Tuesday, July 31, 2012

0 Hibernate your PC



Fact: I never Shut Down my PC. Ops, does that mean my PC is on 24 hours non-stop? Not at all! If I let it Onn all day, I would be contributing to the waste of electricity.

I do not Shut Down, but I put my PC in Hibernate mode.

What is the advantage of Hibernate?

Let's say you open multiple applications in Windows, for example Microsoft Word, Firefox, Adobe Photoshop and others. And you do not save more documents in all applications. When you Hibernate your computer, it will be deleted, and you can remove the electrical plug. Right back ON your PC, all the applications are still open, and all you do not save the document again just now! Easy huh. Right ON the PC process is also faster if you Hibernate, compared to Shut Down.

How Hibernate works?

In the event Hibernate, Windows will first store all your data in the Hard Disk. This data remains even if the computer power plug is unplugged. That's why when you right ON the PC, the data is still there. Different from Standby mode, the computer simply put the data in RAM, and this data will be lost if you cut off the supply of electricity.

How To Hibernate PC?
Click Start Menu> Turn Off Computer. At the exit window display, press Shift and Stand By button will change to Hibernate.

You also can set the Sleep button on your keyboard (I personally use this method). Follow the steps in Windows XP:
  1. Right-click on the Desktop and select Properties.
  2. In Display Properties, select the Screen Saver tab.
  3. On the Power Monitor, click the Power button.
  4. In the Power Options Properties, see the Power buttons. In the option "When I press the sleep button on my computer quot;, select Hibernate from the drop-down menu.
  5. Click on the OK button.

Monday, July 30, 2012

0 Some of Ways Getting Hard Disk Recovery



Often if your hard drive can not be used, you go on to say that your hard disk has been damaged 100%. Actually there are still efforts that can be done to save your hard drive before disposing it in the trash.

Hard drive recovery techniques

Follow these tips below all of which have been proven effective. Methods and techniques described are the disk condition was completely paralyzed. In short there is no other way that can be done other than throw it.

freezing technique

The technique I learned when a computer technician, when facing problems such as "data-read error", the solution is to freeze the hard drive overnight. This makes it increasingly unable to read data, but only temporarily. If the data is critical, you need to change the hard disk directly (especially drive failure).

The trick is to wrap the hard drive with a waterproof plastic bag, place it in the refrigerator for about an hour and continue to pray.
Then remove it from the refrigerator and continue to connect the computer and turn on the PC and doing data transfer with as soon as possible before the hard disk temperature is increased.

stamping technique

Among the main reasons why a hard drive difficult to rotate (spin) is because the head (head) was attached to the plate (platter). As a last resort, tapping on a hard drive in a hard place (floor) up to 8 inches by one blow. God willing, it is inevitable 90% of problems can be solved.

Sunday, July 29, 2012

0 Using Internet With Safety



There are many ways to set the security features when using the internet as to encrypt e-mail, file sharing and install shut firewall. These can shake any attempt to smuggle into your personal information on the Internet. Usually invaders do to try to get other access to computers linked to you. You can remove any of your web browsing burden others know where you've gone in the net.

You can hide your PC and you do not want others to know you have sailed on the internet. The reason is to prevent your secrets uncovered eg family vacation plans. Or you also store important information that is assigned to your company.

Here are some tips for Internet Explorer  you will find some similarities with Netscape, Opera, or other versions of browser. 

Do not list yourself

Once you surf the internet and if you will leave your PC for a while make sure that you have decided your web browser to your browsing history before. IE History list is a list of websites you have visited. It is an easy method to recover the website you will ever visit without using Favorites. You can find pages you visited before and History through the Address Bar will list the URLs you've visited.

File History is a two-pronged weapon. Click Tools, Internet Options, and Clear History to remove the list of websites you have visited. This way, we will remove the list of URLs in Address Bar. You can change the number of days or the period of the URL can be stored in History. Reduce the number of days to shorten the life of the URL and increase the number of days to prolong the lifespan of the URL.

If you want to read the History file, click Start, Find, and Files Or Folders. Type in the History of the Named field. In the Look In, click Local Hard Drives. Click Find Now. You will be able to find a file History file in C: \ WINDOWS \ HISTORY. Remove certain parts in this folder Ye will remove any information contained on the Address Bar.

Another good way is to remove the IE cache or Temporary Internet files. IE and other browsers will retain a copy of pages, photos and graphics in the following folder C: \ WINDOWS \ Temporary Internet Files while you browse the web. If you do not it will copy all the contents of the websites you've visited or every time you kungjungi. In the Internet Options General tab, click Delete Files and OK.

Clean up your tracks

Most sites put small files called cookies to your PC. Cookies usually help the website to remember you and any of your personal specifications when you browse certain websites. Anyone can find any information or your web browsing history if they go to C: \ WINDOWS \ COOKIES or C: \ WINDOWS \ Temporary Internet Files.

You can remove any cookies from your folder one by one. An easier way is to close the space for the cookies when you surf the web. In Internet Options, select Security and Custom Level, go to Cookies and click Disable in all related cookies.

These tips are for home users only. If you are using a computer in the office make sure that your network has a good network policy. Now with various threats from the outside world as the internet, companies must ensure that their network safe and not viral

Saturday, July 28, 2012

0 Increase Your PC Performance (For Windows XP)



Typically, most users run the defragmenting process. It aims to re-arrange all the data on your hard drive so that each file are arranged in a disk location and nearby undisturbed. Many system builders and PC technicians taught and still believe that the hard drive is capable of mendefrag maintain PC operating at peak performance. Although this process can help mendefrag old PC, but other factors must also be considered. Today, many new PCs are equipped with hard drives Serial ATA (SATA) or a speed of 7200-RPM (Revolutions Per Minute) or 10,000 RPM can reduce search time and waiting, as well as a cache buffer (buffer) and as much as 8MB. Not forgetting the concept of NTFS (NT File System) XP efficient enough. So, the PC is able to feature improved performance.

