Tuesday, September 27, 2011

Now, stream uninterrupted videos on your cellphone

kartical Picture  Mobile users with basic phones can now view videos without buffering hiccups thanks to an innovative streaming platform, Jigsee, which enables an uninterrupted viewing experience even on slow wireless internet connections.

With an estimated 90 per cent of Indian mobile subscribers using feature phones, this translates into a potential audience of over 500 million in the Indian sub-continent alone," said Ray Newal, chief executive of Jigsee Inc.

"These mobile subscribers have so far been unable to access video streaming services such as YouTube, which traditionally caters primarily to users of advanced smartphones with access to high speed broadband connections," Newal told IANS on phone from Canada.

The technology start-up's unique platform can be downloaded from the website m.jigsee.com orapp stores such as Getjar, Ovi and Tata Docomo for free.

"Typically most mobile online video content is offered in the form of very short clips and the segment of the market we are targeting don't have alternatives. They don't have broadband but they are much more interested in watching longer form content," said Newal.

The Jigsee platform offers features like auto-bookmarking. If one is cut off mid-stream while watching a video due to a drop in network signal or if the battery dies, Jigsee automatically remembers where the stream stopped and provides a simple option to resume watching the next time the application is opened.

Another feature is the magic queue which allows every video to continue into subsequent videos that Jigsee plays. Jigsee has tied up with content providers like UTV, Spice Digital, Mukta Artsand currently has a library of over 200,000 minutes of videos.

So how does Jigsee enable smooth streaming even when the wireless internet on offer is slow?

Explains Newal: "The average GPRS landscape in India, the average data rate is about 60 kb per second. In some places it could be as high as 130 kb per second, while in some cases it can drop to a sluggish 5-10 kb per second."

"It is difficult for anyone to play a video under a certain bandwidth. Our minimum threshold is about 40 kb per second and at that speed we can get a stream playing continuously. The platform on the phone tells our servers gives feedback on the kind of data rate and accordingly we keep adjusting the quality of the video in real-time."

But that trade-off is not so bad, when one considers the small screen of basic phones.

5 Hidden dangers of Facebook


Over the last few years, Facebook's growth has been phenomenal. The world's no. 1 social networking site also sometime back beat Google to become the most visited Web site in the US for an entire week at a stretch. However, the site has also lately being receiving lot of flak for its privacy policies.
An expert in online privacy drew attention to the five dangers of sharing information on social networking site Facebook. Joan Goodchild, senior editor of CSO (Chief Security Officer) Online, said that marketing efforts by the company often results in a compromise on account holders' privacy. 
Goodchild noted five risks of using Facebook.
artical Picture
They are:
1. According to Facebook policy last updated on April 2010, "When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends' names, profile pictures, gender, user IDs, connections, and any content shared using the Everyone privacy setting. ... The default privacy setting for certain types of information you post on Facebook is set to "everyone." ... Because it takes two to connect, your privacy settings only control who can see the connection on your profile page. If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection."

2. In March, private e-mail according to a Gawker report, private email addresses that many Facebook users wanted to keep hidden were revealed publicly on a multitude of Facebook profiles. The glitch was later resolved by Facebook.

3. Recently, a Facebook event invitation was reportedly sent to some over 2,300 friends of Jim Breyer, Accel Partners venture capitalist who sits on Facebook's board of directors, asking "Would you like a Facebook phone number?" However, the message was actually a scam and the users who entered their passwords in response to the message in turn sent the whole thing to their friends lists too.
"This was a phishing scam and Jim's account appears to have been compromised," read a statement from Facebook as provided to venture industry news site PEHub.

4. On May 6th, the popular social network patched a major security bug that allowed users to snoop on their friends' private chats, and view their pending friend requests. The exploit forced Facebook to temporarily disable chat.

5. Earlier this week, 15 privacy and consumer protection organizations filed a complaint with the Federal Trade Commission, alleging that the site manipulates privacy settings to make users' personal information available for commercial use. 

How to automatically backup USB drives



USB flash drives are not indestructible - they may be sturdier than hard drives, but they're still susceptible to physical damage and breakage from falls, electrostatic discharge and data corruption if a device is removed while data is still being copied. 
artical Picture

It's good practice to keep multiple backups of your important data, so try USB Flash Copy - a free utility for Windows PCs that automatically takes backups of your flash drive every time you connect it.

No installation is needed and it's only a 300kb download - get it from www.usbflashcopy.com and run it to set a particular folder on your computer's hard drive for backups (by default, it makes a backup folder in 'My Documents' ).

The first time you connect a USB drive, it will take a complete backup of all contents. Thereafter, it only makes small changes to the backup folder - copying only the files that have been changed or added. If you like, you can alter the settings to keep older versions of files too.

And if multiple people use the same PC or if you have multiple flash drives, you can create profiles for each device (with different settings).

Saturday, September 24, 2011

Internet Download Manager

Internet Download Manager  (IDM) is a Downloader tool to increase download speeds on internet. IDM v5.19 Bulid 3 has been released on May 26, 2010. My Opinion, Internet Download Manager 5.19 Bulid 3 has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and Internet Download Managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. This Software reuses available connections without additional connect and login stages to achieve better acceleration performance.
This Software also supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, Opera, Mozilla Firefox,Mozilla Firebird, Avant Browser, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it’s done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
IDM is really user friendly and easy to use according my opinion. Okey, I will share to you IDM 5.19 Build 3 Full version. You can download Internet Download Manager v5.19 Bulid 3 Full Version + Crack via the link below.

Download link
Version 5.19 tagged with, IDM, Crack IDM, Patch IDM, Full Version,
Downloader Tools

Thursday, September 22, 2011

WHAT IS NETWORK SECURITY?

