google

বুধবার, ৯ সেপ্টেম্বর, ২০০৯

How to Install a SharePoint Server

SharePoint is a program introduced by Microsoft, which helps companies organize documentation, share files, and provide information to employees. The service is a repository of information, similar to a small Intranet. SharePoint server software provides content management for organization announcements and documentation, and features security for file sharing. It also provides forums and profile services similar to online newsgroups.

Step 1

Click the Windows "Start" button and select "Control Panel." Double-click the "Add/Remove Programs" icon. This opens a window that sets the components and applications installed on the server.
Step 2

Click the "Windows Components" tab. This lists the operating system applications installed and enabled on the computer.
Step 3

Click "Application Server" and click the "Details" button. Ensure that Internet Information Services and ASP.NET is enabled. These components are needed for SharePoint services to work. Click the "Ok" button. If any of them are not installed, they install at this point.
Step 4

Download the SharePoint service from Microsoft (see Resources for link). Save the download to a directory on your computer.
Step 5

Double-click the downloaded executable (.exe) file. Click "I accept the terms in the License Agreement" in the Start window and click the "Next" button.
Step 6

Select "Typical" from the installation options. This installs the software with a local SQL server. If the SQL Server is on another host computer, select "Custom" to enter the server's name. Click the "Next" button.
Step 7

Test the installation completion. A local webpage is opened once the installation process is finished. The screen gives you a report of services installed and notes if there were any errors during the process

বৃহস্পতিবার, ২৭ আগস্ট, ২০০৯

Make an External Drive Your Main Hard Drive

Step 1

Prepare the USB drive. Install your operating system of choice to the USB drive. Also install any necessary drivers, their updates and operating system updates.

Step 2


Prepare your computer. Access your computer's BIOS and navigate to the Boot Order menu. This lists all available boot devices. Using the commands listed on the BIOS screen, select the option that resembles "USB device" from the list and move that to the top position.

Step 3


Shut down your computer.

Step 4


Attach your external USB hard drive. Plug this drive in to any of the available USB ports. If you are permanently attaching the drive to a desktop, use a rear USB port to protect the cable.

Step 5


Test the USB hard drive. Boot your computer to ensure the USB hard drive is successfully recognized. Also check the drive letter assignments for the built in hard drive and the CD-ROM (if present)

Retrieve a Lost Hotmail Password

Step 1


Click your email link in Hotmail. Click on the words "Forgot Password" found under the sign on link. On the next page, there are two ways to reset your lost password, "Verify Information and Reset Password Online" or "Send Reset Instructions to my Email Address".

Step 2


Answer the questions on the next page. This is the information you provided to Hotmail when you signed up for your account. Enter your country, state and zip code and the answer to your secret question.
Step 
3

Choose a new password. Make sure this is something you can remember but is hard for someone else to guess.

Step 4


Ask Hotmail to send the password reset information to your email if you do not remember the answers to the secret question. An email will arrive at the alternate email address you provided during registration.

Step 5


Open the email and click on the link. Follow the instructions to change your password.

Step 6


Confirm your new Hotmail password by signing into your Hotmail account. Save your new password in a safe place

Backup a Computer System on a Pen Drive

You know it has to be done---the infamous backup of all your personal computer files. What If your system crashes? You need to have another copy of your files. With the invention of the flash drive, backing up your personal data is no longer a hassle. By using a flash drive and Windows pre-installed backup program -- "Backup or Restore Wizard" -- you don't have to worry about losing files anymore.

Connecting the Pen Drive

Step 1

Plug the flash drive into an available USB port on your computer. You will hear a bell ring, indicating the computer recognized the drive. A bubble will also appear stating that the flash drive is installing, and then it will indicate that the drive is ready.

Step 2

The flash drive should appear in your list of drives as E:, F:, or G: drive. If the drive is not recognized, remove it from that USB port and try a different port.

Step 3

Once the flash drive has installed, click "Start," "All Programs," "Accessories," "System Tools," and then "Backup."
Operating the Backup Software

Step 1

The backup software will open, and the first screen is "Welcome to the Backup or Restore Wizard." Click "Next." On the next screen, make sure the "Back up files and settings" button is green. Click "Next."

Step 2

On the next screen, "What to Back Up", you can choose from "My Documents and Settings" (select this one if you save all personal files in the My Documents folder), "Everyone's documents and settings" (use if you are on a network or you share your computer with multiple users with logons), "All information on this computer" (if you want to back up the entire computer---make sure your flash drive has the same amount of gigabytes (GB) as your computer), or "Let me choose what to back up" (use this option if you save your personal files in a folder outside of the My Documents folder. You will be presented with a screen that will let you pick which folders you would like to back up.). Click a backup option and then click "Next."

Step 3

The next screen is "Backup Type, Destination, and Name," so click "Browse" next to "Choose a place to save your backup:" The default drive is "A:"; click "Cancel" and you will be given a "Save As" box. Click "My Computer" on the left side and then click on your flash drive---it should be drive "E:," "F:," or "G:." Click "Save." You will be back on the "Backup Type, Destination, and Name" screen. Enter a name for the backup--you may want to call it "My Backup" or "Main Computer Backup."

Step 4

The wizard is now complete, and the files will be backed up to your flash drive. Once done, you will be given a report on what was backed up. If any errors appear, check the flash drive and restart the backup.

How to Organize a Mobile Office

Working from the road is easier than ever, thanks to cell phones, laptops and internet cafes. Whether you're a salesperson, a small business owner or a Mom that seems to live in her car, you can organize your mobile office to suit your needs and help you be productive. There are plenty of office-on-the-go accessories, and it only takes a few tricks to organize your life from your car.

Step 1

Find a sturdy case to hold your laptop. It's an expensive mobile necessity, so you want to protect it. A case may have come as part of your laptop package, but you might want to choose one to match your personality. They're available in colors from basic black to hot pink.