However, the process is still considered necessary mendefrag. The reason, the power consumption and heat may be directly related to the hard drive fragmented. If the data file does not close when you ask the OS data, the search process may need more time. But more importantly, if the disk fails. If it happens, the chances of data can be recovered from a failed hard drive or damaged to get better if the data is nearby. The reverse is if they are scattered randomly.

Some effective techniques

In addition to mendefrag process to improve the performance of XP, are reproduced below some other means can be used. Each of the following ways can improve the performance of your PC.

Be sure XP use NTFS concept.
If you are not sure, check first. To do so, double click on the My Computer icon, right-click the drive C:, then select Properties. Next, check the File System type. If it says FAT32, please keep your important data. Then, click the Start menu, Run, type CMD, and click OK. On display 'prompt', type CONVERT C: / FS: NTFS and press the Enter key. This process may take some time. So, make sure the PC is not disturbed and virus free. File system used by the bootable drive is FAT32 or NTFS. You choose NTFS recommended for higher security, reliability, and efficiency with large hard drives.

Turn off file indexing service.
Services will extract information from documents and other files on the hard drive and creates a "Searchable keyword index." Most people do not need this service, especially in the corporate environment pengguan involving many thousands of documents in the server computer. If it is not necessary, it can be turned off. To do so, double click on the My Computer icon, then right-click the drive C: and select Properties. Do not mark the option "Allow Indexing Service to index this disk for fast file searching." Next, change the option to "C: subfolders and files," and click OK. If there is a warning or error message appears (such as "Access id denied"), click the Ignore All button.

Empty the Windows prefetch folder.
Please empty the folder (data safe and frequently used applications) every three non-or more. Prefetch can make the process faster loading when needed users, but from time to time, this folder may be filled reference files and applications no longer required. In effect, XP need more time, and slow system performance because the reference should be loaded. Contents of this folder is not critical even deleted everything. So kandungananya in C: WINDOWSPrefetch can be deleted manually or using software.

Enable DMA.
Start by opening the Device Manager window. Then double-click on the device IDE ATA / ATAPI Controllers, and ensure that DMA is enabled for each drive connected to the Primary and Secondary controller. Do this by double-click on Primary IDE Channel and click Advanced Settings category. Make sure the Transfer Mode is set to "DMA if available" for Device 0 and Device 1. Repeat the same process on the Secondary IDE Channel anyway. See Figure 5.

Get rid of all the spyware on PCs.
This removal process can be done using free programs such as AdAware by Lavasoft or Spybot Search & Destroy. Once the program is installed, be sure to check and download updates files before starting the scanning process. The goal, which was found later that spyware can be removed. Usually, free software that requires spyware to operate fails after the spyware was removed.

Remove any programs and / or unnecessary items from Windows Startup routine using the msconfig utility.
To do so, click the Start menu, Run, type msconfig, and click OK. Click the Startup category, then uncheck items you do not want to start when starting Windows. If you are not sure the item can be selected, visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations about. You can also identify itself with a track based on the file name using Google or other web search engines.

Turn off unnecessary animations, and disable the 'active desktop'.
To get optimal performance, you can turn off all animations. XP also offers a number of different settings in this case. To do so, click on the System icon in the Control Panel. Next, click the Advanced category. Select the Settings button under Performance. Here you are free to choose the options available, as your changes will not alter the reliability of your PC - but the only reaction.

Do not divide (partition) drives.
XP NTFS file system operate more efficiently on one large partition berkapsiti. Data is not necessarily safer on a separate partition and reformat does not necessarily need to reinstall the OS. If you can use a partition, you can also use the folder. For example, if you put data on 'Drive D:', then you can also create a folder called "Drive D:". You will receive the same benefit of the organization as a separate partition, but without affecting system performance. In addition, the free space is not limited to the size of the partition. It is only limited by the size of the entire hard drive. This means you do not need to change any size. This task usually takes time and can affect the data.

Check the memory system to ensure that it operates properly.
You can also use a free program called MemTest86. It can make a bootable CD or diskette (if you want), which will run 10 extensive tests on the PC's memory automatically after you boot from the disk you created. If the program is having problems, turn off the PC and unplug the power cable. Remove the piece of memory (assuming more than one), and run the test again.

Open a separate window.
If you have problems Windows Explorer window that often interfere with and affect the performance of the OS, try the following steps. Open My Computer, click Tools, then Folder Options. Then click on the View category. Scroll down until you find the option "Launch folder windows in a Separate process". Check this option. You need to reboot the PC to enable this option enabled. Note the disturbance it would be resolved.

Friday, July 27, 2012

0 Easy Way Find Specific Information Using Google


You want to find specific information in a website. For example here, you want to look for tips only in pcdotcom.my As we all know a website containing lots of information and to save our time, this method can be tried.

The trick is to type in laptop tips site: mycomp2u.blogspot.com on google search engine, information that will be displayed is limited to articles related to the tips only.

This method can also be used in the search engine yahoo or any search engine you are using

Thursday, July 26, 2012

0 Tips on Windows XP



Selecting [quick launch toolbar]

For frequently used applications, you should consider placing a shortcut icon on the [quick launch toolbar] located to the right of the [start]. This way you can access it with a single click. For applications that want to access in a single click, you just need to drag and put a shortcut to the application on the [toolbar quick lauch]. To remove a shortcut placed by programs that are not allowed, you just need to right click on an icon on the [quick launch toolbar] and select [delete.]