The networks are computer networks, both public and private, that are used every day to conduct transactions and communications among businesses, government agencies and individuals. The networks are comprised of "nodes", which are "client" terminals (individual user PCs) and one or more "servers" and/or "host" computers. They are linked by communication systems, some of which might be private, such as within a company, and others which might be open to public access. The obvious example of a network system that is open to public access is the Internet, but many private networks also utilize publicly-accessible communications. Today, most companies' host computers can be accessed by their employees whether in their offices over a private communications network, or from their homes or hotel rooms while on the road through normal telephone lines.
Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.
Threats to network security include:
Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games
Vandals : Software applications or applets that cause destruction
Attacks : Including reconnaissance attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks (which prevent access to part or all of a computer system)
Data interception : Involves eavesdropping on communications or altering data packets being transmitted
Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords
Network security tools include:
Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.
Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management.
Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data.
Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.
Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.
Security management : This is the glue that holds together the other building blocks of a strong security solution.
None of these approaches alone will be sufficient to protect a network, but when they are layered together, they can be highly effective in keeping a network safe from attacks and other threats to security. In addition, well-thought-out corporate policies are critical to determine and control access to various parts of the network.

Features of 5G Technology

  • 5G technology offer high resolution for crazy cell phone user and bi-directional large bandwidth shaping.
  • The advanced billing interfaces of 5G technology makes it more attractive and effective.
  • 5G technology also providing subscriber supervision tools for fast action.
  • The high quality services of 5G technology based on Policy to avoid error.
  • 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000 connections.
  • 5G technology offer transporter class gateway with unparalleled consistency.
  • The traffic statistics by 5G technology makes it more accurate.
  • Through remote management offered by 5G technology a user can get better and fast solution.
  • The remote diagnostics also a great feature of 5G technology.
  • The 5G technology is providing up to 25 Mbps connectivity speed.
  • The 5G technology also support virtual private network.
  • The new 5G technology will take all delivery service out of business prospect
  • The uploading and downloading speed of 5G technology touching the peak.
  • The 5G technology network offering enhanced and available connectivity just about the world
A new revolution of 5G technology is about to begin because 5G technology going to give tough completion to normal computer and laptops whose marketplace value will be effected. There are lots of improvements from 1G, 2G, 3G, and 4G to 5G in the world of telecommunications. The new coming 5G technology is available in the market in affordable rates, high peak future and much reliability than its preceding technologies.

5G Technology

5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future.

The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

5G technology going to be a new mobile revolution in mobile market. Through 5G technology now you can use worldwide cellular phones and this technology also strike the china mobile market and a user being proficient to get access to Germany phone as a local phone. With the coming out of cell phone alike to PDA now your whole office in your finger tips or in your phone. 5G technology has extraordinary data capabilities and has ability to tie together unrestricted call volumes and infinite data broadcast within latest mobile operating system. 5G technology has a bright future because it can handle best technologies and offer priceless handset to their customers. May be in coming days 5G technology takes over the world market. 5G Technologies have an extraordinary capability to support Software and Consultancy. The Router and switch technology used in 5G network providing high connectivity. The 5G technology distributes internet access to nodes within the building and can be deployed with union of wired or wireless network connections. The current trend of 5G technology has a glowing future.

Saturday, September 10, 2011

Cloud computing Now India is Top Ranking

India scored higher than both Singapore and Malaysia in current Cloud understanding levels.
The proportion of Asia Pacific enterprises viewing cloud computing as relevant to their businesses has doubled to 83 percent over the
India scored higher than both Singapore and Malaysia in current Cloud understanding levels.
The proportion of Asia Pacific enterprises viewing cloud computing as relevant to their businesses has doubled to 83 percent over the last 18 months, reveals a survey by VMware Inc.

According to the survey results, 76% in India want to virtualize and adopt cloud computing in the next 18 months, which is the highest percentage as compared to other cloud positive countries in the region like Japan and Australia. India scored higher than both Singapore and Malaysia in current Cloud understanding levels.

The September survey of 6,953 respondents, conducted by Springboard Research under VMware's sponsorship, also indicated that cloud adoption has accelerated across seven Asia Pacific markets over the last 18 months, particularly among larger firms.

Today, 59 percent of regional firms are either using or planning cloud computing initiatives compared to 45 percent six months ago and 22 percent in 2009. India and China lead the region in terms of adoption plans, with 43 percent and 39 percent of organisations respectively planning to implement cloud computing. Organisations in Japan and Australia lead in cloud adoption, with 36 percent and 31 percent respectively already running a cloud-related initiative.

India had 693 respondents across various sectors. Highest adoption is anticipated from the IT/ITES infrastructure & manufacturing sectors. The survey reveals that India's understanding of virtualization and cloud computing has risen dramatically over the last couple of months and VMware has a 50 percent perceived mindshare when it comes to cloud computing in India.

Dynamic provisioning / capacity on demand, automated management, pay-per-use model, and applications that can scale on demand were considered the essential building blocks for Cloud Computing as far as the Indian audience is concerned.


Cloud associated with IT as a Service
The highest proportion of organizations in Japan (86 percent), Singapore (84 percent) and Thailand (74 percent) associate cloud computing primarily with IT as a Service, while in Australia, Malaysia and India, most firms (80 percent, 78 percent and 75 percent respectively) associate cloud mainly with applications-on-demand. In China, 80 percent of respondents look to cloud for on-demand provision of storage and network.

Sanchit Vir Gogia,Associate Research Manager, Software Springboard Research, said: "For most survey respondents in Asia Pacific, IT as a Service is the biggest theme of the day. These companies are looking for vendors and consultants that can help them enjoy serviced-based IT, particularly in the areas of cloud infrastructure and management."

Most organizations (60 percent) want to adopt cloud for scalability-on-demand to meet business needs, followed by drivers such as reduced hardware infrastructure costs and simplified resource/server provisioning.

Cost saving
Saving cost is the immediate incentive for adopting cloud computing for 57 percent of Asia Pacific firms. Only 37 percent, many of which are large firms with more than 10,000 employees, adopted or planned to adopt cloud as a long-term strategic investment.

Some 66% considered scalability on demand to meet business needs while 67% considered reduced hardware infrastructure and 43% considered simplified resource/server provisioning as some of the key factors that drive cloud adoption. 83 % said that they expect cloud investments to reduce hardware their spending while 74% would like reduction in their software spend.