Step 2

Buy a car charger for your laptop. You may have some down time when you can work on projects. Your computer will need to be ready and willing.

Step 3

Get the car charger for your cell phone. A telephone is an absolute necessity when conducting business and is probably your most important tool for a mobile office. You don't want to lose business just because your battery was too low.

Step 4

Shop the office supply stores for car organizers. You can find hands free sets for your phone, sticky notes for your dashboard and zippered containers to hold pens, pencils and calculator. A large container on the passenger seat can hold all these smaller items.

Step 5

Make good use of the limited space in your car, and use containers creatively. A laundry basket can hold books and product samples in the trunk so they won't fall all over the place. A kindergarten student's plastic milk crate does the same thing. Square or rectangular containers take up less room than round ones. If you put a folded towel underneath a container, it won't slide around during driving.

Use Microsoft Office OneNote 2007 on your Smartphone

Now you can use your Smartphone to capture the ease and versatility of Microsoft Office OneNote when you're away from the office. It can work on either your Smartphone or Pocket PC. It's easy to synchronize with Windows Mobile

Step 1

To hook up your mobile phone with MS OneNote, follow these easy steps:
Step 2

1. Connect your phone to your computer and Microsoft ActiveSync should start automatically.
Step 3

2. When prompted, download Microsoft Office OneNote Mobile to your phone.
Step 4

3. Now you can use your mobile phone to take notes, organize existing notes, and keep up with the million things that you have to track.
Step 5

4.The next time you connect your mobile device to your computer, your notes will be copied to the OneNote Mobile Notes in OneNote

How to Call cheap or free from Spain to the USA and the rest of the world

Are you tired of paying HUGE charges for calling from Spain to abroad?? I have been using for a while icallcheap.com which offers calls from 4 cents to 6 cents a minute (Depends on the hour you call, so you can get 4 cents all the time if you plan ahead). In any case 6 cents would still be very good.

They even allow calling cellphones for the same price! The best is the fact that you do not have to be buying cards all the time, just remembering the 902 number is enough! You avoid cutting calls short (i.e.: when a phone card finishes all of a sudden)

Step 
1

Call from any phone line in Spain to 902-999-641.
Step 
2

When the operator (robot :)) requests dial 1 + 00 + country code (USA is 1) + area code + number

For example to call to the NY number 212-345-6789, you would dial 902-999-641. 

Following the operator instructions:
Dial 1-00-1-212-345-6789

সোমবার, ২৪ আগস্ট, ২০০৯

How to Remove a Linux Partition in Windows XP

How to Remove a Linux Partition in Windows XPA Linux partition is a portion of your hard drive that has been set aside for use specifically by a Linux operating system. If you have installed Linux from inside Windows Xp (as opposed to completely reformatting your hard drive), the Linux installation program will automatically create the partition for you. Removing the partition will remove the operating system from your computer. A Linux partition can be removed from your computer in Windows XP by following just a few simple

Click on the "Start" menu. Select the "Settings" submenu, and then the "Control Panel" icon.

Step 2

Click on the icon that reads "Add/Remove Programs."

Step 3

Search for the icon that represents the Linux operating system you've installed. For example, if you've installed Ubuntu on your computer, you'll be looking for the icon in the "Add/Remove Programs" window that reads "Ubuntu."

Step 4

Click on the icon. Next, select the "Remove" icon.

Step 5

Follow the uninstaller instructions that have appeared onscreen. These will guide you through the process of removing your Linux opwhich will remove your Linux partition along with it.

How to Change a Linux Partition

Step 1

Open a Terminal window. The Terminal window is found in the operating system main Application menu under either "System Tools" or "Utilities." You will be presented with a command prompt where you will type the following commands.

Step 2

Type the command "su" to switch to the root user.

Step 3

Type the command "gparted" to start the partition editor.

Step 4

Choose the hard disk that you want to edit in the drop-down box in the top-right corner. You will not be able to edit a partition that is already mounted.

Step 1

Choose the partition you want to resize by clicking on it in the main Partition window.

Step 2

Click on the "Resize-Move" option found under the Partition menu in the main task bar.

Step 3

Type the new partition size in the "New Size (MiB):" field.

Step 4

Click "Apply" in the task bar to change the size of the partition.

Step 1

Choose the partition you want to change by clicking on it in the main Partition window.

Step 2

Choose the "Format To" option found under the Partition menu in the main task bar.

Step 3

Choose the file system format that you want. Note: This will delete all the data on that partition.

Step 4

Click "Apply" in the task bar to change the size of the partition.

Step 1

Choose the partition you want to delete by clicking on it in the main Partition window.

Step 2

Click on "Delete" in the main task bar.

Step 3

Click "Apply" to delete the partition

How to detect a Trojan with DOS

Step 1
Open a DOS command prompt
Open a DOS command prompt

Open a command prompt ( dos window ), by selecting

START >> RUN

Step 2
call the command prompt box
call the command prompt box

type in the letters CMD and press OK

Step 3
netstat is the dos command to show you connections
netstat is the dos command to show you connections

type in netstat -a and press enter to show you all connections to your PC

Step 4
your pc connections are here
your pc connections are here

you should see a list of all connection your PC is making, locally as well as remotely.

Step 5
typical output from netstat -a
typical output from netstat -a

This image shows some typical connections that your PC may display when running netstat -a

Step 6
netstat -ab
netstat -ab

type in netstat -ab and press enter, this will show you what programs are making the connections

Step 7
typical netstat -ab output results
typical netstat -ab output results

you may have to wait several minutes for all the connections to display and you might be amazed at what you see.

Step 8
verify that you are running Internet Explorer if you see these results
verify that you are running Internet Explorer if you see these results

some connections you see will be obvious, iexplorer.exe is Internet explorer , and you can see that it's making connections.

if you see iexplorer.exe and you don't have Internet Explorer open, then you probably have a Trojan.

Step 9

if you see a program making any UDP OR TCP request to remote destination, you can search google or yahoo to determine what the program is, and how to remove.