Sort All Programs on the [Start] menu

If you feel your program folders rather scattered, you can arrange them in alphabetical order. The way is to click [start]> [All Programs]> and [right-click] on any folder or program that is there and select [sort by name]. Do the same on the other folders that want sorted.

Use the combination to Strike

if you make a mistake, you can resign the error. You probably know about the function [undo] this by going to the menu [edit] and click [undo]. You can also use a combination [Ctrl] + [Z] for faster service. For example, if they want to cancel the error change the file name in the window [Windows Explorer]. (Make sure you do not use the combination [Ctrl] + [Z] on the other functions).

"Minimize" right window has been opened 

Fastest technique to shrink all the windows (on the desktop) is opened by pressing [Windows] (there is a Windows logo on it) and then press the [M]. Simple instructions, the [Windows] + [M].

Closing Window And Applications Simultaneously

You can close some windows and applications open at once and hold down the [Ctrl] and then select the window or application on the [Taskbar]. Next, right click on your choice above and select [Close Group].

Getting Through Network Information by ipconfig Utility

Click the [Start]> [Run] and type "cmd." On display "prompt" that appears, type "ipconfig" (without the opening words). It will show basic information such as IP address, subnet mask, and gateway. For additional information such as DHCP and DNS server, type "ipconfig-all" or "ipconfig / all". It will display a more detailed network information.

Placing Task Manager Permanently In The "system tray" (at the side of the clock)

To open Task Manager, you can press the key combination [Ctrl] + [Shift] + [Esc], or by clicking on the combination Ctrl] + [Alt] + [Del], and next click on the Task Manager. But, if you wish to place the Task Manager on a permanent basis in the "system tray", there are 2 ways but I only give one way here. To do that, go to the System32 Directory and create a shortcut for the file taskmgr.exe. Then cut (cut) and paste (paste) shortcut into the folder [Startup] (go to the menu [Start]> [All Programs]> [Startup]. Right click on the [Startup] and click [Open]. Then paste shortcut taskmgr.exe earlier here). Next, right-click the icon in the folder taskmgr.exe [Startup] above and click [Properties]. Under option [Run], please select [Minimized] - this will minimize the Task Manager window.

Wednesday, July 25, 2012

0 Maximize Font On Website



You have difficulty looking at small font in a website? Now your problem definitely solved by using the web browser Mozilla Firefox. The latest version allows you to enlarge the website which will being visited by pressing a key on the keyboard. To enlarge, you only need to press [CTRL] + [+] and to minimize it by pressing [CTRL] + [-]

This way can also be used for other browsers

Tuesday, July 24, 2012

0 Internet Banking Security



Now this trend use internet banking is fast gaining traction in our society. Therefore, precautions should be practiced in internet banking facilities to ensure that your transactions are completely safe run. Several steps should be observed include:
  1. Banks offering internet banking service will not ask customers to disclose or verify your PIN or password for any reason whatsoever, either through email or phone call.
  2. If you receive an email or phone call that asks you doubted your internet banking page open, do not disclose the PIN or password in whatever circumstances, and you should contact your bank immediately.
  3. Before carrying out any banking transactions online, you need to ensure that the internet banking website is official and authentic as well start with the URL "https".
  4. Always keep your computer's antivirus program is updated. Do not enter your internet banking account on a computer in a cybercafe or a computer that is not protected by antivirus system.
  5. Do not save login ID or password in the computer.
  6. Change your password regularly and do not use a password that is easily guessed by others.
  7. Do not leave your computer when you enter internet banking website.
  8. Always remember to get out of the site completely when it is resolving the matter and clear the memory sites that have been visited.
  9. Check your account regularly.

Monday, July 23, 2012

0 Test Your Internet Speed ​​Line



To broadband users and fixline (Streamyx / Unifi), have you check the status of your internet line speed. Here I want to share a special website for us to check our internet line speed. It is important for us to test ur internet speed. Not what we takut2 fooled by packages that we already subscribe to that.

Examples of download speed that you select in the package is 1MB if you check the website you will find the actual download speed that is less than 1MB all, but do not worry its not you cheated because even though we select tu yg package is 1MB, speed will we get on most of the time that can not be filled.

This all depends on the time we use the internet. Try to check the speed during the day and night. You'll find the speed you get is not the same self which, in the evening you will be able to access more than one day ..

Let's check the speed INTERNET here http://speedtest.net

Sunday, July 22, 2012

0 How to Fix a Wet Keyboard

    


 Image Source: www.thecollaredsheep.com

     Laptops are at a disadvantage when it comes to laptop replacement parts because they aren’t designed to be as robustly upgradeable as desktops. This fact is practically a given when talking about integral system components like CPUs, hard drives, and video cards; but this is just as applicable with “outer” laptop parts like batteries, LCD screens, and keyboards. While the outer parts are relatively easier to come by than the inner laptop components, they could still cost you a pretty penny, being that every single laptop part is more often than not custom-made by the computer manufacturer to fit in its laptop and its laptop alone.

     The three aforementioned outer parts are the most commonly reported laptop components which are damaged, as it turns out. Because of the reasons mentioned above, most people would rather just buy a new laptop than have to go through all the trouble of acquiring their required parts through specialized means. Fortunately, there are ways to fix these parts without having to spend a dime. For this article, let’s talk about fixing a wet keyboard.