Hybrid clouds on the rise
Companies wanting to deploy both public and private clouds were represented by the 38 percent of respondents, while a roughly equal amount - 37 percent - said they will only consider a private cloud. Preference for private cloud is more prevalent in banking and government sectors, with public cloud continuing to meet with the greatest resistance. Preference for hybrid cloud is higher in ASEAN, at more than four percentage points above the Asia Pacific average. In fact, even Japan – the most cloud-positive country in the survey – gave rise to survey findings suggesting that no more than 15 percent of organizations want to use public clouds. The mind set in India is changing and private cloud is slowly overtaking public cloud.

Storage (58 percent) represents the region's No.1 workload for private clouds, with Japan (62 percent) and China (61 percent) most likely to deploy storage in a private cloud. Cloud-based enterprise applications are the second most identified category across Asia Pacific at 49 percent.

In terms of deployment plans, 93 percent of respondents said their upcoming cloud deployments will revolve round web conferencing, IM, collaboration and email.

Andrew Dutton, SVP and GM, VMware Asia Pacific Japan, said: "It is clear that industry has great interest in the hybrid cloud model. The ability for enterprises to obtain a common cloud infrastructure platform, as well as a common management model and application services that bridge private and public clouds to deliver interoperable clouds allowing data and application portability, will be critical."

Integration concerns now match security worries as obstacles to cloud adoption

Integration with existing systems has caught up with traditional security concerns as a barrier to cloud adoption, with 46 percent of respondents identifying them equally as obstructions.

In emerging markets, the key factor holding back cloud adoption is lack of understanding among enterprises, according to 44 percent of respondents in China, 40 percent in Malaysia and 40 percent in Thailand, compared with a regional average of 36 percent.

These results strongly suggest that use of standards-based cloud solutions and education remain as significant cloud adoption drivers across Asia Pacific.


Virtualization seen as the foundation of cloud computing
Organizations across Asia Pacific (59 percent) consistently cited virtualization infrastructure as a primary building block for cloud computing. Awareness about virtualization is widespread in India, with 94% of the respondents either leveraging or planning to adopt virtualization technology.

Explaining the link between the two technologies, Dutton said: "Virtualization lets organizations decouple critical business applications and information from underlying physical hardware, and in turn, provides a fast and cost effective way to the cloud. More and more Asia Pacific organizations are realizing this and are moving to unlock more value from their virtualization investments."

Virtualization adoption in Asia Pacific is highest in Australia (87 percent) and Japan (82 percent). Among verticals, virtualization adoption is highest in insurance (82 percent) and banking/financial services (76 percent).

Thailand (67 percent), Singapore (65 percent) and Malaysia (65 percent) all lag Australia and Japan in current adoption, while virtualization penetration stands at about 30 percent across ASEAN.

Most Asia Pacific firms use virtualization for servers and data centres, with many organisations focused on leveraging virtualization to drive business continuity/disaster recovery initiatives. In India, server virtualization has grown in importance, compared to 12 months ago, as it is the bedrock to cloud.

The biggest growth opportunity for virtualization in Asia Pacific is in the end-user computing space, although most organisations rank desktop virtualization as low in their list of priorities.

However, significant advantages can be gained from a new approach to end-user computing that virtualizes the desktop by de-coupling the operating system, user persona and applications, thereby enabling great flexibility in delivering applications and data to end-users when and where they need them and regardless of access device. There is more focus in India on Desktop Virtualization at 68% when compared to China and Japan

Dutton said, "By enabling large-scale end-user self-service, desktop virtualization is really the final piece of the puzzle in making the modern enterprise flexible, scalable and ultimately responsive to business needs."

10 useful accessories for your desk

 

 
 


 
USB Hub & Mug Warmer
For many people, office doesn’t start without a cup of morning coffee. This USB powered mug warmer has a metal heating plate protected by insulation material — it can keep your coffee warm while you take your time to enjoy it. The heating plate works great for ceramic, glass and metal mugs. There is also a status light to indicate that the warmer is ready to be used. The additional USB ports can be used to connect other devices. 699 from www.ebay.in


USB Display
This little monitor is completely powered off USB – just one cable is needed for both the video signal and
power. The 7-inch 800 x 480 pixel panel is touchscreen enabled too – you can move certain items onto it to
clear space from your primary display. The best part is that since the display connects via USB, your regular
VGA/HDMI out is unused and can be used to output to another device simultaneously. The display is compatible
with both PC and Mac (the touchscreen functionality is only compatible with Intel-powered Macs and needs an dditional driver). $229.99 from www.thinkgeek.com


USB Cooler 
This tiny refrigerator-shaped USB accessory can actually keep a canned beverage chilled. A cool blue LED lights p when the door is opened, just like the light inside an actual fridge. Practically, it can’t cool a hot can, ut it can keep an already chilled can colder for a longer time (as compared to if it was left in the open). he flamboyant red colour also adds a little zing to your desk. $19.99 from www.thinkgeek.com


Phantom Keystroker 
Quite an effective and hard-to-catch office prank, this. The Phantom Keystroker looks like a simple USB flash rive but it actually mimics a keyboard and mouse when connected to a computer. All you have to do is plug it nto a (hidden) USB port and it randomly inserts letters while typing or moves the mouse pointer around. The nfuriated victim will never find out. $12.99 from www.thinkgeek.com


USB Foldable keyboard
If your netbook’s keyboard proves too small for you or you just prefer to carry your own keyboard around, this lexible USB keyboard is ideal. Since the keys and base material are made of silicon, it is completely silent. ven though it has the full 104 keys, you can roll it up into a small package. The added advantage is that the keys are completely waterproof and dustproof. $23.99 from www.thinkgeek.com


USB paper schredder
A lot of information about you can be accumulated by anyone who goes through your trash. That’s why any
personally identifiable or sensitive information (bank statements, credit card alerts, PIN numbers) should be
completely destroyed using a paper shredder. This little USB (or battery) powered shredder is small enough to it quietly under your desk. 2,022 from www.ebay.in


USB Vaccum Cleaner 
A full-size vacuum cleaner would be overkill for use on your keyboard or smaller computer peripherals. That’s hy you’ll need this dainty little handheld USB vacuum cleaner with a reusable dust bag. A couple of small ttachments (tube and brush) are included so that you can get all the muck out of the keyboard crevices and ther hard-to-reach places like speaker grills. It also has a small LED to light the way for more effective
cleaning. 150 from www.ebay.in


