Free Computer Info, Tip, Tweak and Trick, Make An Improvement And Optimizing User Knowledge About Computer
So far my experience with Google Chrome has been fantastic, but there was one thing for which I was searching around and that was Home button in the toolbar. By default Google Chrome doesn’t show home button in your toolbar, however, you can add it easily. Let me tell u how.
1) Open Google Chrome browser.
2) Click on the customize button in the upper right side of the toolbar and then choose Options.
3) Now in the Basic settings tab check Show Home button on toolbar checkbox.
4) Click Close button and that’s it, your Home button will be added in the toolbar.
ere are some quick solutions to squeeze the most out of your Windows
But first.
1) Do NOT compress the hard drive. It will slow everything down.
2) Do NOT defrag. it's windows version of a placebo.
On with the show
1) Turn off hibernation
Goto control panel, power options, hibernate, then uncheck hibernate
savings of up to 2 GB
2) switch from Adobe reader to foxit reader (free, google it out)
savings: of up to 50mb
3) Erase your browsing history (IE)
Goto control panel, internet options then check Delete browsing history...
savings: depends on how much you browse
There are Different Types of Computer Viruses could be classified in (origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack) etc. Let us have a look at them...
Computer Virus is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.
Examples include: Randex, CMJ, Meve, and MrKlunky
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.
Examples of boot viruses include: Polyboot.B, AntiEXE
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.
Once infected it becomes impossible to locate the original files.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.
Companion Viruses
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
Some examples include: Stator, Asimov.1539, and Terrax.106
FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
Worms
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson
Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.
Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.
Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.
Halo, Half-Life 2, Call of Duty 4, and Crysis are all amazing games. They also cost a lot of money. If you are looking for some mindless shooting fun that won’t drain your budget, you may find some good entertainment in a flash arcade. These have been around for awhile and I’m sure that you know about them. They may not be the most advanced game around, but they are free and usually good for some fun. This isn’t always true though, especially if you keep getting wasted after a few minutes of play. If you want to play your shooters like a star, you should follow these basic ideas.
First, you really need to stay somewhat alert. A shooter is a pretty demanding game. You don’t want your last ten minutes of play to go down the tubes just because you were distracted by some cool popup (hey…it happens to the best of us). So, try to be somewhat focused if you actually want to play. If you can’t pay attention for ten minutes of alien killing then you should probably step away from the computer, you’ve been on it too long. Specifically, you have to be able to focus in on your targets and have the reaction time to make the shots. Distractions cause you to get shot and lose health, which makes the whole experience more frustrating. Just keeping your eye on the screen and staying alert can make the difference between losing and winning.
Second, you really need to remember all of the little extras that each shooter will probably have. Most good shooters aren’t just one weapon ordeals. You can at least switch weapons or take cover to save health and kill the bad guys faster. While you’re playing a flash game, you may forget this, but remembering all of your options makes things a lot better. There’s no reason to lose half of your health taking on five enemies when you can just throw a grenade and be done with it.
Third, you must stay reloaded. Having to reload in the middle of a firefight is often a deadly mistake. Almost every shooter gives you the option to reload while you’re relatively in the clear. Take your moments of peace to reload your gun and get ready for the next fight. You should also keep a close eye on your ammo while doing this. It may be fun to do spray and pray tactics in a flash game, but you’ll put yourself at a severe disadvantage if you don’t find an ammo pickup.
Finally, aim when you can. This means exactly what it means. Go for headshots and weak spots when possible, but you are not a sniper. You don’t have to shot every enemy in the head. Go for the headshot if you’re not under much fire, but if you are in a tough situation you need to just aim in their general direction and try to stagger them with a shot.
Take these words as you will and put them to good use against aliens, mobsters, terrorists, or clowns in your favorite flash shooter.
There are times, when your system starts acting weird and suddenly in a blink all your work is gone. That is because most of us keep our data/file/documents in My Documents just because its the default place where everything you download from internet goes in.
There is one simple way by which you can avoid such scenario.