     The first thing you should do is to turn off your laptop. I know that it sounds silly for me to have to mention it, but believe me when I say that there are a lot of people who neglect this simple step, whether they do it intentionally or otherwise. If neglected, it could pose the problem of having the spilled liquid come into contact with exposed laptop parts and short your computer out.

     After turning your computer off, wipe away the liquid using a small towel. Afterwards, put the towel down on a flat surface (a tabletop, preferably). Lift the laptop up, and ever so gently tilt it to the side to allow the excess water inside the gadget to run off and drain out. Do not do this with violent, jerky motions because doing so could make the liquid inside slosh around further and contact even more laptop parts. Just tilt the computer at an angle and let the liquid pour out onto the towel. Rotate your laptop slowly if need be to really get all that liquid to come out.


     Next, dry off the excess liquid with a hair dryer. Make sure to let the air get in those tight spaces between the keys. Also, make sure to set your hair dryer on “cool,” as a higher temperature could possibly melt all those delicate plastic and silicon components.


     Finally (and this is the hardest part), make sure to wait for a couple of days or so before you start using your laptop again. This is to ensure that every last bit of fluid has dried up by the time you turn on your machine again. This is especially imperative if the liquid spilled on your keyboard is viscous like starchy soups or sugary drinks. After waiting, your laptop should be good to go.
And there you have it: A few simple steps to follow when trying to fix a wet keyboard. Not only were you able to fix your laptop, but you also learned something new, and saved half a hundred bucks to boot.



0 Automatically Turn Off The Monitor While Continuing Download



For those who love to download movies or any file from the internet, you can let the computer is on at night to download movies / files using additional applications to download files. But the glare of the monitor is not good for health

So you can set so that the monitor automatically deleted and let the download progress.
To make this setting, open the Control Panel and look for "Edit power plan". Or if you are using a laptop you can click on the battery icon on the Taskbar, and select "Power Options", then select "Change plan settings".

In the next window, change the settings to suit. As in the example that I set up, I set the "Turn off the display" to 5 minutes. Make sure the "Put the computer to sleep" placed on the 'Never' because you still want to let the download progress.

Tuesday, July 17, 2012

0 Restart Windows When Mouse Fail Works



Sometimes when there is a glitch in the windows, the mouse was not working. you have to use the keyboard to restart windows. do this:

Win key or Ctrl + Esc to start the Start menu.
After that press U to select the Shutdown command. (For windows xp) or use the right arrow key (for Windows 7).
use the arrow keys up / down to select the Restart.
press the enter key to continue.
if you have not saved the document file is opened, Windows will remove the instructions for your first save. press the Enter key to save the file unsaved document.
sometimes when restarting, the computer take too long to work again. To make sure windows is repairing itself, see the hard disk indicator light. if the flashing lights mean the computer still works and if does not go on or stay on, most likely your computer has hang.

You have to be patient because when Restart your computer may take longer than usual due to windows trying to find the problem and fix itself.

Monday, July 16, 2012

0 Simple Tips: Computer Care (Preventive Maintenance)


Computer like any other electronic equipment requires care. We used to listen to "Prevent IS BETTER THEN CURE" or "PREVENTION IS BETTER THAN CURE". 

Do not take for granted things like this. spend some time at their own once a week to do this preventive maintenance. one of the methods was scandisk and defragmentation and disk cleanup.

Sunday, July 15, 2012

0 Ready To Upgrades Laptop



Here is the Articles You Need to Know Before Upgrading Laptop


1. APPLICATIONS
Prior to upgrade your laptop to find out the specs first. This information can be found in Control Panel - System. You can also use additional applications such as DriverMax to identify the device and the specifications of your laptop.


2. EQUIPMENT
When you want to upgrade the memory (RAM) and hard drive (hard disk). You must have the appropriate screwdriver to open the cap Said Hard Disk space and RAM are. There are some laptops that require you to open the casing to change the device. Make sure the Hard Disk and RAM type is either IDE or SATA for hardisk and DDR2 or DDR3 for RAM.


3.STORAN
You can make the thumbdrive as a place to store the BIOS file or device drivers. To make the Windows 7 installer, 4GB thumbdrive more appropriate size or can also be used as a fitted Boot Disk Hiren's BootCD system. Manakal thumbdrive more appropriate size for posting large files to be installed applications.


4.WINDOWS
If you are using Windows XP system you can upgrade to Windows 7 if your laptop specifications meet the minimum requirements of Windows 7. As a precaution you can copy the original windows DVD DVD Duplication or the thumbdrive.


5.FAIL DRIVER
Each newly purchased laptop included CD drivers for the device in it like chipset, display, sound and so on. The file might be bad after a few years of use and should be updated. select the driver but do not select the new version is still in the trial period (BETA).


6. FILE BIOS
As well as device drivers, BIOS software on the laptop can also update if necessary. You need to update the BIOS if you want to change the storage Hard Disk Drive (HDD) to Solid State Drive (SSD). You can update the BIOS on the website this laptop that you use that. Reminders also if you want to update this BIOS should be careful to follow the instructions given.


7.CAKERA BOOT
Preparation before upgrade Boot Disk is a precaution. You can set up Boot disk with CD, DVD or thumbdrive that comes with Hiren's BootCD example system loaded with various useful applications of this system but also can access the internet if the windows on the laptop is damaged or infected with a virus.

Saturday, July 14, 2012

0 E-Mail Junk Or Spam



One of the Internet material that can enter the computer is unsolicited junk email or spam. Users may be aware of this junk email may include an offer 'interesting', such as insurance, discount products, and other materials that have never thought of. Although, this activity is difficult to be eliminated, but can still be prevented interference with the following steps:

1. Respond to junk email, enabling advertisers to know that you are the main target of junk email more. Advertisers who send spam in text format no way to know whether the recipient to open and read their messages or otherwise, except their own to respond. When an HTML message is opened, the message from the server code pebghantar attract spam, so mark your email address as active.