ASUS CrossLink Cable
Connecting two computers directly without a network is a pain. Thanks to Asus’ Crosslink USB cable and adapter, ou can quickly connect and transfer data at high-speeds between two computers. The adapter is shaped like a SB drive, has 2GB storage and a miniUSB port on the other side to connect using the Crosslink cable. You can ven share an internet connection and optical drive between two PCs. 4,000 from eBay Global EasyBuy


USB Phone2PC
This handly little device is great if you want to keep a record of all your voice calls. It can be connected to ost phones using an analog or digital connection and then it connects to the PC using USB. A software is equired to be installed which provides an easy-to-use interface to record incoming/outgoing calls. It includes n external microphone for recording meetings and interviews directly to the PC as well. 10,000 from www.ebay.in

5 steps: How to set up your home wireless network

You can use a wireless network (WLAN) to share Internet access, files, printers, game consoles, and other devices among all the computers in your home. After you’ve completed the initial wireless router setup and added your computers and devices to the network, you can use your home network to surf the web or to play online games—whether you're sitting in your living room or relaxing in your backyard.
It's easier than ever to set up a wireless network, especially now that Internet access and routers (like Linksys wireless routers and D-link wireless routers) have become widely available.
Man with a laptop in a hammock

What you’ll need to set up your wireless network

  • An operating system that supports wireless networking
    The Windows 7 operating system fully supports wireless networking. For Windows Vista users, we recommend installing Windows Vista Service Pack 2 before setting up your wireless network. For Windows XP users, we recommend installing Windows XP Service Pack 3. Use Windows Update to check whether you need the service pack and to install it. Click the Start button, click All Programs, click Windows Update, and then click Check for updates. Although the service packs for Windows Vista and Windows XP are not required for wireless networking, they can make things much easier and can help protect you against hackers, worms, and other Internet intruders.
  • A broadband (DSL or cable) Internet connection
    To set up a wireless network, you need a broadband or high-speed Internet connection (not a dial-up connection) provided by an Internet service provider (ISP), usually for a monthly fee. Two common broadband technologies are Digital Subscriber Line (DSL) and cable technology. These require a DSL modem or a cable modem (often provided by your ISP). After you have an ISP and a modem, you're ready to connect to the Internet.
  • A wireless router, a DSL modem, or a cable modem with built-in wireless networking support
    The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Newer DSL and cable modems come with integrated wireless networking capability and are called modem routers. If the modem router you received or purchased from your ISP already has wireless capability built in, you do not need to purchase a separate wireless router. Just follow the instructions provided by your ISP for activating your wireless connection.

    If you do need to purchase a wireless router, be sure that you buy a wireless router and not a wireless access point. The Linksys router is a popular router for wireless networks because it’s simple to set up. There are many routers to choose from, for example:





    Picture of a Linksys wireless routerPicture of a D-Link wireless routerPicture of a Cisco wireless routerPicture of an ASUS wireless router
    Linksys wireless routersD-Link wireless routersCisco wireless routersASUS wireless routers
    While you're looking for a wireless router or other wireless equipment in stores or on the Internet, you might notice that you can choose equipment that supports four different wireless networking technologies: 802.11a, 802.11b, 802.11g, and 802.11n. We recommend 802.11g (Wireless-G) or 802.11n (Wireless-N) because they offer excellent performance and are compatible with almost everything.

    NOTE: If you do not want to buy a wireless router or if you want to connect computers or devices temporarily for a specific purpose, like sharing devices or games, you can set up a temporary wireless network without a router. This is called an ad hoc network.

  • A computer with built-in wireless networking support or a wireless network adapter
    If you have a newer computer, you may already have built-in wireless capabilities. If this is the case, you don’t need a wireless network adapter. Here’s how to check whether your computer has wireless support installed:

    Windows 7 and Windows Vista


    • Click Start, click Control Panel, and then click Network and Internet. If you see any of these words listed, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless capability installed.

    Windows XP

    1. Click Start, right-click My Computer, and then click Properties
    2. In the System Properties window, click the Hardware tab.
    3. Near the top of this window, click the Device Manager button.
    4. In the Device Manager window, there is a list of hardware components which are installed on the computer. Press the Plus sign (+) to the left of the icon to open the Network adapters item in the list. The Network adapters section of the window expands to reveal a list of all network adapters installed on the computer.
    5. If you see any of these words in the list of installed network adapters, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless network support installed.

    If your desktop or laptop computer does not have built-in wireless support, you need to purchase a network adapter to wirelessly connect your computer to your wireless router. If you need an adapter for a desktop computer, buy a USB wireless network adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.

    NOTE: To make setup easy, choose a network adapter made by the same vendor that made your wireless router. For example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from Linksys, Actiontec, D-Link, Netgear, Microsoft, and Buffalo. If you have a desktop computer, make sure that you have an available USB port where you can plug in the wireless network adapter. If you don't have any open USB ports, buy a USB hub to add additional ports.
  • A copy of your router setup instructions
    Before you begin setting up your wireless network, it’s a good idea to make sure that you have the copy of the setup instructions provided by the router manufacturer or your ISP. If you do not have a copy, visit the manufacturer’s website for get instructions on how to set up your router. All routers vary, and you may need to consult the instructions to set up your wireless network using your specific router.

1. Connect to the Internet

Make sure that your Internet connection and your DSL or cable modem are working. Your wireless network depends on this connection.