1. Right click on My Documents
2. Choose Properties
3. Now Choose Move from the three options that crop up.
4. Now browse to drive D: or anyother drive that you like to move to and create a folder My Documents. Otherwise all the documents will get stored on the root directory.
5. Click on apply and ok.
Voila now, you don't have to worry about your data or documents any more. Its the easiest method for securing your data even if the OS goes Kaput. All your have to do is repeat the step mentioned above and you are up and working again.
Please do let me know if it proves useful to you.
Windows Error Codes
Inrease your internet speed by another tricks
Follow the step:-
Go to desktop
My Computer - (right click on)->properties->
Device Manager->
Now u see a window of Device Manager then
go to Ports->
communication port (double click on it and open)
After open u can see Communication Port Properties->
go the Port Setting->
and now incrase your "Bits per second" to 128000 and "Flow Control" change to Hardware
Apply and see result
Rename multiple files simultaneously
In windows XP explorer, you can rename multiple files at the same time simply by highlighting all the files you wish to change, right clicking one of them and selecting 'rename.' Once you have done this, all the files will share the same name with a number in brackets differentiating them.
Hosting online games through the Windows XP firewall
If you are using the Windows XP firewall and you wish to host an online game such as Quake 3, or other applications that require users on the Internet to contact your computer directly, you will need to customize your firewall slightly to allow these specific communications through. Fortunately the XP firewall makes these changes fairly easy to do. To customize your firewall: Go to 'start\control panel\network connections'. Right click on the network connection that has the firewall enabled and go to 'properties.' Choose the 'settings' button at the bottom. On the 'services' tab, click the 'add' button.
This window will add the application that you are using to the firewall's list of data that is allowed into your computer. You will need to find out the port that your application uses. This information should be available from the documentation or from the software manufacturer's website. Input a description for your convenience, then the computer name or IP address of the computer that is hosting the program, then put the port number that the program uses. Note that as long as the program is running on the computer that uses the XP firewall, the internal and external port will be the same. Click 'ok' to apply the rule. Your firewall will now allow connections through the port you specified.
Clean out the prefetch folder
Windows XP uses a system called 'prefetch' to organize and preload some of the data necessary for commonly used applications and files. A folder called prefetch is used to store the information the operating system needs to carry out this operation. After several months of use, the prefetch folder may become quite overloaded with older references to software and files that may no longer be in use.
It's a good idea to manually empty the older files out of the prefetch folder every few months or so. To do this: Navigate to 'c:\windows\prefetch' and delete all .PF files that are older than a week or two.
Set priority for individual programs
If you regularly multi-task while you are working at your computer, but some of the applications you use require more horsepower than others to work effectively (for example using Adobe Photoshop along with Word or other less demanding programs), you may want to consider setting a custom priority for the high-demand applications. Priority is how the operating system determines how to share the processor time among applications. Most applications default to the 'normal' priority, so by setting your high demand application higher, you can increase its performance when multitasking. To do this: Load the program you wish to change the priority for and press CTRL+ALT+DEL to bring up the Task Manager. Select the applications tab and highlight your program. Right click the program and select 'go to process.' Now right click on the highlighted process and choose 'set priority.'
The higher you set the priority above normal, the more CPU time the program will steal from other applications when you are multitasking.
Cleaning up unwanted startup programs
Many freeware and commercial software programs have a habit of setting themselves up to run automatically upon Windows startup. This can contribute to the gradual decline in startup speed that most Windows XP systems (and windows PCs in general) experience. Also, having programs that you only use selectively, or not at all, load automatically is a waste of system resources that could be better used for other things.
To top it off, many internet nasties such as spyware programs, viruses and Trojan horses will install themselves into one of the automatic start locations on your system in order to make sure that they are run on startup. So the point is, take a look at what is currently running every time you load your PC, and disable what you don't need or can't identify.
To do this: The first place you should go is 'start\programs\startup' which is a directory Windows XP uses to launch application shortcuts on boot-up. If you remove the shortcuts from this directory, the applications will not load on startup. This directory can also be a repository for various badness such as spyware and virus software, so if there are files here which are not shortcuts and you don't recognize them, you may wish to consider removing them anyways, as Windows will not place critical files in this directory.