2. Even more security, delete junk messages in the in-box without opening it. If Outlook, Outlook Express, or Netscape use, turn off the preview pane ', so that spam code HTML is not pulled when the message is opened. To reactivate it in Outlook, go to the View menu and click the Preview Pane. In Outlook Express, select View, Layout, and do not check Show Preview Pane. In Netscape, click the arrow on the pane and the preview of disappearing.

3. Use several e-mail addresses can release from the main in-box spam. Some ISPs provide between 5 to 7 e-mail accounts, as well as e-mail service free of charge on the Web. Users can register additional addresses in the base, then direct e-mail program that shifts accept e-mails in all accounts simultaneously. If additional email ISP does not want to go to waste, use free Web-based account such as Hotmail or Yahoo!

4. Ownership can release additional address the primary address (checked several times each day, is used for important and almost free message spam). Make it exclusive, secret, known only to the people (friends, partners, and family members). Do not provide your e-mail address in the main Web site, the survey forms, database, or chat rooms. If your primary address is used only for personal and business potential fall into the hands of other people is very small.

5. Sometimes consumers can curb the threat of spam e-mail address if they use a combination of letters and numbers, such as "yourname@hotmail.com." Adding the numbers on the address may cause difficult spammers guess combination with the commonly used name. In fact, e-mail services such as Hotmail and Yahoo! allow you to choose your e-mail in-box to enter it manually in an effort to curb the influx of spam.

6. If you are too late to take steps to protect the primary e-mail address and it continues to be exposed to the threat of spam, it is better to register a new account. Then, you tell your friends and do not disclose it to others. Although the process of exchanging e-mail address is a bit complicate, but the difficulty of this change is temporary. In fact, the new address is usually provided in-box space more organized and enough space for an important message.

7. Prepare also address 'specific' to 'lure spam attack' and alternatives to protect your main address. Use this alternative address when you register at any Web site, enter chat rooms, or posting messages to the discussion list or newsgroup. Although this alternative address provided to junk email, but it should be checked occasionally to delete all spam and ensuring e-mail account is always active.

8. If the spam accounts utilized, you can check and see the main account several times a day, while spam may account only once a week. Despite this, the third e-mail address may also be required if the online shopping or subscribe to a newsletter via e-mail. This letter can be stored in the box other than personal email and business. Programs such as Outlook can be set to file the e-mail automatically according to specified address.

9. You can organize e-mail from your shopping and newsletters into a folder, and mailing of spam accounts into other folders. After that, let the remaining e-mail into the in-box. Check or ignore other folders at your convenience. If you only have one email address, message filtering can still be made. For example, e-mail programs such as Outlook and Hotmail can be set to receive a specific address and prevent other address (like spam).

10. Point your e-mail software to automatically delete certain address, or file the e-mail address was not set automatically. E-mail software can also e-mail file automatically into the spam folder if the subject is no word such as 'get rich quick scheme'. In addition, software such as Outlook 2002 can color code messages in the in-box of suspected spam. So, the scanning process can be accelerated and the deletion process is also easy.

Friday, July 13, 2012

0 Delete Files Without Store In RECYCLE BIN



How?

A simple way for you to bypass recycle bin after you delete files. If you really want to delete the absolute file from your computer, you can delete without having to keep them in the Recycle Bin. Is very easy with just two step.

To delete 'file' or 'file group', select the file you want to delete, then press Shift + Delete and click 'Yes'.

Thursday, July 12, 2012

0 Defraggler: Ulitity Software To Defragment The Disk



This software to update your hardisk which is said every time we use the computer there's the impact on permanent storage, especially when we delete or remove the previous files.

Below are the pictures I have used the program. it very clear to show our hardisk conditions and can be distinguished by the use of color. In addition, this process faster and faster compared to the use of available disk defragmenter self.

Wednesday, July 11, 2012

0 Techniques Open A CD / DVD Laptop When 'Off'



Following two situations require that you know how to set up a CD / DVD laptop when your laptop 'off':
Damaged causing you press the button repeatedly remain open.
You forget I want to produce a CD / DVD while the laptop is closed and you want fast.
Consider the CD / DVD of your laptop, there is no small hole there?

Note the CD / DVD players have tiny, tiny hole?

Take a needle or anything that will fit rods to be inserted in the hole. Press to place a CD / DVD open. Next you can take the CD / DVD that is in the normal range then close. Easy is not it? You can try it during an emergency. =)

Tuesday, July 10, 2012

0 Use 2 Monitors For Computers Or Laptop


Now, you do not have to worry budget to buy a larger monitor. Tips that I want to share at this time is dedicated to someone who crave computer screen size larger, especially when working with digital photographs. Than you buy a larger monitor that is certainly cost, maybe you better buy two small monitors and cheap, both bowed and 'connect' right on your pc.

There are many latest desktop now supports dual computer without the need for additional hardware. If you have more than one monitor connector, please see the back of your computer for Video Graphics Array Connector (VGA) or Digital Visual Interface Connector (DVI) or one of them. Your monitor cable Connectkan another at VGA or DVI behind your computer.

