder "oplogo" and restart your phone! The .bmp picture size needs to be: 97 x 25 pixels

Tip 11: Check if the recepients phone is on
Delivery reports
or
Type *0# your message in the message composer window space then write your message, the recipient will not see the star zero hash bit - just the message When they read it it will relay a message back to your fone showing the time they recieved it. (haven't yet tried it myself though).

Tip 12: BlueJacking
First up, you need to know what Bluetooth is. There are lots of types of modern devices that incorporate Bluetooth as one of their many features. PDAs, mobile phones and laptops are a few of these modern devices. Bluetooth means that Bluetooth enabled devices can send things like phonebook/address book contacts, pictures & notes to other Bluetooth enabled devices wirelessly over a range of about 10 metres. So, we've got past the boring part. Now, using a phone with Bluetooth, you can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone.

Tip 13: While you are viewing a picture in your phone's gallery, press one of these shortcut keys (definitely works on 6600, not sure about other symbians)
1 - turn image anticlockwise
3 - turn image clockwise
* - toggle on/off of full screen
5 - zoom in
0 - zoom out

#15 u can select all files in a folder by selecting THE folder and copy it then paste it somewhere. however u need to make a new directory. fexplorer wun let u copy that folder together. well seleQ can mark files to copy but it really takes time!

#16: A soft and Hard reset
A Soft-reset - the process of resetting all the settings of the phone to the factory default! No applications are deleted! A Hard-reset is like formatting a drive! It does format the memory. Everything that has been installed after the first use of the phone is deleted! It will recover the memory of the phone to the state you purchased it! It is done by inputing the following code: *#7370# NOTE: The battery must be full or the charger has to be connected to the phone so that it does not run out of power and make the phone unusable.

#17: Formats of images
supported ones: JPG UPF GIF87a/89a WBMB MBM TIFF/F PNG EXIF

How to copy & paste text in your Nokia 3650:
Press and hold the pencil key and select your text using the scroll key.
Left function key will change to 'Copy'. Press it to copy the selected text to clipboard.

You can paste the clipboard contents the same way:
press and hold the pencil key and press 'Paste'. Or, press pencil key once and select 'Paste'.
Press and hold the Menu key to open the application switching window, where you can *duh* switch between applications.
If a program hangs and you can't shut it down, select the application in the
application switching window and press 'C' to kill it. It's also a faster way to exit programs.
Turn on/off the "click" sound made by the camera by selecting the 'Silent' profile or by turning warning tones on/off:
Menu > Profiles > "select your activated profile" > Personalise > Warning tones > On/Off.
(This also effects the sound of Java games and apps).

To change background image go to:
Menu > Tools > Settings > Phone > Standby mode > Background image > Yes > "choose an image".

The best size for background images is 174x132 pixels.
Only got blue, green and purple in your 3650 colour palette?

This free app adds 3 more colours: Palette Extender.
Display an image when someone's calling:
Menu > Contacts > "select a contact card" > Options > Edit > Options > Add thumbnail > "choose an image".

Add a personal ringing tone to a contact:
Menu > Contacts > "select a contact card" > Options > Open > Options > Ringing tone > "choose a ringing tone".

Delete all messages from your Inbox at once:
Menu > Messaging > Inbox > Options > Mark/Unmark > Mark all > Options > Delete.

Send or hide your caller ID: Go to: Menu > Tools > Settings > Call > Send My
Caller ID > 'Yes', 'No' or 'Set By Network' to follow the default settings of your home network.

If you often copy large files to your MultiMedia Card, I recommend a card reader.
E.g. With a card reader it takes only 12 seconds to copy a 10 MB file!
Record the sound of a phone call using the (sound) Recorder.
Menu > Extra's > Recorder > Options > Record sound clip.
Note: short beeps are audible during call registration.
But there is a 60 second limitation so if you want unlimited sound recording get this app: Extended Recorder.
While writing text, press "#" to switch between upper and lower case and Dictonary on/off (predictive text input).
Press and hold "#" to switch between Alpha mode and Number mode.
Keyboard shortcuts for zooming and rotating images in Images:
1 = zoom in, 0 = zoom out, press and hold to return to the normal view.
2 = rotate anticlockwise, 9 = rotate clockwise, * = full screen.
In standby mode, press and hold the right soft key to activate voice dialling.
To add a voice tag to a phone number, open a contact card and scroll to the phone number and select:
Options > Add voice tag.
You can customize both soft keys located below the screen (in standby mode):
Menu > Tools > Settings > Phone > Standby mode > Left/Right selection key > "select an application".
In standby mode. press scroll key center (joystick) to go directly to Contacts.
In standby mode, press and hold 0 to launch your wap home page.
In Menu or any subfolder, press numbers 1 - 9 to start the application at that location.
123
456
789
In standby mode,
45# + dials the number on your sim in memory slot 45.
50# + dials slot 50 and so on.
If you have your keylock activated just press the on/off button to turn on your backlight
to look at the time when it's dark without having to unlock the keypad.
Never, ever, in your whole life, install WildSkinz on your Nokia 3650!!! WildSkinz screws up
the whole 3650 system. It was never intended to work on the 3650, only on the 7650.
Why assigning Video Recorder in the right or left soft key does not work?