2. Connect your wireless router

These are the steps for connecting a stand-alone wireless router to your DSL modem or cable modem. If you have a modem router, follow your ISP’s instructions for connecting your network.
Since you'll be temporarily disconnected from the Internet, print these instructions before you go any further.
First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
Wireless router setup mapNext, connect your router to your modem:
Note: The instructions below apply to a Linksys wireless router. The ports on your router may be labeled differently, and the images may look different on your router. Check the documentation that came with your equipment for additional assistance. Or do a Bing search on “[your manufacturer/model] wireless router setup” to find images and instructions.
  • If you currently have your computer connected directly to your modem: Unplug the network cable from the back of your computer, and plug it into the port labeled Internet, WAN, or WLAN on the back of your router.
  • If you do not currently have a computer connected to the Internet: Plug one end of a network cable (included with your router) into your modem, and plug the other end of the network cable into the Internet, WAN, or WLAN port on your wireless router.
  • If you currently have your computer connected to a router: Unplug the network cable connected to the Internet, WAN, or WLAN port from your current router, and plug this end of the cable into the Internet, WAN, or WLAN port on your wireless router. Then, unplug any other network cables, and plug them into the available ports on your wireless router. You no longer need your original router, because your new wireless router replaces it.
Wireless modem lightsNext, plug in and turn on your cable or DSL modem. Wait a few minutes to give it time to connect to the Internet, and then plug in and turn on your wireless router. After a minute, the Internet, WAN, or WLAN light on your wireless router should light up, indicating that it has successfully connected to your modem.

3. Configure your wireless router

Wireless cablesUsing the network cable that came with your wireless router, you should temporarily connect your computer to one of the open network ports on your wireless router (any port that isn't labeled Internet, WAN, or WLAN). If you need to, turn your computer on. It should automatically connect to your router.
Next, open Internet Explorer and type in the URL or address to configure your router.
NOTE: Do this on the computer that you are using to set up your wireless network. The computer automatically links you to the router’s page. If you type the router’s URL on a different computer, typing the address in the navigation bar will not take you to your router’s configuration page.
On the router configuration page, you might be prompted for a password. The address and password you use varies depending on what type of router you have, so refer to the instructions included with your router or on the manufacturer’s website.
For quick reference, this table shows the default addresses, user names, and passwords for some common router manufacturers. If the address is not listed here, you can read the documentation that came with your router or go to the manufacturer's webpage to find it. There may be multiple website addresses you can use.
RouterAddressUsernamePassword
3Comhttp://192.168.1.1adminadmin
D-Linkhttp://192.168.0.1adminadmin
Linksyshttp://192.168.1.1adminadmin
Microsoft Broadbandhttp://192.168.2.1adminadmin
Netgearhttp://192.168.0.1adminpassword
Actiontechttp://192.168.0.1usernamepassword
Internet Explorer shows your router's configuration page, along with the modem IP address and other information. Most of the default settings should be fine, but you need to configure three things:
  • Your wireless network name, known as the SSID. This name identifies your network, and it appears in a list of available wireless networks. You should change the default SSID that your ISP provided and give your network a unique name that none of your neighbors are using. This helps you identify your network, and it can help keep your wireless network secure by preventing it from overlapping with other wireless networks that might be using the default SSID.
  • Wi-Fi Protected Access (WPA or WPA2), which can help protect your wireless network. It’s important to help secure your wireless network by setting up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key, and all information sent across your network is encrypted so that only computers with the key to decrypt the information can read it. This can help prevent attempts to access your network and files without your permission. Wi Fi Protected Access (WPA or WPA2) is the recommended wireless network encryption method. Wireless encryption (WEP) is not as secure. Windows 7, Windows Vista Service Pack 2, and Windows XP Service Pack 3 support WPA2.

    When you set up most routers (stand-alone routers and modem routers), you are asked to provide a pass phrase that the router uses to generate several keys. Make sure that your pass phrase is unique and long (you don't need to memorize it). Some routers and modem routers now come with a function called Quick Security Setup (or QSS) that automatically issues you a key when you press a button on the router.

    Be sure to keep a hard copy and a digital copy of your network security key and pass phrase, in case you lose or misplace them. You can recover a lost network key or reset it on your router, but these are complicated processes that are different for every router and they sometimes entail setting up your network again.
  • Your administrative password, which controls your wireless network. Just like any other password, it should not be a word that you can find in the dictionary, and it should be a combination of letters, numbers, and symbols. Be sure to save a hard copy and a digital copy of this password, too, because you'll need it if you ever have to change your router's settings.
The exact steps you follow to configure these settings will vary depending on the type of router you have. After each configuration setting, be sure to click Save Settings, Apply, or OK to save your changes.
Now, before connecting your computers and devices to the network, you should disconnect the wireless network cable from your computer.

4. Connect your computers, printers, and other devices to the wireless network

You can connect multiple computers, printers, and many other peripheral devices, such as an Xbox, Xbox 360, TV, cell phone, iTouch, or iPad, to your network. Before you connect them to your network, make sure that the computer or device you want to add has built-in wireless networking or a network adapter. Many newer devices have built-in wireless capability. If the computer or device you want to add does not have built-in wireless network support, plug the network adapter into your USB port and place the antenna on top of your computer (in the case of a desktop computer) or insert the network adapter into an empty PC card slot (in the case of a laptop). Windows automatically detects the new adapter and may prompt you to insert the CD that came with your adapter. The on-screen instructions guide you through the configuration process.
Use the following links to find step-by-step instructions for adding your specific computer or device to your network using your operating system. There are instructions for each operating system, and they show you how to automatically or manually add wired (Ethernet) or wireless computers and how to add computers running Windows 7, Windows Vista, or Windows XP. There are also instructions for adding printers and both wired and wireless devices.

5. Share files, printers, and more

Now that your computers and devices are connected, you can begin sharing files, printers, games, and much more. One of the top reasons for setting up a home network is to share a printer. Another is to share files. The steps for doing this, however, aren’t always obvious, so here are instructions to get you started:

6 useful Windows tricks

You know that feeling you get when your friends or family see you do something on your computer that they've never seen before? If you’ve had this experience, you know that “world's coolest power-user” feeling. But if you haven’t, start here. Knowledge is power!
Read these six tips for Windows 7, Windows Vista, and Windows XP that will keep you schoolin' your friends and family.

1. Don't just maximize your windows—go full screen

When you need a really big window for viewing photos and videos, don't just maximize it: go full screen! This tip works great for viewing photos and videos at maximum size in Windows Explorer or Windows Media Player, utilizing screen space usually occupied by the header at the top of the screen and the taskbar at the bottom. Here’s how:

Open any photo in Windows Explorer, or open a photo or video clip in Windows Media Player. Do one of the following:
  • In Windows 7 and Windows XP, click the F11 key at the top of your keyboard.