To configure the monitor screen, press the monitor and restart the computer. The computer will detect the new monitor connection. Please follow the instructions below (Windows 7):

1. Click Start menu - Control Panel - Display

2. Click Change Display Settings

3. Click the monitor icon labeled 2 and click on Extend this DISPLAYS

4. If necessary, drag the icon monitor. Keep instructed on the same way as the monitors on your desk. Click the button to Identityuntuk determine which monitor 1 and which monitor 2

5. Click Apply and OK to confirm the settings

Have two monitors will revolutionize the way you work with a computer so that they can make you more creative. And for those who have children can also tu ni ways, so it is disturbing our work. 1 we open the story tu monitor your child's favorite cartoon on Youtube or use VCD / DVD.

Monday, July 9, 2012

0 10 Causes of Damaged Computer



Here I list 10 ways consumers ruin their computer so that you are more aware of when using a computer

1. Not use automatic voltage regulators.

This is one action that can damage your computer physically. Many think that the computer is in danger as the storm and lightning, but the reality is what - what's bothering electrical circuit can cause an increase in voltage. Something as simple as opening an electrical equipment connected to the same socket with your computer can cause an increase in voltage.

You can protect your system from voltage increase. This can be done by installing an automatic voltage adjustment or automatic voltage regulators (AVR). To provide better protection, you can get Uninterruble Power Supply or UPS capable of providing continuous power supply for a few minutes if the external power supply cut off to arrive - arrived. This extra time can help you keep all the work you are doing and shut down the computer safely. UPS is definitely more expensive than the AVR's no continuous supply functions.

2. Surf the Internet without firewall protection

Many home computer users to connect a computer to a cable or DSL modem and the phone continued to surf the Internet, without realizing that they are putting their computers at risk of being attacked by viruses, spyware or hackers (hackers). Every computer connected to the Internet must be protected by a software firewall.

Example firewall available in the market are as Kerio or ZONE ALARM, Windows also has an existing firewall that ICF / Windows Firewall. Firewalls are also very useful because if you use the laptop firewall will remain with you if you bring your laptop to places that offer wireless Internet service (wireless). However, only a firewall is not enough, it should be installed and set correctly.

3. Not update the antivirus and anti-spyware

There is no doubt most users do not like antivirus software. It's not a productivity software that we can use to produce various types of working documents. Antivirus programs can also block intended to be carried from functioning properly. You may need to turn to install some software and it should be updated regularly to provide appropriate protection. Antivirus installation also causes the computer to be heavy and slow. Subscription date is very short and you are often asked to pay to continue using it. When a user fails to make payment, antivirus failure and become a detriment to consumers.

However, in the circumstances, you can not leave your computer without antivirus protection. The program - which is detected by antivirus programs - namely, viruses, trojans, worms and the like can lead to more damage and loss of time and money compared to time manage antivirus itself.
Spyware is another growing threat, the program will install itself into your computer (usually without your knowledge) and collect all the data and information about your computer and send it back to the spyware owner. Spyware is the number one computer become slow and sluggish. Most anti-virus software does not detect spyware and therefore it is important to install anti-spyware program that specifically.

4. Installing and Removing Arbitrary Program 

Many consumers are very fond of installing various types of freeware and shareware software downloaded from the Internet. Not least is the purchase of software - software piracy from the shopping center. Some people think more software loaded onto the computer, the more sophisticated and their computer prevailed.

The fact is that more and more software you install, the greater the risk of your computer is infected with viruses or spyware that will damage your system. The risk is greater if the software is downloaded from the website - a website that suspected

More and more software is installed and removed repeatedly will slow down or damage your computer system. Removal does not necessarily remove the software program as a whole and does not remove any viruses and spyware planted by. As a result the performance of your computer is still growing slowly.

You should only install the right software you need. You should also reduce the installation and removal of programs.

5. Keep the hard drive is full.

Among the effects of software installation that is not monitored is that it will fill your hard disk. Every computer comes with a hard drive that has a payload capacity or free space or free space is limited. Each time the software is installed, the file is put in the hard disk. Files meet free disk space. A consequence of this reduced capacity of free disk space. If this is not controlled, sooner - or later your computer will be slow. You should make sure your hard disk free space has not decreased less than 10% of its original capacity. This means that if your hard drive is 200GB, free space should not be allowed to drop below 20GB.

You can use the software "disk defragmenter" that is built into Windows (Programs / Accessories / System Tools) or other software. You can also use the "Disk Cleanup" which are available in Windows to find and clean up files - files that are not needed in your computer and get back the free disk space.

6. Open all attachments.

Most users prefer open attachments sent via e-mail without attachments meghiraukan that the possibility of which contained the virus that can erase all the data contained on the hard disk.
Among the most dangerous attachment is an attachment that has a connection like - exe, cmd and much - much more. Previously, we feel that Microsoft Word files and graphics that are available via e-mail is safe, but unfortunately not anymore. A file like greatfile. Jpg. Exe may supposedly only the graphic image or photo by most users. The fact is that it is a program that may contain viruses, trojans or worms.

7. Click on everything.

If you are the type of person who likes to click all the things that can be clicked, you should stop the habit. This is because the attachments or links are clicked may contain Active X code is a software that can damage your system.

If you pressed the wrong link it may take you to sites containing pornographic usur, piracy and many more can invite trouble for you.

8. Share files

We are taught from childhood that sharing is a good practice. But in the world now, not all types of partnership are good. In cyberspace, share personal information such as name, e-mail address, home address, phone numbers and even worse bank pin numbers and credit card declaration may cause you to be bankrupt! All forms of personal information - including personal documents and files you work - just have to share with you is true - you really believe and there is no need to do so.

Although most types of information "stolen" from the computer actually provided "voluntarily" by the uninformed consumers regarding the security of on-line, but there is also information stolen by hackers or "hackers" without being noticed by the user. The best way to delay of this problem is to install a software firewall. Firewall software can prevent hackers from connecting to your computer and gain access to the information in it.