রবিবার, ২৩ আগস্ট, ২০০৯

Make Windows XP Looks Like Ubuntu

People like to modify their OS for self satisfaction. Here are the ways Ubuntu fans can get the Ubuntu mood in their Windows XP based desktop.

ubuntu-logo

Firstly, if you haven’t patch your uxtheme.dll file to enable non-Microsoft release visual style to be loaded in Windows XP, get the patch by Windows X at Softpedia . Run the file, follow the instructions, install, and reboot your computer.

Once you’ve done that, download Ubuntu Visual Style made by FioreSSJ for Windows XP at DeviantArt. Copy appropriate files in the zip file to appropriate folder. As examples:

  • Files in Wallpaper folder to C:\Windows\Web\Wallpaper..
  • Files in Cursor folder to C:\Windows\Cursors..
  • Files in Fonts folder to C:\Windows\Fonts..

and the rest to C:\Windows\Resources\Themes\Ubuntu (create this ‘Ubuntu’ folder yourself)..

Next, load the Visual Style by clicking the file ‘Human’. Click Apply in the Display Properties window and see the result.

The transformation that depends on Visual Style, wallpaper, cursor, and fonts only is not good enough isn’t it? Now, it’s time for the icons and other system files.

Get Tango Shell Patcher which will integrate Tangerine Icons set used by Ubuntu 6.10 into your system files as easy as installing other piece of software. Run the file and follow the instructions ahead..and voila!

You’ll get the result like this:

screenshot-xp-ubuntu

Fix Corrupted Files in Windows XP

My friend ask me how to fix his corrupted XP files (mostly Windows System Files).
Well, actually that problem can be solved easily, using this few steps. This is what Im going to share with you today.

The things that you will need:

Windows XP Operating System

Windows XP CD

Steps:

1) First place the CD into your CD/DVD Drive.

2) Go to start

3) type “run”

4) type in “sfc /scannow” (without the “)

Now, it should load and fix all your corrupted file on Windows XP

Disable Vista User Account Control

Windows Vista is Microsoft’s next operating system after its highly successful predecessor, Windows XP. I bought an OEM copy of Windows Vista Home Premium a few months ago alongside some computer hardware that were meant for a pc upgrade. As expected, the installation was a breeze, but there is a security feature in Windows Vista that made me felt uneasy, which is the User Account Control that pops-up every time you want to install or run an application.

So, how to disable the User Account Control in Windows Vista?
Here are the solutions that I’ve tested to be successfully working:

Method 1 : Using msconfig utility

1.Go to run/start search menu. Type in “msconfig” (without quotes) and press enter run the utility.
2.Click on Tools tab. Click on Disable UAC and then “Launch”. A command prompt window will open stating that the operation has completed successfully.
3.Restart your computer.

Method 2 : Using Control Panel

1.From start menu, go to Control Panel
2.Click on Add/Remove User Account
3.Click on “go to the main User Account page” link.
4.Click on Turn User Account Control on or off. Unchecked the check box that will appear next.
5.Reboot your computer

Linux Basic Command

For changing directory / to /etc

[root@pc1 /]# cd /etc

One step back /etc to /

[root@pc1 etc]# cd ..

Go to previous working directory

[root@pc1 /]# cd -

Go to current login user home directory

[root@pc1 etc]# cd ~

Show the contents of /etc in single color

[root@pc1 ~]# dir /etc

Show the contents of /etc in different colors with nature of contents

[root@pc1 ~]# Ls /etc

create a folder on root partition

[root@pc1 ~]# mkdir /disk

Create a folder in /disk

[root@pc1 ~]# mkdir /disk/dir

Create multiple folder in multiple directories with single command

[root@pc1 ~]# mkdir /etc/dir1 /var/dir2 /usr/dir3

Create multiple folder in same directory

[root@pc1 ~]# mkdir dir1 dir2 dir3

Copy a file in directory

[root@pc1 disk]# cp file dir

Copy a file from /disk/file and paste it in /disk/dir/

[root@pc1 disk]# cp /disk/file /disk/dir

Copy a directory with -r option

[root@pc1 disk]# cp -r dir dir2

Copy a file from /disk/file and paste it in /etc with myfile name

[root@pc1 disk]# cp /disk/file /etc/myfile

Remove a file

[root@pc1 disk]# rm file

Remove a file with forcefully option

[root@pc1 disk]# rm -f file

Remove a directory with out -r option and you face will an error

[root@pc1 disk]# rm dir

Remove a directory with -r option

[root@pc1 disk]# rm -r /disk

Remove a directory with forcefully option

[root@pc1 disk]# rm -rf dir

Move /etc/dir1 to /disk/ with different name

[root@pc1 disk]# mv /etc/dir1 /disk/mydir

Rename the folder name mydir to dir

[root@pc1 disk]# mv /disk/mydir /disk/dir

Rename the file name with myfile

[root@pc1 disk]# mv file myfile

Read a file page by page with less command

[root@pc1 disk]# less /etc/grub.conf

Read a file page by page with more command

[root@pc1 disk]# more /etc/qrub.conf

Read first ten lines of grub.conf

[root@pc1 disk]# head /etc/grub.conf

Read last ten lings of grub.conf

[root@pc1 disk]# tail /etc/grub.conf

Read first 12 lines with -n option

[root@pc1 disk]# head -n 12 /etc/grub.conf

Read last 11 lines with -n option

[root@pc1 disk]# tail -n 11 /etc/grub.conf

Copy the contents of /etc/grub.conf in /disk/file

[root@pc1 disk]# cat /etc/grub.conf > /disk/file

Append the contents /etc/mtab in /etc/file

[root@pc1 disk]# cat /etc/mtab >> /disk/file

Merging tow commands with pipe sign output of the first command is input of second command

[root@pc1 disk]# cat /etc/squid/squid.conf I more

Count the total lines of squid.conf

[root@pc1 disk]# cat /etc/squid/squid.conf I wc -L

Show only spool words in squid.conf

[root@pc1 disk]# cat /etc/squid/squid.conf I grep spool

Flush the contents of file

[root@pc1 disk]# cat /dev/null > /var/log/messages


Very Fasts Math Trick of Calculation

How to Clean a Computer's Insides Safely

Check your owner's manual. If the manufacturer has provided specific instructions, follow them.