To undue full-screen mode and restore the window to its normal view, press the Esc (Escape) key at the top of your keyboard

2. Customize the Navigation pane

You can use the navigation pane (the left pane) to find files and folders and display links to frequently used folders and other items. You can also move or copy items to a destination in the navigation pane.
If you don't see the navigation pane on the left side of an open folder window, click Organize, point to Layout, and then click Navigation pane to display it.

To customize the navigation pane in Windows 7

  1. In an open folder or library window, click Organize, and then click Folder and search options.
  2. In the Folder Options dialog box, click the General tab, and then do one or both of the following:
    • To show all the folders on your computer in the navigation pane, including your personal folder, select the Show all folders check box, click Apply to see the change, and then click OK.
    • To automatically expand the navigation pane to the folder that's selected in the folder window, select the Automatically expand to current folder check box, and then click OK.

Customizing the navigation pane in Windows 7

More ways to customize your favorites in Windows 7

  • To add a folder, a saved search, a library, or even a drive as a favorite, drag it to the Favorites section in the navigation pane. Note: You can’t add individual file to Favorites, but you can add them to any folder in Favorites.
  • To change the order of favorites, drag a favorite to a new position in the list.
  • To restore the default favorites in the navigation pane, right-click Favorites, and then click Restore Favorite Links.
  • To view the folder where your favorites are stored, click Favorites in the navigation pane. Favorites are stored as shortcuts.
  • To remove a favorite, right-click the favorite, and then click Remove. This removes the favorite from the navigation pane—it doesn't delete the files or folders that the shortcut points to.
The Favorites area of the navigation pane in Windows 7The Favorites area of the navigation pane in Windows 7

Add folders and files in Windows Vista

In Windows Vista, you can add folders to Favorite Links in the navigation pane so that you can open them from any folder window at any time. To do this, first open the folder that contains the subfolder you want to add. Then simply drag its icon from the original folder to where you want it in the navigation pane. You can also click Folders at the bottom of the pane and drag a folder from the folder list up into the Favorite Links section of the pane. Note: You can’t add individual files to Favorite Links, but you can add them to any folder in Favorite Links.
Pictures folder in Windows





3. Pin a program or items to the Windows 7 taskbar

You know what would make a great taskbar? One where you could pin your favorite applications or files so that you could open them quickly from any window at any time. Guess what? You can.
In Windows 7, you can also pin shortcuts for favorite or frequently used files, folders, and websites to the Jump Lists for each of those programs to the taskbar. Learn more about Jump Lists.
Pin a program to the taskbar
To pin a program shortcut to the taskbar, do one of the following:
  • If the program is already running, right-click the program's button on the taskbar (or drag the button toward the desktop) to open the program’s Jump List, and then click Pin this program to taskbar.
  • Or if the program isn't running, click Start, find the program’s icon, right-click the icon, and then click Pin to Taskbar.
  • You can also pin a program by dragging the program's shortcut from the desktop or Start menu to the taskbar.
Pinning a program to the taskbar



ump Lists on the taskbar give you quick access to the things you use most often. You can drag a file, folder, or website icon or a shortcut from the Start menu or the desktop to the taskbar. This pins the item to the Jump List and also pins the associated program to the taskbar. If you drag the shortcut to the taskbar and the associated program isn't already pinned there, then that program is pinned to the taskbar and the item is pinned to the program’s Jump List.

Pinning an item to a Jump List on the taskbarPinning an item to a Jump List on the taskbar
To view the Jump List for a program, right-click the program's button on the taskbar. To open an item from a Jump List, open the program's Jump List, and then click the item.

4. Customize the Quick Launch Bar in Windows XP

In Windows XP, the customizable Quick Launch Bar also gives you convenient shortcuts to your favorite programs, folders, and files. The Quick Launch Bar remains accessible from most windows, so it’s a handy way to open the applications and files you use frequently.
If the Quick Launch Bar isn’t already visible to the right of the Start button Start button, you’ll need to turn it on. To do that, right-click an open area of the taskbar. Hover your mouse pointer over Toolbars, then click Quick Launch. The Quick Launch Bar appears on your taskbar.
The Quick Launch Bar on the Windows XP taskbarThe Quick Launch Bar on the Windows XP taskbar
To add a program shortcut to the Quick Launch Bar, click the Start buttonStart button, click All Programs, then click and drag the application you want to the Quick Launch Bar. Release the mouse button and the application’s icon appears in the Quick Launch Bar.
To add a folder or file shortcut to the Quick Launch Bar, open Windows Explorer, navigate to the folder, subfolder, or individual file you want, click and drag the folder or file you want to the Quick Launch Bar. Release the mouse button and the icon for the folder or file appears in the Quick Launch Bar.
To remove a shortcut from the Quick Launch Bar, right-click on the icon in the Quick Launch Bar of the application, folder, or file you want to remove and right-click it, click Delete, and then click Yes when asked if you’re sure you want to delete the shortcut. Note: Although the shortcut is removed from the Quick Launch Bar, the actual application, folder, or file has not been deleted from your computer.

5. Arrange windows on your desktop

In Windows, you can arrange windows side by side, which can be especially helpful when comparing two documents or when moving files from one place to another. Note: If you’re using a nonstandard setup (such as dual monitors), the tricks below may not work as expected.

Windows 7

  1. Drag the title bar of a window to the left or right side of the screen until an outline of the expanded window appears.
  2. Release the mouse to expand the window.
  3. Repeat steps 1 and 2 with another window to arrange the windows side by side.
To return a window to its original size click the Maximize button in the window’s title bar and the window expands to full size.
The Maximize buttonThe Maximize button
Learn more about managing multiple windows in Windows 7.
Tip: To snap an active window to the side of the desktop by using the keyboard, press Windows logo key Windows logo key +Left Arrow or Windows logo key Windows logo key +Right Arrow.
Viewing windows side by side in WindowsViewing windows side by side in Windows

Windows Vista and Windows XP

In Windows Vista and Windows XP, it’s easy to display any two (or more) windows side by side on the desktop, all equally sized. Press and hold the Ctrl key and click two or more of the window buttons on the taskbar that you want to open. Release the Ctrl key, right-click, and then do one of the following:
  • Windows Vista users, click Show Windows Side by Side.
Windows Vista, Show Windows Side by Side command.Windows Vista, Show Windows Side by Side command.
Windows XP, Tile Vertically command.Windows XP, Tile Vertically command.