9. Choosing the wrong password.

This is a frequent mistake. When set password or password for any purpose, do not choose simple passwords such as birthdays, your IC or the name of the beloved. The password should be up to 14 characters long and contain a mixture of letters and numbers. There is no blame you use only one or two password for all purposes - as long as you can remember and it is not easy to guess. Finally, do not so complicated password or "advanced" your own so he could not remember!

10. Not make backup copies files. (Backup file)

Unfortunate odorless. Computer, as well as machine - other machines will one day also damaged. If the loss involves a hard drive, it can cause you to suffer from loss of data or information on a permanent basis. While most users do not generate a lot of data or personal information, but for the few who actively use the computer for work and education, a permanent loss of personal data can be likened to a huge disaster. Computer can be repaired and if necessary replaced with new ones. All software can be refilled from the CD-ROM or downloaded from the Internet. But there is no way for you to retrieve your personal data if it is lost or damaged permanently. In this case only one thing that can save you - personal data is backed up or backup.

Make a backup copy or backup copy files - personal files are aspects of computer use most often ignored - and often consumers have to bear the high cost of this negligence. Previously the process of making backup copies or backups can be costly and take a long time, but now it is so simple. For most users enough equipment thumb drive to load a copy of all personal data. Some users like to use two thumb drives - one as primary storage media and a second as a backup storage media or backup copy.

Sunday, July 8, 2012

0 Determine, Software or Hardware Problem



Sometimes when there is a computer problem, you'll call the supplier for assistance. so before you contact them, let you determine in advance what the cause of your computer breaks down? Hardware (hardware) or software. (software).

The first step is that you try to keep the non-damage. If perkaksan you connect to a computer to function properly. you can assume that the software that controls the hardware fails as expected.

Hardware is any part of the computer that physically exists that can be touched. In terms of software is something that you can not hold, that control your computer.

If your hardware is properly connected to the computer, meaning that the software drivers (device drivers) hardware that you install on the computer working properly. If hardware is not damaged failed to function properly, it is likely you need to update (update) the device driver or device drivers you have installed it in the wrong way or there is a conflict (Conflict) of the device driver.

Saturday, July 7, 2012

0 Surf the Internet With Privacy



Did you know that web browsers (web browser) such as the latest version of Mozilla Firefox and MS Internet Explorer allows us to surf the Internet without leaving a trail, whether history, cache, and cookies?

Mozilla Firefox latest version
More information visit http://en-us.www.mozilla.com/

Sometimes it's nice to go undercover. When this feature is enabled, you will not leave a single browsing fingerprint behind for others to Discover. You're free to slip in and out of private browsing mode QUICKLY, so it's easy to return to what you were doing BEFORE as if nothing ever happened (you're free to browse privately also rates all the time).

Follow STEP 2 below.
1) start a private browsing session

2) confirm

3) confirm if you are visiting any website in normal mode

4) private browsing session

5) visit any website as usual, including the use of search engines

6) end private browsing session

Friday, July 6, 2012

0 Lights Hard Disk Drive or HDD LED



In every computer you'll find some light - a small lamp. Most people know and recognize lighting power (power LED) will light up every time the computer is installed. Lights - These lights provide important signals about what is happening in the computer, so do not ignore this light.

Between the light that is often neglected is the lighting or Hard Disk Drive HDD LED. These lights are often visible flicker - flicker when the computer is used - like heart pulse. Many users ignore this and assume kelipannya light that is normal. But the fact that the HDD light flickering provide important information to consumers regarding computer functions. Take cognizance of the significance of the flashing will help you become more productive users.

Flickering lights actually depicts HDD hard drive activity or Hard Disk Drive (HDD) your computer. Each computer is equipped with at least one - HDD. HDD is the primary computer storage media and store all the information required for the computer to function. Without HDD, the computer will not be commissioned or used.

When information is read or written to the HDD, the lights will flash. Speed ​​describes how busy flickering HDD is working. HDD light blinks faster, more sibuklah it. But what is the connection with you as a consumer?

When the HDD busy working, computers often become slow. In this situation the computer takes longer to respond to typing or mouse clicks through. There are times when you may not see any response on the computer to the instruction given by keyboard or mouse. As a result when the HDD is busy, the computer may seem - if suspended operations or "hang" and many computer users to conclude that they are damaged.

In fact the computer in the aforementioned situation is not damaged but just too busy for a while. What to do in such circumstances is to give the computer time to complete all transactions read and write to the hard disk drive (HDD) last before starting to use it again. When the HDD light stops flashing or blinking only once - only occasionally, you may return to your computer business. You will find the computer more responsive and fun to use.

Therefore beware sentasa your computer HDD lights. Stop using the computer immediately if it becomes too busy. Follow these tips will make your computing more comfortable and productive.

Thursday, July 5, 2012

0 The Most Problems Concern That By Laptop Owners



As you are aware, the use of a laptop or netbook has become a necessity nowadays. but do you know what are the problems most feared by the owners of this laptop. The problem that most dreaded by the owners of this laptop is overheating problem (heat) on the mainboard. This overheating problem is the failure of the cooling system on the CPU Fan mainboard faulty or poorly maintained or never maintained.

The way this is going to solve the problem by using a cooling pad or carry out periodic maintenance to clean the cpu fan once a month. Do not think this thing is not important or not necessary. The most effective method is to clean the cpu fan. If you can make your own is a bonus for you and if you do not know can send it to a computer service shop. Use cooling also not less important. it can help cool the temperature of the laptop.