Step 2

Get any supplies you might need: a can of compressed air, Endust for Electronic or any household plastic or metal cleaning fluid, a soft brush (such as a paintbrush) and an anti-static rag, plus a dust mask if you're allergic to dust.

Step 3

Shut down the computer.

Step 4

Leave the computer plugged into the surge suppressor.

Step 5

Disconnect all peripherals from the computer.

Step 6

Remove the computer cover (see your owner's manual for instructions).

Step 7

Ground yourself to the computer with any professional grounding equipment you have. Otherwise, ground yourself by touching a metal part of the chassis.

Step 8

Spray compressed air on the fan blades, power supply chassis, drive chassis and circuit boards.

Step 9

Gently brush off dust that the forced air didn't dislodge.

Step 10

Brush any remaining dust out from the bottom of the chassis.

Step 11

Spray Endust for Electronics or another cleaning fluid onto an anti-static rag.

Step 12

Wipe the inside and outside of the cover thoroughly.

Step 13

Replace the cover and reconnect the peripherals

Repair Corrupted PDF File

While Adobe Reader 8 is out with a new interface that blend well with Windows Vista, there are no built-in functions to repair corrupted PDF file, merge few PDF files into a single PDF, split a large PDF file into smaller PDF files, encrypt PDF file, decrypt PDF file, etc.

Handy and freeware version of PDF toolkits to complement Adobe Reader 8
If you are looking for some of these functions, then you will like to

SMS : Sending SMS with PHP and ActiveXperts (Part 1)

huif... I break almost 2 week for writing this blog. Actually not rest, busy with a project. Build academic information system for university :). Ok. Now, I continue with interesting topic: sending sms with PHP. My friends ask me how to send sms in PHP. They want to sell to radio programs or else. I ask, "Do You want a simple way or long way?". Most of them prefer simple way.

Portable Web Server: Using PortableApps

Portable Web Server Step By Step Tutorial - Part 1:Now days, portable flash drive is a popular gadget. Most of programmer have it. Now, we will give more value for this USB flash drive. We make this portable drive become portable web server. So, if you want to show your web application, just use USB drive and run.

Speed Up Web Page Loading

Do you have web performance problem? Do you want to increase web page loading? Here, I try to collect all thing, you must know, how to speed up web page loading at client side. Begin from browser, machine or hardware, until connection. Please tell us if you have more idea.

How u can remove top border from Blogspot?

Step 1:

On your Dashboard, select Layout. This will take you to the Template tab. Click Edit HTML. Under the Edit Template section you will see you blog's HTML.

[blogspot border]

Step 2:
Look for tags #header-wrapper and #header as below and change border to 0 then SAVE Template

#header-wrapper {
width:660px;
margin:0 auto 10px;
border:0px solid $bordercolor;
}

#header {
margin: 5px;
border: 0px solid $bordercolor;
text-align: center;
color:$pagetitlecolor;
}

Step 3: Add this code anywhere...

#navbar-iframe {
height:0px;
visibility:hidden;
display:none
}

শনিবার, ২২ আগস্ট, ২০০৯

Turn off the Computer Beeps

Normally Windows warning beeps are very useful to identify when problem happen. One internal speaker in your system casing creates these beeps. But some time when you are working with your laptop in the library and other quiet areas, then these beeps will be disturbing others. You can turn off all your computer beeps with editing registry keys.

Follow the given steps to turning off System Beeps:

  • First click on Start button then type Regedit in Run option.
  • Here locate the location to:
  • HKEY_CURRENT_USER\Control Panel\Sound

  • Here in right side panel, double click on Beep and change its value of NO. But next time you can turn on these beeps, simply give its value Yes.

  • Now close the registry editor and restart your computer after any changes to go into effect.

Displaying a Text Message before Logon

You can create a funny message or legal warnings for others just before logon to your computer. This is very useful if you want to give a message to new user about the use of computer. Edit the value of registry keys to create a banner message.

  • Click Start button then type regedit in Run option then press Enter for next.

  • Here locate the location to:

  • HKeyLocalMachine\SOFTWARE\Microsoft\Windows \CurrentVersion\Win Logon

  • Here in right side panel, right click to create a new string value LegalNoticeCaption and give it a value you want to see in the menu bar

  • Now again right click to create a new string value called LegalNoticeText and change the value you want to see in the dialog box

  • Now close the registry editor and restart your computer after any changes to go into effect.

  • Close All Windows Programs quickly

    A cool tip to minimize and maximize all your active windows programs. You can do all using your mouse, but if you want to do this with keyboard then simply press Windows key+M to minimize all active programs and later maximize it using Windows key+Shift+M.

    If you want to minimize the all active windows programs one by one then use the shortcut by pressing Alt+Space+N keys and sequentially maximize the active windows programs using shortcut Alt+Space+X keys.

    How you can add a Shortcut Key to Your Internet Connection?

    This basic and common way to dial the internet connection using giving path:

    • Click on Start Button > sittings then click on Network and dial-up connections option, here you can dial your internet connection.

    • Another way to dial your internet connection if you have a shortcut to your internet connection on your desktop. Simply boot your system and dial your internet connection from your desktop shortcut.

      A new cool tip to dial internet connection with out using the mouse, simply add a shortcut key that will allow you to do this. Just right-click on your Internet connection and go to Properties option. Click in the Shortcut Key box and then press a key combination that you would like to use here like (Ctrl-Alt-I). When you have a combination you like, click OK. Next time no need to use mouse to run your internet connection simply use this shortcut from your keyboard, you can just press your shortcut key combination (Ctrl-Alt-I) to launch your Internet connection.