(Sound Recorder is launched instead of Video Recorder)
It's a bug with firmware version 2.50.
How to check your firmware version:

A "Firmware" is the phone's operating system stored in internal Flash memory of the device (disk Z.
Manufacturers release new firmware versions containing bug fixes, improvements and - sometimes - offering new functions.
Firmware upgrade can only be made in authorized Nokia service centre (point).

To check your current firmware version simply type *#0000# on main Phone screen.
·
How to check your IMEI (International Mobile Equipment Identity)?

Type *#06# on main Phone screen.

Start up in Safe Mode so no 'auto start' apps will be running:

To make sure that no memory-resident programs start when you reboot your phone,
hold down the pencil key when you turn on the phone and hold it on untill you have to enter your PIN code.
(When you have trouble booting up the phone with the MMC in it because it got corrupted for some reason, this trick will
almost always let you boot up the phone so you can remove the latest installed app which might have caused the
problem or if your phone is "unrepairable" you can still back up your important data before you do a format.)

Q: How to totally format your Nokia 3650 and remove all installed applications, user files and restore all
settings to default like it's new out of the box? (OEM apps won't be deleted like Camera and RealOne Player).

A: First Format your MMC: Menu > Extras > Memory > Options > Format mem. card > Yes.
Note: It is very important to format your MMC before you format your phone!
Then format your phone by typing *#7370# on main Phone screen.
Phone will ask: "Restore all original phone settings? Phone will restart." Press 'Yes' and enter your Lock code (default is 12345).
Tip: Formatting takes several minutes so you'd better connect your Nokia 3650
to a charger to ensure that your battery doesn't get empty in the middle of formatting.
Note: All your created acces points and mailboxes will be lost so take a note of them. And all application settings will be reset.
E.g. In Camera, image quality is set back to normal and memory in use is set back to phone memory. And also in Messages,
memory in use is set back to phone memory, etc. Also backup your contacts with PC Suite or a program like Contacts Manager.

To reset your wallet, should you forget your code,
Type in:
*#7370925538#
this will reset the wallet code, the wallet contents will be deleted.

How to free more RAM on your phone >>>

>>> Method 1: Flight mode:
Put your phone in "Flight mode" with Psiloc System Tools. Install System Tools, open it and select "Flight mode". This way you can restart the phone without your SIM card so there will be no running phone tasks in the background. Now you can have up to 3,5 MB of free RAM!
Note: ironically enough, Flight mode doesn't work when Smart Launcher is installed, at least in my case.
But i've also heard several reports of people who have both apps running without any problems.

>>> Method 2: Smart Launcher trick:
Install Smart Launcher and open it. Go to Options, Settings and put Launcher ON.
Now plug in your charger and switch off your phone. Wait untill the battery meter appears and short press the Menu button (don't hold).
The menu should appear and now you can have 3,5 to 4,5 MB free RAM! (Hold Menu button to check RAM).
The trick is that with the charger plugged in, the phone must get a minimum software support for charging, even when
the phone is switched off. And somehow Smart Launcher has still got it's shortcut running and that's the Menu button. So when
you press the Menu button, you go directly to the Menu without any other phone tasks running in the background so
you trick the phone and you have more free RAM!
Note: when you unplug the charger, the phone will switch off.

>>> Method 3: Menu :
This method I found it by myself, it frees a little about 100~200 KB but I guess it's useful sometime
Close your menu not by selecting the right selection key "exit", or pressing the menu key another time, they only hide the menu app but do not close it, to close it select the left selection key "option" and scroll down and select "exit"

So when you open an app needs more ram reopen menu and close it, it's useful when play low bit rate video in realplayer paradise

Stolen Mobile Phones Keep It Safe

Lost and stolen mobile phones keep it safe and know what to do if you lose it

If you lose your mobile phone, or have it stolen, not only do you have to deal with the inconvenience of not having your phone, but you could be paying for someone else?s calls!