6. Organize your files into groups

Windows offers a variety of options for organizing folders and files in the ways that work best for you.

Windows 7

The easiest and most effective way to organize your stuff in Windows 7 is to use file arrangements in your libraries.
You can arrange files in the Documents library by author, for example, or you can arrange the Music library by artist if you're looking for an album or song by a particular band.
To arrange a library
  1. In the taskbar, click the Windows Explorer button Windows Explorer button.
  2. In the navigation pane (the left pane), click a library (such as Music).
  3. In the library pane (above the file list), click the Arrange by menu, and then choose a property. For example, in the Music library, you can choose Artist to quickly arrange your music collection by artist.
    The 'Arrange by' menuThe "Arrange by" menu
  4. When you arrange your files, Windows doesn't just put your files in a different order. Instead, they are presented in a completely different way. The arrangements work differently depending on which one you choose. For example, arranging your pictures by month puts your pictures into stacks, like this:
    Files arranged in 'stacks'Files arranged in "stacks"
    Arranging by day puts them into groups, like this:
    Files arranged in 'groups'Files arranged in "groups"
    There are four default libraries in Windows 7, each with its own specific arrangements. You can also create new libraries and choose which arrangements are available for them.
    For more information about libraries, see Working with libraries.

Windows Vista

Open a folder that contains several different subfolders and file types. Right-click any empty space on the window's contents pane, point to Group By, and then click your grouping choice.
Windows Vista Group by command.Windows Vista Group by command.

Windows XP

Open a folder that contains several different subfolders and file types. Right-click any empty space on the window's contents pane, point to Arrange Icons By, and then click Show in Groups. To arrange the window's contents, right-click again in any empty space on the window's contents pane, point to Arrange Icons By, and click Name, Size, Type, or Modified (the choices may vary depending on the contents).
Windows XP Arrange icons by command.

Friday, September 9, 2011

WATCH LIVE TV FOR FREE

Watch Live TV on Your PC For Free

Now you can watch free Tv on your pc by just using a VLC player.

Step 1 : First of all you need to have VLC player, if you don’t have vlc player kindly download and install it

Step 2 : Now open Vlc Player, and select streaming option from the media menu present in the menu bar.





Step 3 : Select network option and enter the url of the streaming channel. For example if you want to view B4u Music you need to add url
rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
in the url field and then select play option from the stream drop down menu.




Step 4 : After you click play in the above step, the channel will start streaming and you can watch your favorite channels.




Here is the List of many other channels which you will love to watch
Channel Name
Link
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NK News rtsp://94.75.250.53:554/rtplive/rknews.sdp
RAJ News rtsp://94.75.250.220:1935/live/rajnews2.sdp
ETV rtsp://94.75.250.53/rtplive/etv2low.sdp
Studio N rtsp://94.75.250.220:1935/live/studion2
SVBC rtsp://94.75.250.220/rtplive/svbclow
Zoo Vision rtsp://stream.zoovision.com/live.sdp
B4u Music rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
iMusic rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp
Zee Tamil rtsp://121.244.145.226:554/prf1/cid_54.sdp
Zee Kannad rtsp://121.244.145.226:554/prf1/cid_55.sdp
Zee Bangla rtsp://121.244.145.226:554/prf1/cid_52.sdp
Music Box rtsp://stream.the.sk/live/musicbox/musicbox-3m.3gp
Bella Tv rtsp://217.146.95.166:554/playlist/ch29yqcif.3gp
Fashion Tv rtsp://217.146.95.166:554/playlist/ch27yqcif.3gp
Adventure rtsp://video3.multicasttech.com/AFTVAdventure3GPP296.sdp
Horror rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp
Comedy rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp
Classic rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp
Crime rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp
Mystery rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp
Clubbing Tv rtsp://217.146.95.166:554/playlist/ch21yqcif.3gp

Change the Title Tags for your Blog


Until recently, the title tags generated for each page of your Blogger blog would display the blog title first, then the name of your post.
This wasn't so good for SEO (search engine optimization) as this made keywords from your post titles appear after your blog title.
Luckily, Blogger have come up with a simple fix for this problem for those who use Layouts templates: the <data:blog.pageName/> tag!
This new tag is already installed for new blogs (or if you change your existing template to one of Blogger's default ones).
However, if you have customized your template or uploaded a third party template, you will need to change the original <data:blog.pageTitle/> to the new <data:blog.pageName/> tag for this change to take effect.
But don't worry: this is REALLY easy! Here's what you have to do:
  1. Go to Layout>edit HTML in your Blogger dashboard.
  2. Search for this tag: <data:blog.pageTitle/>
  3. Replace this tag with the following:
    <b:if cond='data:blog.pageType == &quot;index&quot;'>
    <title><data:blog.title/></title>
    <b:else/>
    <title><data:blog.pageName/></title>
    </b:if>
  4. Save your template! (See, this is an easy hack!)

Once you've changed this tag, you'll see that on post pages, the default [blog name] page title format for your post titles in the browser window will be replaced solely by your post title instead.
This will increase the chances of your posts being picked up in search engine results for keywords which appear in your post titles (and can ultimately help draw more targeted traffic to your blog.

Thursday, September 8, 2011

Fresh Win7 Install Eliminates Bloatware

Enough cannot be said about the importance of doing a fresh, full and clean installation of Windows 7 on your computer if it has never been done in the past. New computers contain vast amounts of bloatware (trial programs, manufacture specific utilities and freeware), as well as specific settings that will slow your computer which serve to ensure the stability of the system for the needs of the manufacturer. Many times, newer systems contain programs that the consumer believes are vital yet utilize a vast amount of system resources to do their job. This slows your computer.

Did you ever wonder why some computers take several minutes to start yet others take less than 30 seconds??? A ‘clean install’ alone will change your start times significantly. The most valuable upgrade one can make to a computer is a fresh installation of the operating system and its hardware drivers. We first need to put pen to paper and determine what will be involved in our new OS installation.

  • Did the system come with an OS Win 7 disk? If not, we definitely need one of them;
  • Are we aware of what hardware is installed within our systems in order to find the proper drivers?
  • Do we know how to find our drivers through the manufacturers support site or that of the hardware vendor themselves?
  • Have we downloaded these drivers onto a separate USB/DVD so we can have them when needed?
These are very important questions we have to tackle before the new installation because, sure as heck, something will go wrong even with all the preparation in the world. Care for an example?

I bought my new system, an Acer 1810T-6188, a few weeks back and wanted to do a fresh OS installation. Well, my first thing to tackle was finding the OS disk as I never received one with the system. It came with an internal system recovery drive which was useless as I was also changing to a SSD. I dug up the disk but then needed to create an .iso file in order to create an installable Windows 7 USB disk for the installation as my sytem doesn’t contain a DVD drive. I then learned that, since I was moving over 64 bit form 32 bit, the USB disk couldn’t simply be created on a 32 bit system. I tackled that and then did the installation only to find out that the laptops wireless module was not recognized by my new installation of Windows 7. This wasn’t good. I didn’t figure I would need to download the drivers as I would simply do it after the installation as I was told that all hardware would certainly be recognized by Windows 7.  It was a long day, but one that I enjoyed because I thrive on problem solving which is an asset if your following through with this thread. It never stopped there though. While experimenting with different service settings the next day, I did a computer reboot only to find my ‘hardware’ wasn’t recognized as a result of a hardware or software change. So I tackled that.

 Ok so… I’ve probably done a great job of disillusioning and scaring you right? If so, refer once again to the above READER ALERT! because once you start it’s just too late to go back. It becomes an addiction which will definitely present, yet one that will make you confident in your problem solving skills and your creation of a new system to suit your own personal needs and ideas.

Change Windows 7 Security Features

There are a number of changes one can make with respect to Windows 7 Security Features. Some will help speed up your movement within Windows while others will increase, or decrease, performance depending on whether you choose to use it or not. Many users reading this may not be of a level to determine whether these will best suit their needs and for this, I would advise against making changes to their User Account Control and System Restore specifically. This article was created in the sense that it should provide all the options to the consumer and one should consider that certain changes may not be in their best interest depending on their level of knowledge.
 


a. Make Windows 7 Log On Automatically

If you are simply using a home computer and have no need for log on screens, you can eliminate this by the following these steps:

  1. Press Win + ‘R’ for the Run Command;
  2. Type ‘netplwiz’ and hit enter;
  3. Uncheck Users Must Enter a User Name and Password to Use this Computer and press Apply; and
  4. You will be prompted for your User Name and Password; do so and hit Enter.
Many believe this change alone to save them several seconds in system boot times.


b. Take Control of UAC

One of my biggest pet peeves of Windows is the annoying prompts each and every time one wants to install a program or make system changes. This can be changed easily by adjusting the scale in User Account Settings to a level that makes you happy with both protection and your ability to work with your computer

Simply left click on the Orb and then Icon top right of the Start Menu. Next click Change User Account Control Settings and adjust the scale to suit your needs. While there, one can also learn how to change their account type, name and picture as well as being able to manage other accounts if they are in Account Administrator.

c. Get Rid of Action Center Balloon Notification
The new Windows Action Center is a great thing for those who aren’t quite on top of their system. It is capable of pop-ups and balloons for pretty much everything under the sun that might reflect security in one way or another. I am really not a fan of always seeing that little flag with some new red mark on it to remind me that Windows doesn’t think my security is quite up to par.

 The icon can either be shut right off or not shown yet still active. Right click on the Power Icon and selecting Turn System Icons Off where you get to choose which you want and which you don’t. You can also customize them to how and when they alert you by selecting Customize Notification Icons if you don’t want to shut them off completely.
 


d. Disable System Restore
System restore is an effective tool for backing out of things such as tweaking mistakes, failed program installations and other activities that seem to leave your system damages. For this reason, consider carefully whether you want to turn it off or just leave it. Turning it off allows for performance improvement as new system backups aren’t being created in the background and, also, it allows for more computer space as it frees up some valuable disk property. I regularly back up to an external which solves my problems with respect to this.

  1. Go to Control Panel/System/System Protection and then Configure;
  2. Turn off or adjust System Protection; and
  3. Apply and then confirm Yes.
If you elect to just reduce the size of your System Restore file, create a restore point to be safe.


e. Password Protection and Encryption For Flash and External Drives

Windows 7 inclusion of Bit Locker to Go now allows a user to encrypt and password protect USB or external drives with little to no trouble at all.


  1. Go to your Computer icon, right click on the drive you wish to protect and Turn On Bitlocker;
  2. A Password screen will appear to create your password for the drive;
  3. Save or Print Your Recovery Key;
  4. Start encryption and wait until complete and that’s it!!!
The next time that you insert the disk on Windows 7 system, the password screen will open up allowing you access to your files.

 NOTE: This will only work on Windows 7 systems and the USB /external drive will not work on other OS’s once encryption is complete.


f. Log On As A Guest

A new and great feature about Windows 7 appears in its guest log on. This is a great method for allowing children to use the system as this mode places limits on making system changes, installing software or writing to the disk outside the user profile. A great security feature is that all data saved inside the profile is deleted once the user logs off.

g. Browse In Private While On Public Computers
A new feature in IE8 is the ability to open the browser in an InPrivate Browsing session that allows you to perform banking and so forth from a public location without fear of leaving behind any residue. IE will not retain anything you do in an InPrivate Browsing session. You can perform this action if you are already within IE by selecting the Safety button and then InPrivate Browsing. This will open another IE window altogether. However, you can save a few steps by using the shortcut. Right-click the desktop IE icon, click InPrivate and the windows will open in an InPrivate session already.