    Control all open windows using windows shortcut keys

    A cool tip to minimize and maximize all your active windows programs. You can do all using your mouse, but if you want to do this with keyboard then simply press Windows key+M to minimize all active programs and later maximize it using Windows key+Shift+M.
    If you want to minimize the all active windows programs one by one then use the shortcut by pressing Alt+Space+N keys and sequentially maximize the active windows programs using shortcut Alt+Space+X keys.

    শুক্রবার, ২১ আগস্ট, ২০০৯

    Change Your Windows Xp Boot Screen

    Browse to -C:\winnt\system32 or
    -C:\windows\system32
    and copy & paste logonui.exe into the same directory. It should name the copy: copy of logonui.exe Once you have done that, copy logonui.exe again and paste it to C:\ Now, open C:\logonui.exe with Resource hacker.

    Click on Action and then on Replace bitmap. If you are good with graphics you can make your own logon screen, you should be able to scroll thru the bitmaps in this file and figure out what's where. If your not great with graphics, you can download already made graphics and use them, or use them as a template. To set the size of Bitmap 100: Go into the \UIFILE\1000\1022\ tree and press CTRL+F Now, find Change the entire line to read: Where xxx is put the width e.g. 400rp (the rp @ the end is needed) and where yyy is, put the height e.g. 1000rp. Make sure the image doesn't go over the login names because it slows down to a snails pace (fading etc.)

    Once you have everything the way you want it, just save the file to C:\ and close Resource hacker. Now, your going to need a Windows 98 bootdisk so you can get in dos mode. You can go here and download a bootdisk, if you don't already have one. Once at the DOS prompt, you must copy the new logonui.exe file over the existing one. Go to the directory where you extracted the new logonui file (C:\logonui.exe) and type: copy logonui.exe c:\windows\system32\ or C:\winnt\system32 on some systems. It will ask if you want to overwrite the file, just say yes.

    All done! Once you reboot you should see your new logon screen. If for some reason you screwup, go back in dos and copy the copy of logonui.exe file and replace it with the one in C:\winnt\system32 or C:\windows\system32.

    Create password protect zip files in windows XP/windows vista

    How to compress files and folders in Windows XP/Windows Vista?

    • Locate the file you want to zip.
    • Right click on the file and select “Send To” and “Compressed (zipped) Folder.” This will create a new compressed folder with the same name as the file but with the extension .zip.
    • To add another file to this zip,right click on the other file and select “Copy.”
    • Next right click on the compressed folder created in step 2 above and select “Paste.” The copied file is pasted into the compressed folder. Repeat steps one to four until all the files are copied to your compressed folder.

    How to password protect zip file or compressed folder in XP?

    • Right click on the compressed folder and select “Explore.”
    • In “File,” select “Add a Password.” Enter the password and confirm the password.

    How to remove or disable password for zip file or compressed folder?

    • Right click on the compressed folder and select “Explore.”
    • In “File,” select “Remove Password.”


    However file names in password-protected zipped or compressed folder are visible though the files themselves are inaccessible without the password. If you like to hide the file names, zip or compress the file(s) and add it to the password protected zipped or compressed folder.

    How to connect a PC running windows Vista to a wireless network?

    his tutorial is on how to connect to a wireless network in Windows Vista.You can connect your PC, running Windows vista as OS, to a home wireless network or a public network very easily.Infact this has been made much easier in vista, than in window XP.

    Moreover, Windows Vista can even detect a non-broadcasting wireless network (hidden SSID), thereby enabling you to configure it as a preferred network. This is a new feature in Windows vista that Windows XP lacks.

    How to connect a PC running windows Vista to a wireless network?

    First, make sure that you have a wireless adapter and a driver installed on your computer.Otherwise do ensure that you set up an adapter and the appropriate driver(driver for connecting to the wireless network).

    Then go to the Start menu and click on “Connect To”

      How to connect a PC running windows Vista to a wireless network?

    A network window will pop up that will show all the available connections, like dial-up, VPN and wireless.Choose the wireless connection and click the Connect button.

      How to connect a PC running windows Vista to a wireless network?

    If the network you try to connect is a security-enabled network, that requires authentication,then:

    • the connection will happen automatically,if the network key is automatically provided by your network or system administrator (i.e.,if the network supports IEEE 802.1x)
    • Else you need to edit the network key, before you can connect.The key can either be a WEP or a WPA or a WPA2 encryption key.

    The connection will show up as connected,once you are actually connected to the wireless network.

      How to connect a PC running windows Vista to a wireless network?

    You may see and modify the connection settings of the wireless network by right clicking on the connected wireless network and choosing “Properties”.

      How to connect a PC running windows Vista to a wireless network?

    You may even set up the network as the default wireless network.

    How Can You Convert FAT32 to NTFS in Windows XP or vista?

    FAT32 and NTFS:

    FAT32 and NTFS are file systems that may be used on a Microsoft Windows hard disk partition.NTFS provides a number of improvements over FAT32, including:

    • Second copy of boot sector for improved reliability
    • Compression
    • File permissions
    • Improved recoverability
    • Improved performance on large volumes
    • Improved efficiency in disk space utilization
    • Improved fault tolerance

    How to convert FAT32 Disk to NTFS in Windows Vista and XP with the Convert utility?

    Backup data in the partition or drive that you want to convert, to another drive or partition or another computer system or PC or any other storage media.

    In Windows XP

    • Click <Start> –> <Run>
    • Enter “cmd” into the text field labeled “Open“.
    • Click <OK> button
    • If you want to convert drive D (D:), enter the command “vol d:” in the command window, to find the volume label for the D: partition
    • Then enter the command “convert d: /fs:ntfs” to convert the D: partition from FAT32 to NTFS
    • When prompted, enter the volume label for the partition

    In Windows Vista

    • Click <Start> sphere
    • In the Start Menu search box, simply enter “cmd” and hit enter.
    • If you want to convert drive D (D:), enter the command “convert d: /fs:ntfs” to convert the D: partition from FAT32 to NTFS

    You can use the “convert /?” command to bring up information on how to manage the conversion.As long as the drive or partition or disk that you want to convert is not in use, FAT32 to NTFS conversion will happen without any issues. Otherwise, the conversion must be postponed for the next time you reboot the computer system or PC. On Windows Vista start up, you will be prompted to either cancel or carry on with the conversion. The FAT32 to NTFS conversion process is fully automated and it involves a couple of restarts.Let Windows vista or XP to do the conversion.

    Guide to Dual Monitors system in Windows

    One of the reasons that computers are getting cheaper is because monitors are getting cheaper. The video hardware that drives them is also more affordable than ever before. Microsoft realized that when they released Windows 98 and built in support for multiple monitors. That support continued with 98SE, 2000 and ME. If you use NT, you're not out of luck, but this article won't help you. Your best alternative is to use a dual headed card, like the Matrox G450, one with two monitor outputs.

    Getting dual monitors to work correctly seems to be a hit or miss affair. In many cases, it's just a matter adding a second video card and monitor and rebooting the computer. In other cases, you need to do some cyber gymnastics to get things working correctly.

    The process is the same no matter which version of Windows you are using. First, be sure that your system is working correctly. Boot into safe mode and verify that you have only one video adapter and monitor showing in the Device Manager. If there are more, but you only have one adapter and monitor, you'll need to remove the extras.

    Once you're sure that your video setup is working fine, turn off the system and look inside. Remember that you'll need a video card for each monitor that you plan to run under Windows. That means that your system must have a free expansion slot for each one. You may find that you have problems with IRQ sharing or DMA channels, depending on your motherboard and video card, although many video cards seem relatively intolerant of IRQ and DMA conflicts. Install your video card in the appropriate slot, and then connect the monitor.

    Restart your system. If all goes well, your computer will boot the same way that it always has…the second monitor will still be dark. If your system prompts you to login, do it. You may need to install drivers for your second video card, depending upon whether or not Windows has built in drivers or not. Just follow the on-screen instructions.

    Once the drivers are installed, check the Device Manager to make sure that the display adapter is properly detected:




    Once the drivers are installed, open the Display Properties window. In the settings screen, you should see something like this:




    You'll see that a second display is shown. Click on the grayed out display marked as "2". The window will change slightly to look like this:



    You can then change the desktop resolution and color depth. Once you've done that, click your mouse on the "Extend my Windows desktop onto this monitor" to enable it. Remember that the resolution, color depth and refresh rates of each monitor adapter combination don't have to be the same. The window should look something like this now:



    Click on OK and your second monitor should activate itself as an extension of the first:



    You'll find that you can change the relative geometries of the two monitors by moving their respective boxes around in the Settings window.

    What if things don't work?

    If you can't get your second monitor to work at all, there are a couple of steps that you can take. In some systems, you need to change a BIOS system to allow the PCI display adapter to initialize first, instead of the AGP adapter. You should be sure that both of your display adapters are supported by the version of Windows that you are using.

    Also, be sure that the display parameters (resolution, color depth, etc.) are within your monitor's limits. Windows allows you to select different display parameters for each monitor, so even though one might have lower performance than another, you'll still be able to use it.

    Windows 2000 driver support for older PCI cards may be a little iffy. Many popular cards do have drivers, but just about as many don't. Also, remember that your computer has only one AGP slot, so you can only use one AGP card. The rest have to be PCI or ISA.

    And speaking of ISA video cards, I'd really recommend against using one. You'll find that your video resolution and color depth are very minimal and you may create more problems with IRQ sharing than you want to get into. Also, of course, many newer motherboards don't have ISA slots.

    If you have a motherboard with one of Intel's i815 chipsets, you may have onboard AGP video. While it might be tempting to use the built in video and get a separate PCI card for the second display, please let me talk you out of it. Almost any AGP card that you buy, even the cheapest one, will outperform the video from these chipsets. If the onboard video is your main video source, put your money into a new video card before you consider adding a second monitor.

    Dual monitor setups are a great way to expand your desktop without buying a monstrously expensive large monitor and, in most cases, it's very easy to do. A little preparation before you do the job should result in a whole lot of fun at the end.



    Fix System32 Errors

    What Causes System32 Errors?

    Your Windows System32 folder (C:\WINDOWS\System32) contains essential operating system files that Windows needs to run smoothly. These files include drivers to run your hardware components, Windows shell extensions, and system restore points among many other critical components. System32 errors can be the result of corrupt or damaged core system files (such as Config.nt, autoexec.nt, and command.com), install and uninstall files and settings, and downloaded file components needed to run new software.

    Corruption in your System32 directory can happen very easily, especially without regular Windows system maintenance.

    Fix System32 errors instantly with our free, recommended download from RegCure: Free Download

    How to manually troubleshoot System32 errors:

    The sheer number of System32 files can make troubleshooting file-by-file a difficult task. However there are a few tips that can help in some cases.

    Try our recommended instant fix for System32 errors: Free Download Here

    For Windows or file system-related System32 errors, the following steps may help:

    • Disk Cleanup. Disk Cleanup may help with certain System32 errors. To access disk cleanup, use the following click path:
      Start > All Programs > Accessories > System Tools and choose Disk Cleanup.

    • Try running the program that's giving you a system32 error message in "Compatibility mode". Occasionally, running an older program (pre-Windows 2000 Pro or XP) can return system32 errors of different kinds. Windows XP has a "compatibility" mode that allows Windows to run that particular application as if it were an older version of Microsoft Windows. To run a program in compatibility mode, click
      Start > All Programs > Accessories > Program Compatibility Wizard
      Follow the easy guide steps to run the application like an older version of Windows. This may resolve the system32 errors when you're trying to run a specific program.

    Alternatively, you could try to manually replace and edit the files in your System32 folder, but this is can be very dangerous to the rest of your Windows File System. The interdependencies between files and components stored in the System32 folder are vast, and there's a very good chance that further damage to your Windows PC could result with manual editing.


    Registry Cleaners and Optimizers are great for fixing System32 errors and we strongly recommend trying a free download of RegCure: Free Download Here

    STOP Errors in Windows XP and Windows 2000 (Blue Screen of Death)


    What are Windows Blue Screen of Death STOP Errors?

    STOP errors and they’re associated error codes (i.e. 0x0000001E) most commonly show up during Windows boot. They usually indicate a corrupt file system or incompatibility with a particular piece of hardware you have installed. These errors are a very serious and can render your computer unbootable.

    Fix Windows Errors Automatically with RegCure PC Optimizer: Free System Scan (Recommended)

    What causes STOP errors and Blue Screens of Death?

    If you have recently installed a new piece of hardware into your computer such as a new video or sound card, USB or controller card, or even new RAM chips, you may encounter a Blue Screen and STOP error.

    Additionally, severe damage or corruption to your Windows installation or system registry can result in Blue Screens of Death and STOP errors.

    Less often, damaged or dying hardware such as your CPU processor, RAM memory, or hard drive can return Blue Screens and STOP errors.

    What do STOP Error Codes Mean?

    Each STOP error code has a specific meaning. That is, it has a specific code tied to it that pretty much only Windows programmers understand. They descriptors may look something like this:

    Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL

    Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED

    Stop 0x0000002E or DATA_BUS_ERROR

    As you can see, without a Computer Science degree, it’s tough to figure out what actions to take as a result of the descriptions attached to the various STOP error codes.

    How to manually fix STOP errors and Blue Screens of Death:

    In the case of hardware that causes Blue Screens of death and STOP errors, safely removing any recently installed hardware may relieve the error.

    For Windows or file system-related STOP errors and Blue Screens, the following steps may help:

    • Restart Windows (if your computer is frozen you may need to do this via pressing and holding down the power button to manually shut the computer down, then pressing it again to restart.)
    • As Windows is restarting, continually tap the “F8” button until a boot menu appears with a number of options you can use your arrow keys to navigate to.
    • Select “Last Known Good Configuration”

    Windows will hopefully restart with the last configuration of settings that worked. This may resolve the Blue Screen and STOP errors in some cases.

    Recommended Automatic Solutions:

    Check your Windows Registry for errors and fix them instantly: Free RegCure Download

    This will help with many STOP errors you are likely to see, including 0x00000019, 0x0000001E, 0x00000024, 0x00000050, 0x00000051, 0x0000006F, 0x0000007A, 0x0000007B, 0x0000007E, 0x0000007F, 0x0000009C, 0x000000C2, 0x000000C5, 0x000000D1, 0x000000EA, 0x000000ED, 0x000000F4, 0x1000008E.

    FIX Windows Fatal Exception Errors

    What is a Fatal Exception Error?

    Fatal exception errors often occur during your computer’s shutdown process, when you boot your computer, or when you launch a program in Windows. These annoying errors often read like this:

    • ‘A fatal exception KRXZ has occurred at 0000:xxxxxxx3’

    Fatal exception errors usually appear due to software programs trying to do things like this:

    • A program attempts an 'illegal operation', not understood by the operating system

    • A software program tried to get access to “junk” or non-working sections of a program's source code

    • The permissions for accessing a certain area of software program code aren’t set up correctly

    Fix Fatal Exception errors instantly with RegCure: Free Diagnostic Scan

    What causes Fatal Exception errors?

    In the above scenarios, your computer rejects what a software program is trying to do, and lets the Windows operating system know it isn’t happy. Windows then gives you a fatal exception error dialog message.

    How to manually fix Fatal Exception errors:

    Fatal exception errors are very difficult to troubleshoot.

    Repair Windows automatically with RegCure: Free Download Here (Recommended)

    Usually, these types of Windows errors are not recoverable and you have to manually restart by doing the following:

    1. Press and hold down your computer’s power button for about 5 seconds.
    2. You will notice the computer manually power down.
    3. Once it’s fully shut down, press and release the start button on the computer to restart Windows.

    Fatal exception errors can be caused by certain kinds of settings, including those in the Windows registry system, that are loaded automatically when your computer starts. Keeping your Windows registry clean and controlling the number of programs that load at Windows startup can help greatly.

    PC optimization programs like RegCure (free download) can help you easily control what programs Windows is allowed to load automatically at startup and optimize and compress your registry system for optimum performance.

    How Cybersquatters Make Money?

    Getting clicks and traffic by accident appears to be big business. And by ‘big’ I mean worth MILLIONS of dollars! While typosquatting is unfortunately not a new online marketing practice, its use and, moreover, its ABUSE has grown significantly and exponentially since 2000.

    Cybersquatting means registering, trafficking in or using a domain name with the intent to profit in bad faith from the goodwill of a trademark that belongs to someone else. It commonly refers to the practice of buying up domain names that use incorporate the names of existing businesses with the intent to sell the names for a profit to those businesses. The term derives from squatting, the practice of building some kind of home or dwelling or in some way using someone else's landed property without their permission.

    Typosquatting, although very similar to cybersquatting, has a slightly different, but much more serious purpose: it is employed by people who want to divert traffic to their websites. Typosquatters typically purchase a domain name that is a variation of a popular domain name with the expectation that some of the traffic for the original web site will stray to theirs by capitalizing on web surfers´ misspellings of those popular domain names.

    How can large companies, with all their IT experts, not foresee something like this happening? How come they allow tons of opportunistics to make revenue every time innocent Internet users mistype the original brandnames or trademarks? The answer is, cybersquatting originated at a time when most businesses were not savvy about the commercial opportunities on the Internet. Since opportunities like these rarely knock on one’s door more than once, these so-called ‘entrepreneurs’ reserved and registered domain names corresponding to the names of well-known businesses with the intent of selling the names back to the companies when they finally woke up. Commercial domain names are obtained from companies that are authorized to ensure that a domain name you want is unique (no one else already has it) and issue it to you if it is. However, these registries make no attempt to determine whether the domain name is one that rightfully ought to go to someone else. The principle is ‘First come, first served.’ Panasonic, Fry's Electronics, Hertz and Avon were among the first targets of cybersquatters. Well-known products, sports and political figures and other celebrities are also among the victims. Today, although the practice itself is growing, opportunities for cybersquatters are rapidly diminishing, because most businesses now know that nailing down domain names is a top priority. Although trademark laws may offer some protection, it is often cheaper to buy the domain name from the cybersquatter than it is to sue for its use: these processes cost money, and though you may be able to recover your costs and attorney fees if you win, there is no guarantee; it's completely up to the judge. Examples of domains sold by cybersquatters to companies include drugstore.com, furniture.com, gardening.com, and Internet.com. Cybersquatters may also regularly comb lists of recently expired domain names, hoping to sell back the name to a registrant who inadvertently let their domain name expire.

    How do you know if the domain name you want is being used by a cybersquatter? As a general rule, first check to see if the domain name takes you to a legitimate website. If it takes you to a website that appears to be functional and reasonably related in its subject matter to the domain name, you probably are not facing a case of cybersquatting. But if you own a trademark and find that someone is holding it hostage as a domain name until you pay a large sum for it, you may be the victim of cybersquatting. You can sue to get your domain name -- and possibly some money damages -- under a 1999 federal law known as the Anti-Cybersquatting Consumer Protection Act or you can initiate arbitration proceedings under the authority of the Internet Corporation of Assigned Names and Numbers (ICANN) and win the name back without the expense and aggravation of a lawsuit. The ICANN arbitration system is considered by trademark experts to be faster and less expensive than suing under the ACPA, and the procedure does not require an attorney.

    Typosquatting, however, is a much more dangerous practice because it is commonly used by pornographers. Typosquatting is based on the probability that a certain number of Internet users will mistype the name of a web site (or its URL) when browsing the web. Typosquatters usually register several possible typos for a brand name or web site known for its high traffic, then monitor to see how many clicks per day each of their typo domain names receives, and finally use the information to sell advertising for the web sites that receive a high volume of accidental traffic. Ironically, advertising revenue might come from selling ads to the original site's competitors or by providing redirect pages to related products or services.

    There are multiple ways in which typosquatters may turn typos into revenue. When surfers mistype popular URLs, squatter companies throw up ads in hidden browser windows, making money off of ads few people see. As a consequence, companies such as AT&T Corp. and The New York Times are paying for ad impressions even though the ads are buried. Finally, when visitors try to close their browsers or otherwise leave the web site in question, there is one more attempt at monetizing the mistake. Another browser window usually pops up, with a different web site’s name. This one contains more advertisements. It’s a never ending story that sure gets on the nerves of most of us!

    The success of companies that practice Cybersquatter points out some serious flaws in the Internet's domain name system and in two of the web's most prominent revenue models: Affiliate Programs and Advertising Reselling. Advertising resellers such as 24/7 Media Inc., Advertising.com Inc. and iBoost Technology Inc. contract with large advertisers and then automatically feed ads onto thousands of web sites. The automated method of placing ads on sites can make tracking where those ads end up a very difficult task.

    Needless to say, typosquatters do not think there is anything wrong with using people’s errors to grow traffic. However, it is a whole different story when typosquatting is employed by pornographers to attract children to their websites. Until now, there have been few methods of stopping pornographers and others abusing the domain name system from misleading children and adults into accessing sites masquerading as popular legitimate sites. Many adult web sites misrepresent their content or the nature of their sites by registering domain names that are intentionally confusing, using page coding designed to mislead search engines, distributing false advertising to promote site traffic, or hijacking visitors of another site.

    The problem is particularly serious when children are involved. Just as adults do, children get spam and unsolicited instant messages with graphic sexual images, content, or links to pornographic sites. Statistics show that 20% to 30% of traffic to adult sites is comprised of children. Many masquerade as messages from trusted friends or web sites. Children also may be tricked into visiting a pornographic site when they search for age-appropriate words or phrases on a search engine. Even if you find it hard to believe, depending on the type of marketing or advertising model used by a particular web site, there may be no incentive to filter children. In fact, targeting children may be an effective way of increasing ad revenue. The name of the game is web site traffic where adult sites are concerned. So they cannot rely just on keywords to increase traffic.

    As part of the Amber Alert legislation, typosquatting is now a crime in the United States. Porn network czar John Zuccarini was the first person charged under the new typosquatting law by the U.S. Attorney’s office in the Southern District of New York and pleaded guilty in 2004. He was sentenced to two and a half years in prison. Until the enactment of the Protect Act (most commonly known as the ‘Amber Alert’ legislation), stopping typosquatters was a civil matter, or perhaps (under extraordinary circumstances) a consumer fraud matter. The sites Zuccarini has been found to have cybersquatted include those referring to Nicole Kidman, Backstreet Boys, Encarta and others. His manipulation of Aaron Carter's and Britney Spears' names is among his more recent abuses. Courts have already held that there is no legitimate purpose for Zuccarinin registering and using the typo-domains other than to trade on the popularity of the underlying domain names, celebrities and products involved.

    In summary, cybersquatters and typosquatters are unethical companies and individuals that want to profit from your family’s and your own confusion and spelling mistakes. If you want to help protect your children and others online, drop by http://www.Anti-SPAM-League.org website and report those who are engaged in these and other unscrupulous online marketing practices. Become a member for free and sign up to receive our Newsletters with useful and valuable information on how to handle abuses on the Internet. Also, look for more articles on related topics on our web site. You will learn how we can really make a difference by working together with consumers and companies to preserve Internet users’ freedom and privacy while promoting loyal advertising and good art on marketing practices.