PREVENTION
Prevention is better than cure.
Reduce your phone?s appeal to thieves and assist in its recovery if it is lost or stolen:
1) Treat your phone as you would any valuable item: Even if you got your handset as a $0 upfront deal?, this does not reflect its true cost. Handsets are expensive - they can cost more than $1000.
* Be discrete. Keep your mobile on you. Never put it down in a public place or leave it unattended.
* Switch to vibrate mode in circumstances where a ring tone might attract the attention of a thief.
2) Use your phone?s security features: Your phone has security features which you can use to stop others using your phone for example, you can set a Personal Identification Number (PIN) number which must be entered before anyone can use the phone. Read your handset User Guide to find out what features your phone has and use them. Even if your phone isn?t stolen, someone might be tempted to borrow your phone and make a few expensive calls without your knowledge.
3) Name it: Some form of personal identification on your phone can deter the would-be thief. Consider engraving your initials on your phone and the battery, and ? if you have one also including your driver?s license number.
4) Know your IMEI: Every mobile phone has a unique 15-digit electronic serial number, known as the International Mobile Equipment Identity (IMEI) number. Record your phone?s IMEI number and keep it in a safe place in case your phone is lost or stolen. You can check your IMEI number by dialing *#06#.
5) Insurance: Don?t assume your phone is covered in your (or your parent?s) home contents insurance. Check and consider insuring it separately, if necessary. Remember that even if you got the phone for ‘$0 upfront?, this doesn?t mean it was free it means the cost was absorbed in the overall contract price. You may not be able to get a replacement phone for $0 upfront.
LOST OR STOLEN
If your phone is lost or stolen:
6) Notify your network carrier AND the police immediately in the event of loss or theft. Tell them your IMEI number and any other identifying features on your phone (e.g. engraved initials). Your carrier can use this number to block your phone from all networks once you report the phone lost or stolen, making it useless to any thief. Importantly, this also ensures you?re not paying for any calls made by the thief. If the handset is subsequently found, the IMEI block can be easily removed as long as you can prove you?re the original, rightful owner of the phone

Trojan Virus attacks: An analysis

What is a Trojan virus?

A virus that looks like a harmless and useful program but actually contains a code that can destroy data or install adware or spyware on your computer. Trojan viruses can be embedded in email attachments, programs that have been downloaded, or even through operating system vulnerabilities on your computer.

A recent tactic that hackers are using is to put the virus in pictures. Never download anything you do not recognize. Unlike the regular computer viruses Trojans do not replicate.

What does a Trojan virus do to your computer?

Trojan viruses can do much damage to your computer or worse, hackers can read the files and personal information from your computer and steal your identity. They can also add unwanted spyware and ad ware, deliver unsolicited pop-ups and advertising, all without your consent.

So how can get rid of them?

Most if not all antivirus programs will detect and remove Trojans, viruses and other unwanted programs from your computer automatically. For e-mail attachments, you may have to scan them individually. There are programs you can download that will do it automatically. There is plenty of anti-virus software free and paid out there that can look at. Payment programs usually have more features that can be used as a registry cleaner.

Whatever your choice may be, make sure you have installed the latest version, periodically perform system analysis, and updated with the latest version to keep your computer protected.

One of the most evil and insidious things ever invented was the Trojan virus. What person with dementia thought of this is beyond comprehension. Trojan virus infiltrates your entire computer system and affects its ability to quickly browse the Internet and in the worst cases can cause the entire system to crash, permanently delete data stored on your hard drive.

There are some steps you can take to the removal of Trojan viruses, to save all your data and installed software. If you take your computer to a repair shop or the Geek Squad you want to delete the entire hard drive after saving valuable documents. After going to reinstall the operating system software and make your computer virus free.

The problem with this method is that it is expensive, time consuming, and you can never recover the installed applications. Unless you have the original application software installation discs and registration number to go with it, you have to buy new programs. That can reach hundreds and even thousands of dollars if you have a lot of expensive programs installed as Photoshop, Dreamweaver, InDesign, ProSeries, and many others.

You can also simply download a virus cleaner and run it. That will solve more problems and run the Trojan virus removal desired. If your computer crashes or can not connect to the Internet, which happens a lot with Trojan virus infections.

Keylogger Scanner to Remove Keyloggers

Nowadays both business and home computer users need to be aware of how to protect themselves from attack by computer viruses, spyware, malware, and fraudulent attempts to steal personal identity and financial data. Computers should always have up-to-date antivirus and other security programs installed, and all users should be familiar with those steps which are needed to protect personal identity when using the Internet.
 http://www.review-best.com/spyware-removal-software-download.htm

Keyloggers are a particular type of spyware, which usually will attempt to steal a person's user ID and password, when they log on to a particular website. Any good anti-malware or anti-spyware software should include a keylogger scanner, which would detect the presence of that program and remove it. I will also be introducing a high quality virus, adware and spyware software that speed up my PC significantly.

Those who use personal computers, whether at home or work, should understand the need to protect their computer from attack by computer viruses, spyware and malware. These programs can cause a lot of damage and inconvenience.

The authors of the very first computer viruses seemed to have been mainly interested in showing how clever they were, but modern virus and spyware infections are often designed and distributed for criminal purposes. Criminal gangs often use these infections to gain control of very large networks (millions of home computers in some cases), which they use for various illegal purposes. Often the networks are hired out to those who wish to distribute large quantities of e-mail spam.

Criminals also use virus, spyware and malware infections to attempt to steal people's personal identity, and therefore to gain access to their bank accounts. Keyloggers are often an element in these infections: they detect the user's ID and password when they are connecting to their online bank.

The user's ID and password can then be used fraudulently to steal money from the bank account. Users of online banks should be cautious about frauds of this type. Always follow the security advice provided on the security page of your online bank's website.

The so-called "phishing" attack occurs when fraudsters use e-mail or telephone calls to impersonate bank staff, and to trick customers into revealing their account details and password.

The best protection requires computers to have up-to-date antivirus and other security programs (anti-spyware, anti-malware) installed. These should also be configured to run regularly, preferably once per day. Keyloggers attempt to steal IDs and passwords when users are connecting to online services. The ability to detect and remove these scanners should be included in any good anti-spyware system. I am glad that all the spyware, adware and Trojan viruses on my computer are all gone now all thanks high quality software which I downloaded.

Operating Systems: File Systems

File systems are an integral part of any operating systems with the capacity for long term storage. There are two distinct parts of a file system, the mechanism for storing files and the directory structure into which they are organised. In mordern operating systems where it is possibe for several user to access the same files simultaneously it has also become necessary for such features as access control and different forms of file protection to be implemented.
A file is a collection of binary data. A file could represent a program, a document or in some cases part of the file system itself. In modern computing it is quite common for their to be several different storage devices attached to the same computer. A common data structure such as a file system allows the computer to access many different storage devices in the same way, for example, when you look at the contents of a hard drive or a cd you view it through the same interface even though they are completely different mediums with data mapped on them in completely different ways. Files can have very different data structures within them but can all be accessed by the same methods built into the file system. The arrangment of data within the file is then decided by the program creating it. The file systems also stores a number of attributes for the files within it.

All files have a name by which they can be accessed by the user. In most modern file systems the name consists of of three parts, its unique name, a period and an extension. For example the file 'bob.jpg' is uniquely identified by the first word 'bob', the extension jpg indicates that it is a jpeg image file. The file extension allows the operating system to decide what to do with the file if someone tries to open it. The operating system maintains a list of file extension associations. Should a user try to access 'bob.jpg' then it would most likely be opened in whatever the systems default image viewer is.

The system also stores the location of a file. In some file systems files can only be stored as one contigious block. This has simplifies storage and access to the file as the system then only needs to know where the file begins on the disk and how large it is. It does however lead to complications if the file is to be extended or removed as there may not be enough space available to fit the larger version of the file. Most modern file systems overcome this problem by using linked file allocation. This allows the file to be stored in any number of segments. The file system then has to store where every block of the file is and how large they are. This greatly simplifies file space allocation but is slower than contigious allocation as it is possible for the file to be spread out all over the disk. Modern oparating systems overome this flaw by providing a disk defragmenter. This is a utility that rearranges all the files on the disk so that thay are all in contigious blocks.

Information about the files protection is also integrated into the file system. Protection can range from the simple systems implemented in the FAT system of early windows where files could be marked as read-only or hidden to the more secure systems implemented in NTFS where the file system administrator can set up separate read and write access rights for different users or user groups. Although file protection adds a great deal of complexity and potential difficulties it is essential in an enviroment where many different computers or user can have access to the same drives via a network or time shared system such as raptor.

Some file systems also store data about which user created a file and at what time they created it. Although this is not essential to the running of the file system it is useful to the users of the system.

In order for a file system to function properly they need a number of defined operations for creating, opening and editing a file. Almost all file systems provide the same basic set of methods for manipulating files.

A file system must be able to create a file. To do this there must be enough space left on the drive to fit the file. There must also be no other file in the directory it is to be placed with the same name. Once the file is created the system will make a record of all the attributes noted above.

Once a file has been created we may need to edit it. This may be simply appending some data to the end of it or removing or replacing data already stored within it. When doing this the system keeps a write pointer marking where the next write oparation to the file should take place.

In order for a file to be useful it must of course be readable. To do this all you need to know the name and path of the file. From this the file system can ascertain where on the drive the file is stored. While reading a file the system keeps a read pointer. This stores which part of the drive is to be read next.

In some cases it is not possible to simply read all of the file into memory. File systems also allow you to reposition the read pointer within a file. To perform this operation the system needs to know how far into the file you want the read pointer to jump. An example of where this would be useful is a database system. When a query is made on the database it is obviously ineficient to read the whole file up to the point where the reuired data is, instead the application managing the database would determine where in the file the required bit of data is and jump to it. This operation is often known as a file seek.

File systems also allow you to delete files. To do this it needs to know the name and path of the file. To delete a file the systems simply removes its entry from the directory structure and adds all the space it previously occupied to the free space list (or whatever other free space management system it uses).

These are the most basic operations required by a file system to function properly. They are present in all modern computer file systems but the way they function may vary. For example, to perform the delete file operation in a modern file system like NTFS that has file protection built into it would be more complicated than the same operation in an older file system like FAT. Both systems would first check to see whether the file was in use before continuing, NTFS would then have to check whether the user currently deleting the file has permission to do so. Some file systems also allow multiple people to open the same file simultaneously and have to decide whether users have permission to write a file back to the disk if other users currently have it open. If two users have read and write permission to file should one be allowed to overwrite it while the other still has it open? Or if one user has read-write permission and another only has read permission on a file should the user with write permission be allowed to overwrite it if theres no chance of the other user also trying to do so?

Different file systems also support different access methods. The simplest method of accessing information in a file is sequential access. This is where the information in a file is accessed from the beginning one record at a time. To change the position in a file it can be rewound or forwarded a number of records or reset to the beginning of the file. This access method is based on file storage systems for tape drive but works as well on sequential access devices (like mordern DAT tape drives) as it does on random-access ones (like hard drives). Although this method is very simple in its operation and ideally suited for certain tasks such as playing media it is very inneficient for more complex tasks such as database management. A more modern approach that better facilitates reading tasks that arent likely to be sequential is direct access. direct access allows records to be read or written over in any order the application requires. This method of allowing any part of the file to be read in any order is better suited to modern hard drives as they too allow any part of the drive to be read in any order with little reduction in transfer rate. Direct access is better suited to to most applications than sequential access as it is designed around the most common storage medium in use today as opposed to one that isnt used very much anymore except for large offline back-ups. Given the way direct access works it is also possible to build other access methods on top of direct access such as sequential access or creating an index of all the records of the file speeding to speed up finding data in a file.

On top of storing and managing files on a drive the file system also maintains a system of directories in which the files are referenced. Modern hard drives store hundreds of gigabytes. The file system helps organise this data by dividing it up into directories. A directory can contain files or more directories. Like files there are several basic operation that a file system needs to a be able to perform on its directory structure to function properly.

It needs to be able to create a file. This is also covered by the overview of peration on a file but as well as creating the file it needs to be added to the directory structure.

When a file is deleted the space taken up by the file needs to be marked as free space. The file itself also needs to be removed from the directory structure.

Files may need to be renamed. This requires an alteration to the directory structure but the file itself remains un-changed.

List a directory. In order to use the disk properly the user will require to know whats in all the diretories stored on it. On top of this the user needs to be able to browse through the directories on the hard drive.

Since the first directory structures were designed they have gone through several large evolutions. Before directory structures were applied to file systems all files were stored on the same level. This is basically a system with one directory in which all the files are kept. The next advancement on this which would be considered the first directory structure is the two level directory. In this There is a singe list of directories which are all on the same level. The files are then stored in these directories. This allows different users and applications to store there files separately. After this came the first directory structures as we know them today, directory trees. Tree structure directories improves on two level directories by allowing directories as well as files to be stored in directories. All modern file systems use tree structore directories, but many have additional features such as security built on top of them.

Protection can be implemented in many ways. Some file systems allow you to have password protected directories. In this system. The file system wont allow you to access a directory before it is given a username and password for it. Others extend this system by given different users or groups access permissions. The operating system requires the user to log in before using the computer and then restrict their access to areas they dont have permission for. The system used by the computer science department for storage space and coursework submission on raptor is a good example of this. In a file system like NTFS all type of storage space, network access and use of device such as printers can be controlled in this way. Other types of access control can also be implemented outside of the file system. For example applications such as win zip allow you to password protect files.

There are many different file systems currently available to us on many different platforms and depending on the type of application and size of drive different situations suit different file system. If you were to design a file system for a tape backup system then a sequential access method would be better suited than a direct access method given the constraints of the hardware. Also if you had a small hard drive on a home computer then there would be no real advantage of using a more complex file system with features such as protection as it isn't likely to be needed. If i were to design a file system for a 10 gigabyte drive i would use linked allocation over contigious to make the most efficient use the drive space and limit the time needed to maintain the drive. I would also design a direct access method over a sequential access one to make the most use of the strengths of the hardware. The directory structure would be tree based to allow better organisation of information on the drive and would allow for acyclic directories to make it easier for several users to work on the same project. It would also have a file protection system that allowed for different access rights for different groups of users and password protection on directories and individual files.Several file systems that already implement the features ive decribed above as ideal for a 10gig hard drive are currently available, these include NTFS for the Windows NT and XP operating systems and ext2 which is used in linux.

How to Remove a Computer Virus?

If you have used a computer long enough, then you have probably had a virus infect your computer at some point. You know how annoying and potentially dangerous they can be to your PC and you wish you knew how to remove a computer virus. There are many ways to take care of this problem, but only a few of them are really good. Using a high quality anti adware and spyware software has helped to clear up my PC of annoying pop ups and increased its speed significantly.
There are several good programs to use that are trusted by millions of people the world over. Most users are not that technically savvy so they will not know the extent of the damage that a virus has done to their computer. Downloading this program will not only get to the root of the problem, but it will kill it as well.

One of the better things about this is that you do not have to be a technical geek to be able to use it. The directions are easy to follow and very effective at getting the job done correctly. There are only a few steps involved and at a certain point, all you have to do is sit back and let the program work its magic. This is the ideal program for those whose lives are busy and do not have the time to babysit the process.

There are many ways that a PC can get infected and viruses are always updating themselves as to how to infect your computer. They are sneaky like this and it is why they are constantly coming back. Anti adware software knows this and keeps itself updated as well with the latest methods that can effectively thwart those attacks. It can be seen as a battle of wits that anti adware programs are winning.

In addition to cleaning up and destroying the viruses in your PC, this anti adware program can also immunize your system so it doesn't get sick again. This is the best plan of attack that there is if you think about it. It's like a preventative maintenance program for your computer. It is effective, quick, and it leaves no stone unturned.

Once the virus is gone and your system has been immunized, then the anti-adware program implements the scanning process. This is a very neat and useful tool that allows you to periodically check on the status of your system. It knows what it is looking for and if it finds adware, will notify you of the issue.

As mentioned before, we all have busy lives that are run more effectively when on a schedule. The scanning process is no different in that you can set up a certain date and time for the scanning to take place. This way, if there is a problem, you can take care of it right away.

One reason why some viruses are so damaging to a person's system is that they are left undetected for long periods of time. The quicker you can identify the problem, the quicker you can fix it. Your PC has some very sensitive and important information on it, and the anti adware program can help you keep it all safe. I am glad that all the spyware, adware and viruses on my computer are all gone now all thanks to high quality software which I downloaded and would highly recommend it.

Hard Drive Crash Prevention And Recovery Tips

The hard drive in our computers right now stores all of our data, and our computer could not function without it. There would be no World Wide Web, email or even an operating system without hard drives. Since hard drives are so important, a hard drive crash is without a doubt the biggest problem that someone could face on their computer.

Hard drive crashes can happen for many reasons, and usually the owner is not to blame. One reason your hard drive can crash is because of a hard ware problem. See your hard drive is a magnetic disc that spins and has an extended arm hovering over it, to access any area, and collect the data. If the motor overheats and stops spinning or the arm fails to function, then your hard drive will crash and not be accessible at all.
Another way for your hard drive to crash is from corrupt system files, registry files and viruses. Viruses come in many forms as spy ware, ad ware, in emails and many other places all over the web. I recommend a good virus protection program from McAfee or Norton to stop those viruses and prevent your hard drive from crashing.
Now let’s say your hard drive has crashed, how do you determine the problem and can it be fixed? Well determining whether the hard drive crash is mechanical of software related is actually pretty easy. The flashing light on front of your computer case, that blinks when the computer is busy, is a good tool to determine the problem. If you see the LED light flashing, but the computer will not boot up, then most likely it is a software related problem, which means an operating system glitch or a virus of some sort. Lucky for you this usually can be fixed and all of your files can be saved, but I recommend only letting a professional try and fix it since the average person might find it to difficult unless they have experience in formatting hard drives.
Worst case scenario is if you don’t see the LED light flashing in the front of your computer case, this means your hard drive has not activity which basically means it is a mechanical problem. A mechanical problem in your hard drive can be fixed, but I imagine it is pretty expensive. It is cheaper to get a new hard drive then to fix it, but of course if you have important data stored on the broken hard drive that you must get back, then you really have no choice but to have a professional fix it. You local computer store should have the expertise to repair it, but if not just ask them who can.
I should point out also though, that advanced hardware and software standards in today’s hard drives tell you when your drive is about to crash and gives you time to back up your important files.
Overall, the best way to stop your hard drive from crashing is to not neglect it and take care of it. The most important care tip is to make sure you defragment your hard drive at least once a month. Your operating system should come with a defragmenting program that is easy to use. Performing a defragment on your hard drive basically takes your data and organizes it into more convenient places so that the mechanical arm can access data faster and with the least amount of movement.
Another way to protect your hard drive from crashes is to purchase a good virus scanner, preferably by McAfee or Norton, and keep protection tools enabled and perform a full system scan of every file on your hard drive once a month.
Some other minor precautions that you can take are to enforce a SPAM guard on your emails and delete your temporary internet files every once in awhile. You should also keep your operating system up to date by downloading updates for it as soon as they come out. Windows makes this easy, but I am not sure how easy other operating systems make this or if they even provide this option.
If you are a person who downloads a lot of files from the internet, then you need to exercise caution in what you choose to download, as hard drive crashes are commonly associated with faulty software from unknown sources on the net.
Of course the best way to save you a headache if a hard drive crash happens is to back up your data regularly. Data loss is the reason a hard drive crash is so hurtful, so if you back up your data daily or whenever you work on it, then if a crash happens you will have no sweat on your back. I recommend you save your files to a rewritable CD/DVD or floppy disc as soon as you get done working on it, especially if the data is business related.

Working With the Registry

The Registry is the central database for everything about your computer. It stores configuration information about the operating system, hardware, software, and types of files on the computer.
The registry database consists of "keys" and "values". A key is a "place" to store a value. A key may store many values, or it may have subkeys, each which store values. The Windows 2000 registry has five top level keys as listed below.
HKEY_LOCAL_MACHINE Hardware configurations
HKEY_CURRENT_CONFIG Operating system settings
HKEY_CLASSES_ROOT Files types and software objects
HKEY_USERS All users configurations
HKEY_CURRENT_USER Currently logged in user configurations
The Registry is normally modified through Administrative or Control Panel utilities, but it is possible to edit the Registry directly. Making an incorrect modification to the Registry can cause your computer to fail to start, so it's wise to backup the Registry before making any changes.
To backup the registry, you can export it to an ASCII file with the .reg extension. You can export the Whole Registry or just a branch of the Registry. First select or create a folder where you would like to save the exported registry. To export the Registry, open the Registry Editor program by selecting Start | Run and typing regedit in the Run dialog box.
In the Registry Editor programs "Registry" menu, select "Export Registry File..." In The "Export Registry File" dialog box, navigate to the folder where you would like to save the exported registry. Then enter a name for the exported registry file (for example reg_date). Make sure the "Save as type:" drop down list has "Registration Files" selected. This will automatically add the .reg extension to the file. In the "Export Range" section, set the "All" radio button. Then click on the "Save" button.
If you export the entire registry, the .reg file will be quite large, between 20MB and 30MB. You might want to export just a specific branch of the registry. To export a branch, highlight the branch in the left pane of the Registry before selecting "Export Registry File..." in the Registry Editor programs "Registry" menu. In the "Export Range" section, make sure the "Selected branch" radio button is set.
One reason to export a Registry file is to be able use a text editor to search it. The Registry Editor prgram has a "Find..." function in the "Edit menu, but it's more difficult to use.
- Don't double-click the file to open it in a text editor, as the default action for a file with the .reg extension is to merge it back into the Registry.
- Before you edit the registry file, make a backup copy.
Right-click on the file and select "Open with..." in the popup menu, or drag and drop the file to Notepad or Wordpad. Then use the capabilities of the text editor to search and edit the exported registry branch.
After you have completed editing the file, you can import it back into the Registry by selecting "Import Registry File" in the Registry Editor program's "Registry" menu, or by double-clicking on the file name.
The Registry is normally modified through Administrative or Control Panel utilities, but by using the method described in this article it is possible to safely edit the Registry directly.
Copyright(C) 2004 Bucaro TecHelp.
Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

Harmful Viruses And Other Malwares In Computers

A computer virus is often termed ‘malware’ because it is a type of malicious software. Other types of malware are worms and Trojans. Let’s take a look at each of these below.
Viruses

A virus usually arrives onto your computer hidden inside of another program which is often delivered by email attachments. It derives its name from the fact that just like a living virus, it needs a host to live and breed on. When you run the infected host program, you then launch the virus into the memory of your computer where it sets up home and waits to go about it’s intended function of destroying your files and infecting other computers.

Once the virus has infected your computer it waits for the programmed trigger to signal it into action. The trigger coded into the virus and can be anything from a specific date to a set number of times it has replicated itself.

Once triggered, it goes about the destruction it was designed for. It may be a simple deletion of files or pranks. It could also be programmed to destroy your operating system.

Viruses are commonly spread on email attachments. This is why you should never open an attachment unless you know who it was from. The problem is that sometimes it can appear as if a virus is just an attachment from someone in your address book, so always be on alert when you get an email with an attachment on it particularly if it is an .exe file.

Worms

Worms work a lot like viruses do. They are also self replicating and can reproduce so fast that they can overload and shut down entire systems. The difference between a virus and a worm is that the worm doesn’t require a host to live on. A worm is stand alone malware. They also usually hitch their way onto your computer through email but don’t need an attachment to ride on.

Trojans aka Trojan horses

Trojans take their name from the classic Greek story for they misrepresent themselves as well. They often pretend to be something they are not. Trojans are not self reproducing like worms and viruses but they can do just as much damage. They hide on other programs and record your keystrokes and steal passwords and credit card numbers.

Fighting malware

It is important to stay up to date with the latest methods being used to combat malware. Your computer can be destroyed by one of these nasty computer programs or your credit card and other personal information can be compromised. For starters it is a good idea to not open email attachments to reduce your risk of picking up a virus. Use a good virus detecting program and firewall to keep the pesky bugs out of your system.

How To Scan and Fix Registry with Registry Cleaner?

Whenever you use your PC, it either reads or inserts entry onto a particular spot in its system. Overtime, this process can accumulate and cause some problems which are hard to ignore. It's because of this why you regularly have to scan and fix registry of your PC using related cleaner software. Continue reading to learn more about this. I will also be discussing a top quality registry cleaner software that speed up my PC quickly.

The computer has to remember a lot of things - hardware attached, selected system options, applications around, etc. Each time you use it, it has to go through all of these entries. However, there may also be invalid, missing or double entries. Such can be caused by anything from removing a hardware previously attached, to deleting a file or program.

When such happens, you will notice that the PC will begin to work a lot slower than before. Although it goes through all these entries in a very fast manner, still it may take some time if there's too much to read. Eventually, you will also notice certain programs will refuse to run, and system crashes will surface more frequently.

Of course you can always take your computer to an expert to have all unnecessary entries removed. However, it may come with a steep price tag. What's more, it's supposed to be done periodically to keep your computer in tip-top shape. Doing it on your own is definitely not recommendable, as you can even cause some irreversible damages.

What you can do is to install and run registry cleaner software. This will automatically examine each of the entries made from day one. It removes safely and effectively those which are already invalid, missing or were recorded twice. This is a much safer way for you to do so, instead of attempting to manually remove entries which can cause the PC problems.

You may scan and fix registry using free software you may find online. In downloading them, carefully read the system requirements so you're installing something that will work best for your computer. Also, see to it you get one from a reputable website. There are also those which you may purchase, often with other useful tools. I personally managed to clean up my computer by downloading high quality registry cleaner software.
 

Backlinks

Followers

Visitors stats

Support : Softwares And Tips | Best PTC Sites | Free Premium Accounts
Copyright © 2013. Softwares And Tips - All Rights Reserved
Template Modify by Best PTC Sites
Proudly powered by Blogger