The next location for removing unnecessary startup files is the handy MSCONFIG utility that has been resurrected from the graveyard of Windows 9x especially for XP. Go to 'start\run' and type 'msconfig' to access the utility. The 'startup' tab in MSCONFIG provides access to several other applications that are started at boot up and are running in the background. By examining their Filenames and irectories, you should be able to get a feeling for what is necessary and what is not. Be aware than several viruses and worms have a habit of disguising themselves with authoritative sounding Windows system file names,such as win32.spybot.worm present in the above screenshot as MSCONFIG32.EXE. Leave these for now if you are not sure. The other method for removing these programs is through the programs themselves, as many applications, for example MSN messenger, contain the option to remove the software from startup.
Compressing files and folders to save space
Windows XP includes a built in compression utility which can save you some valuable space on your hard disk by archiving little used files. Working similarly to compression programs such as PKZIP and WINRAR, the built in software reduces the space your files take up on the disk at the penalty of increased disk access time for the compressed files in question. There are several ways of compressing data on your system: If you have a pre-existing folder and would like to compress everything in it, right click on the folder, select 'properties' then the 'advanced' button at the bottom. In the 'compress or encrypt attributes' section, check the 'compress contents to save disk space' option.
If you wish to create a compressed folder for a file or folder separate from the one it is in now, right click on the item you wish to compress and choose 'send to\compressed (zipped) folder.' This will create a new compressed folder in the same location as the original file or folder.
Open explorer window from current command prompt directory
There is a built in command prompt ('start\run' then type 'cmd') command that will open a Windows Explorer window to your exact current directory location in the DOS-oriented command prompt. Simply type 'Start .' from the prompt to open up explorer in that location. And yes, that is 'start(space).
Using Quick Edit in the Command Prompt
The Quick Edit function allows you to cut and paste text to and from the command prompt window, something which you may have become used to not being able to do. To activate Quick Edit: Open a command prompt Window ('start\run' and type 'cmd'). Right click on the toolbar at the top and select 'properties.' Put a checkmark in the Quick Edit mode box. When prompted, opt to apply changes to all similar windows. Now that Quick Edit is enabled in the command prompt, you can click and drag to highlight text, then press ENTER to copy it to the clipboard. To paste text from the clipboard, simply right click on the command prompt window.
Select 'No to all' when copying files
Have you ever noticed that Windows XP gives you the 'yes to all' option in its file copy dialog box, useful if you would like to overwrite files in a directory with newer files of the same name from another location, for example, but fails to offer a 'no to all' option for doing the opposite. Kind of annoying if you think about it. What if you have a lengthy file copy operation partially finished, and wish to restart it? If you use the default options, you essentially have to recopy every file, since saying 'no' to each and every duplicate file will take just as long, and cause your mouse finger to fall off. Fortunately, there is a way to tell your computer not to copy all duplicated files with a single command:
To do this, when the file copy dialog box appears asking you whether you wish to overwrite the first file, hold down SHIFT and click 'no.' This will automatically answer no for all following files. Note that it will ask you again for the first folder it encounters, so follow the procedure again to answer no automatically for all folders. This will dramatically speed up the file copying process.
ACCESS YOUR DESKTOP ICONS FROM YOUR TASKBAR
Do you ever want to access your desktop, or shortcut icons on your desktop when your screen is cluttered with windows which you don't want to minimize?
A simple solution. Place a shortcut to your desktop atop your START Menu. Here's how:
1) Right click on your TASKBAR and choose PROPERTIES.
2) Select the START MENU PROGRAMS tab, then the ADVANCED button.
3) In the right panel, under the PROGRAMS folder, you will see any shortcuts you have already placed atop your START menu. Right click here in the white space here and choose NEW, then SHORTCUT.
4. In the command line for your shortcut, type c:\windows\desktop (If your Windows directory has another name, substitute that name for windows).
5. Click NEXT. Then in the name box, name your shortcut Desktop.
6. Click the FINISH button.
7. Close the Explorer window, then click ok in TASKBAR PROPERTIES.
8. Now, open START on your taskbar. VOILA! Your desktop folder icon should be visible. Click it to open your desktop folder.
Success!
You will now be able to view and access your desktop shortcut icons (not non-shortcut icons). If you want ALL desktop icons to be visible (Recycle Bin, My Computer etc.), you will need to place shortcuts to these other icons on your desktop.
Hint:
If you normally hide your taskbar, so that it is not always on top of other windows, you can access it at any time from any program by pressing and holding control, then pressing escape (the ESC key at top left of your keyboard). You may then quickly choose your desktop folder and access desktop icons as well as any other programs accessible via your taskbar and programs menu.
OPEN ANY NEW DOCUMENT FROM YOUR DESKTOP
(Associate files with programs)
Yes, we can teach you how to edit your Windows registry in order to add any new document to your desktop - and in a future tip, we will!
But the easiest way to add any new document to your desktop, whether
or not it is listed in your NEW menu is to simply:
1) Right click on your desktop and choose NEW.
2) Choose TEXT document (assuming it is listed there, and associated with Notepad or the equivalent). Otherwise, choose any kind of document included in your NEW menu.
3) Retype the name by clicking inside the name box and typing OR by right clicking the icon, selecting RENAME, the typing. Type in a document name, and the extension for the kind of document you
wish to open (e.g. .doc for Microsoft Word).
NOTE: The above tip assumes that you have associated this document
with a particular program on your computer. If not:
1) In MY COMPUTER, select view, options, then the FILE TYPES tab.
2) Choose NEW TYPE.
3) In the DESCRIPTION box, type a name for the kind of document or file you are associating (e.g. Adobe Acrobat file)
4) In the ASSOCIATED EXTENSION field, type the extension of the kind of file in question (e.g. pdf).
5) Below the ACTIONS field, choose NEW.
6) Type OPEN (in capitals).
7) Using the BROWSE button, browse to find the executable program (usually ending with .exe, in the primary directory for the program) of the software which will open this particular file type. Select it. Click ok or close until you've exited all your open screens.
8) Now your document type is associated. When you type in the extension on a file you create from the desktop and then double click on the icon, Windows will open its program.
OPEN EXPLORER RATHER THAN MY COMPUTER TO VIEW FILES
(This is a great tip!! One of the most useful customizations...)
Have you created drive icons for your hard drives and floppy drives on your desktop
If so, you may wish that they opened in the two-paned Explorer view, rather than in My Computer.
To change the default view to Explorer:
1) Open Explorer (from Start, Programs, Explorer, or if you have created it, from the Explorer icon on your desktop).
2) Choose the View, Options menu.
3) Select the File Types tab.
4). Under registered file types, double click on FOLDER.
5) From the list of actions, select explore.
6) Click on the SET DEFAULT button at bottom right!
Now when you double click on a folder or open a drive icon shortcut Explorer will open instead of My Computer.
Bypass the recycle bin when deleting a file
If you do not wish a file or folder you are deleting (or a group of files or folders) to end up in the recycle bin, for security or privacy reasons, there is a simple keyboard shortcut to avoid it.
To bypass the recycle bin when deleting a file, press and hold the SHIFT key as you press delete or select the delete command from the menu. You will see a request for confirmation, and once you say 'yes' the files will be permanently deleted, and absolutely non-restorable from Windows.
Create a link to shutdown your PC
To create a useful link desktop link to shutdown or restart your PC, follow these directions: Right click on an empty area of your desktop, then select 'new' and 'shortcut' to open the new shortcut wizard. When prompted for the location of the shortcut, enter 'SHUTDOWN -s -t 01' to shutdown the system or 'SHUTDOWN -r -t 01' to restart the system. Name the shortcut and give it an appropriate icon from the '%SystemRoot%\system32\SHELL32.dll' location.