If not afford to buy a cooling pad tu no way I wanted to share with you. It is very easy, can use mineral water cap. 4 take the lid and place in every corner of your laptop. Put a lid purpose is to provide good ventilation for the cpu fan provides sufficient wind. this concept are the same as the house one night sky fan us that. but this way is only temporarily before you buy the cooling pad.

Wednesday, July 4, 2012

0 DVD / CD ROM Drive or DVD



Ever have trouble CD / DVD can not be read? there is some possibility of this happening. Among them is a CD / DVD has severe scratches, CD / DVD Drive is not in the windows system, CD / DVD drive is dirty, and CD / DVD drives that have been damaged. Before deciding to convert CD / DVD drive the first try this step likely CD / DVD dirve undamaged Cuba actually try test CD / DVD that you want to open it on your PC / Laptop to another. (Which is believed to have no problem apa2 to read CD / DVD tu) If you can read means it CD / DVD drive problems. But do not worry, you can try to clean the CD / DVD drive with a CD Drive Cleaner tu (cd / dvd special for clean and laser lens cleaning liquid) is usually auto run cd and can also be used for your DVD player. if still problem then you can decide to change the CD / DVD drive is.

Nothing to lose and if buying this CD drive cleaner because not only used to clean the cd / dvd drive PC / Laptop only, but can also be used to vcd / dvd player & apa2 electrical appliances also use CD / DVD. To your knowledge, cd / dvd drive ni also exposed to the dust we are not aware of. Similarly other electrical equipment. preferably cd / dvd drive ni we wash once a month. This is how prevention of damage from happening. In no circumstances should prevent the right is better than cure. :-)

Tuesday, July 3, 2012

0 Tips on buying Power Adapter / Charger Laptop


Want to buy a new power adapter? Whether you want to find a replacement for your damaged adapter? or just want to do a spare only, or just want to buy more to put the house one night or OFIS, this article will help you in making a decision

1. Search for "tip" right - Every laptop has its own connection. You need to find tips that match your laptop. These things can easily je want know. Often, the adapter has two ends, a wall plug that connect kat tu, another hole connected to power on the laptop. This thing called TIPS. Your laptop can not be used if using the wrong TIPS. You can only use the tips bebetul ngam only

WARNING! do not force this tip in the hole! Kat later broken laptop power jack that.

2. Find "output voltage" right. Each laptop has a different output value. You must use the correct voltage output! If not, your laptop may be damaged due to over-power or your laptop can not be on because there is not enough power. You can find this Voltage output either your laptop or on the back of the charger adapters available.
Examples of typical voltage output is 3.42A, 4.74A, 3.5a and so on.

3. Find the correct input voltage. Usually in Malaysia, which used input voltage is 220-240V. If in Japan 110v. This is usually not a problem because most of the Power Adapter in Malaysia does have ngam specifications with input voltage in Malaysia. Unless you want to leave the country make sure you bring Adapter with the correct input voltage to the country you visit! explode if not later!

Monday, July 2, 2012

0 Effect If The Computer Is Off Without Shutdown



Where data loss when the computer registry in operation or still operational process, the computer will register or registry available computer components or applications that have been used, this will result in a component or application can not be stored in the registry, it will result in the recovery system is not working properly.

Will reduce life expectancy during which computer components dishutdown computer processing unit or processor to give directions to the bios to stop all the components work there, it is also my current out of control on the component, if you turn off the computer with the incorrect current component eventually you will quickly damaged.

Processor is susceptible to damage during shutdown bios which will play an important role in turning off cooller fun on the processor, if it is off then suddenly startled processor.

Memory can be easily damaged during the shutdown systems where memory or cache will be cleared, it will result in damage to the memory.

Damaged hard disk where the operating system is not closed if a shutdown and correct to move, eat probable that there are on the hard disk drive can be easily damaged, because current supplies are switched off suddenly, head or head hard disk will wear out quicker.

Sunday, July 1, 2012

0 Optimize Use Your Pendrive!


You thought pendrive merely used to store data? Perhaps you never thought a pendrive can be used to:

1) Made the key / lock to lock your PC.

2) You can install software like FireFox, Thunderbird, OpenOffice, AbiWord, Audacity and many more in the pendrive, so you can use the software on any PC that does not have the software.

3) Can be used to store Operating System, which Linux Damn Small Linux), Apple Mac and Windows (Barts, PE).

I will focus on the second function, the software install in pendrive. Please see the list below:
  • Portable NVU Web Editor, an easy-to-use
  • XAMPP - complete package server Apache, mySQL, PHP, phpMyAdmin
  • Sudoku Portable - Puzzle Games
  • GIMP Portable - Editor picture quite sustainable (steady)
  • Portable FileZilla FTP Software
  • FireFTP Extension-To use FireFox
  • Firefox Portable - portable version of FireFox
  • Portable Gaim-Software for chatting
  • Miranda IM Portable - Approximately kind Gaim also
  • Sage Extension-Rss extension for FireFox
  • Portable Thunderbird-style Microsoft Outlook email software
  • Audacity Portable - Software to record and edit songs
  • Portable VLC Media Player - Media Player
  • AbiWord Portable - Word Editor ala Microsoft Word
  • Calendar Extension-Plugin for Firefox and Thunderbird
  • OpenOffice.org Portable - ala Microsoft Office
  • Portable Sunbird calendar and to-do-Program aka diary
  • Thunderbird Portable (Address Book) - Plug-in for Thunderbird
  • 7-Zip Portable - To compress file ala cam Winzip
  • Portable ClamWin AntiVirus Program
  • PStart-System tray menu launcher


All of the above program is FREE, so preferably use mass .. It is useful if we are out station, and many more things ..
Best of luck!

 

LAPTOPS TIPS Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates