Saturday, August 15, 2009

avast anti virus4.8 Prof edition FREE download


Avast is top downloading anti virus program.....it has new features....very compatible & user friendly.

avast! anti virus Home Edition is FREE to use but it is necessary to register before the end of the initial 60 day trial period. Following the registration you will receive by e-mail a license key valid for a period of 1 year. After you have downloaded and installed the program, the license key must be inserted into it within 60 days. The registration process is very easy, and it will take you only a couple of minutes.



U want to download avast! Home E
dition anti virus then click the below image and select the language and go for it.
download by clicking the below images.......all the best

Thursday, August 13, 2009

Computer Hacking


Computer Hacking

Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identify theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.

Tuesday, August 11, 2009

Recover your files from formatted hard drives

How do I recover the files from formatted hard drives?

What is format?

Prepare a storage medium, usually a disk, for reading and writing. When you format a disk, the operating system erases all bookkeeping information on the disk, tests the disk to make sure all sectors are reliable, marks bad sectors (that is, those that are scratched), and creates internal address tables that it later uses to locate information. You must format a disk before you can use it.

Note that reformatting a disk does not erase the data on the disk, only the data on the address tables. Do not be panic, however, if you accidentally reformat a disk that has useful data. A computer specialist should be able to recover most, if not all, of the information on the disk. You can also buy programs that enable you to recover a disk yourself.

The previous discussion, however, applies only to high-level formats, the type of formats that most users execute. In addition, hard disks have a low-level format, which sets certain properties of the disk such as the interleave factor. The low-level format also determines what type of disk controller can access the disk (e.g., RLL or MFM).

Almost all hard disks that you purchase have already had a low-level format. It is not necessary, therefore, to perform a low-level format yourself unless you want to change the interleave factor or make the disk accessible by a different type of disk controller. Performing a low-level format erases all data on the disk.

Explanation

The Format commands are typically run to prepare a new logical drives for use after Fdisked hard drive - enabling the installation of an operating system, application programs & eventual user data. The format command has been around for a long time, formerly they were stand alone DOS programs before being integrated into Windows.

Format partition

Please see: How do I format a hard drive?

Symptoms

Where previously the computer would boot and be usable, systems that have been Formatted often report the following errors: (these errors are frequently displayed on a black screen with white text.)

  • Operating System not found
  • Invalid or corrupt FAT
  • Cannot find file or program
  • Invalid command.com
  • Primary/Secondary Hard disk failure
  • Non system disk
  • Disk error

Or when a partition has been formatted, the all data would disappear.

To recover files from formatted drives, please follow this procedure:

1. Click the "Complete Recovery" button on the main window of Data Recovery Wizard.

Data Recovery Wizard

2. The first screen on the "Complete Recovery" tool will display a list of volumes found on the drives found in your system. If the volume does not have a drive letter, then the volume will be listed at the hindmost and the drive letter will be instead by "*".

3. You should choose the volume that was formatted and click "NEXT" to start searching on this volume.

Format Recovery

4. The Intelligent Searching module will scan on the selected volume, collect and analyze every byte on the volume, then show you a list of volumes which are possible on it.

Format Recovery

Format Recovery

5. After this scanning is finished, Data Recovery Wizard will permit you choosing 6 volumes at best to recover the data. And then, press "NEXT" button. The Data Recovery Wizard will launch the "Building directory" procedure to searching the files. You will see file/folder tree very soon.

Format Recovery

6. Select the file or directory that you want to recover and press the "Next" button.

Format Recovery

7. Select a directory and press the "NEXT" button to save the data.

Please see "Complete Recovery" for more details.

NOTE: If the hard disk has mistakenly deleted volumes, hidden volumes, drives with failed operation/file system, you should use "Partition Recovery".

The demo version of Data Recovery Wizard gives you a much fairer idea about chances of data recovery from your hard disk before deciding upon the purchase. You can buy full version to recover data!

Buy Now free download

Caution: Saving file(s) to the partition or drive from where you are recovering data, for it may result in overwriting of data, and would result in permanent data loss!!!

Tips for Protecting Your Computer


1. Use protection software "anti-virus software" and keep it up to date.

2. Don't open email from unknown sources.

3. Use hard-to-guess passwords.

4. Protect your computer from Internet intruders -- use "firewalls".

5. Don't share access to your computers with strangers. Learn about file sharing
risks.

6. Disconnect from the Internet when not in use.

7. Back up your computer data.

8. Regularly download security protection update "patches".

9. Check your security on a regular basis. When you change your clocks for
daylight-savings time, reevaluate your computer security.

10. Make sure your family members and/or your employees know what to do if your
computer becomes infected.


Ten Tips To Secure Your Personal Computer


"Ten Tips To Secure Your Personal Computer"
1. Use “anti-virus software” and keep it up-to-date. Anti-virus software is designed to protect
your computer against known viruses. But with new viruses emerging daily, anti-virus programs
need regular updates. Check with the web site of your anti-virus software company to
see some sample descriptions of viruses and to get regular updates for your software.

2. Don’t open emails or attachments from unknown sources. Be suspicious of any unexpected
email attachments even if they appear to be from someone you know. Should you
receive a suspicious email, the best thing to do is to delete the entire message, including
any attachment.

3. Protect your computer from Internet intruders—use “firewalls.” Firewalls create a
protective wall between your computer and the outside world. They come in two forms,
software firewalls that run on your personal computer and hardware firewalls that protect
a number of computers at the same time. Firewalls also ensure that unauthorized
persons can’t gain access to your computer while you’re connected to the Internet.

4. Regularly download security updates and “patches” for operating systems and other software.
Most major software companies today release updates and patches to close newly
discovered vulnerabilities in their software. Check your software vendors’ web sites regularly
for new security patches or use the automated patching features that some companies
offer.

5. Use hard-to-guess passwords. Mix upper case, lower case, numbers, or other characters
not easy to find in a dictionary, and make sure they are at least eight characters long.
Don’t share your password, and don’t use the same password in more than one place.

6. Back up your computer data on disks or CDs regularly. Back up small amounts of data
on floppy disks and larger amounts on CDs. If you have access to a network, save copies
of your data on another computer in the network.

7. Don’t share access to your computers with strangers. Learn about file sharing risks. Your
computer operating system may allow other computers on a network, including the Internet,
to access the hard-drive of your computer in order to “share files.” This ability to share
files can be used to infect your computer or look at the files on your computer. Check
your operating system and your other program help files to learn how to disable file sharing.

8. Disconnect your computer from the Internet when not in use. Disconnecting from the
Internet when you’re not online lessens the chance that someone will be able to access
your computer. And if you haven’t kept your anti-virus software up-to-date, or don’t have
a firewall in place, someone could infect your computer or use it to harm someone else
on the Internet.

9. Check your security on a regular basis. You should evaluate your computer security at
least twice a year—do it when you change the clocks for daylight savings! Make sure you
have the security level appropriate for you.

10. Make sure your family members and/or your employees know what to do if your
computer becomes infected. People should know how to update virus protection
software, how to download security patches from software vendors, and how to
create a proper password.

"8" money-saving computer tips


"8" money-saving computer tips


1. Don’t fall for a cheap printer.
Recently, printers seem to be getting
smaller and cheaper, but the ink they use is
expensive. What good would it be to buy
a printer for less money but spend $500 on
ink in one year? When looking at printers,
check for ones with big, black ink cartridges.
That type is likely to last longer.
Another reason printers are cheaper
is the materials used to manufacture the
printer. Does the printer appear to be made
of cheap plastic? Would it handle the rigorous
printing that you may require? Some
printers I’ve seen aren’t durable enough
to last a year at a newspaper office. If possible,
try to examine the printer in person
2. Look for a laser printer.
Laser printers are the best machines
for printing proofs. And that means ink jet
printers just aren’t practical. This leads to
tip number three.
3. Be wise with your money.
Okay, this goes without saying, but it
bears repeating. Educate yourself about a
product before you spend
a lot of money on it. Even
if you need something
tonight, it pays to consult
several Web sites
and see what constitutes
a reasonable price. Plus,
looking on the Internet
doesn’t take much time.
4. Bigger, smaller
and different.
What does this mean?
In 2008, be ready to see
larger bytes available in smaller size drives
with new or different technology. Hard
drives, jump drives and memory cards will
all hold more in a smaller package.
5. Be proficient with palettes.
By the time you read this, 2008 Microsoft
Office for Mac will have just hit store
shelves. As expected, there are many new
features. However, you now have to access
palettes and buttons to use Office 2008.
6. Take a look at laptops.
More publishers are purchasing laptops
as their primary work machine. And why
not? Laptops are as inexpensive as regular
machines, and you can take them anywherethere’s an electrical outlet. As the
December ice storm showed us, you never
know when you’ll need to put the newspaper
together outside of the office.
If you want to primarily work in
your office but don’t like using
a laptop’s smaller screen and
keyboard, it’s no problem.
Just plug the monitor and
keyboard you already own into
the laptop for a desktop feel.
7. Protect your banking.
More accounting programs
are integrating with on-line
banking these days.
While this is convenient, it’s not totally
safe.
To prevent hackers getting into sensitive
areas, I suggest that newspapers keep
accounting information on a machine that
isn’t constantly on the Internet.
When your accounting computer does
need to access the Web, be sure that
adequate virus and spyware protection is
available.
8. Backed up lately?
This tip is simple: play it safe and keep
your data backed up.
May everyone have a wonderful 2008.
And like your doctor tells you, hopefully I
won’t have to see you too often this year

How to deal with "iTunes"


  • iTunes
Something that has always distressed me about iTunes is that it tries to hide information from me. It does its best to withhold simple information about where my album artwork is, and where my playlists are kept. The worst thing is when I change computer or update my hard drive and have to re-install everything and I lose all my stars and playlists that I have become emotionally attached to.
Not any more.
How does iTunes work?
iTunes has three main components:
  1. •the application
  2. •the music files
  3. •the rest
Within the rest are all your settings, the album artwork picture files, and the playlist files.
I keep my music in a folder that I designate, called “C:\Data music”, but you will have noticed a Windows habit of creating default folders called My Music and My Pictures etc. These do irritate me although I do recognise the need for them. Locate My Music, usually to be found within My Documents. Inside My Music you will find a folder called “iTunes”. This is the folder that iTunes uses to place ‘the rest’, and this is how we can trick iTunes.
Moving iTunes and my music files to another computer
The idea is to move all the music files to the same identical place on the new computer (or hard drive) as they were on the old computer (or hard drive). We re-install iTunes, add all the music files to the application, and then finally replace the rest folder for the old one, and hey presto! It should all look and behave as it used to on the old computer. To do this you need to respect the same identical folder structure for the music and only swap the ‘rest’ folder after installation and adding the music. Also, don’t forget to de-authorise your old computer (or hard drive) before closing down for the last time.
Step-by-step moving process

Follow these steps:

1.Backup your music, and the rest folder (called iTunes)

2.De-authorise your old computer (or hard drive)

3.Re-install iTunes on the new computer (or hard drive)

4.Press ALT + E, then F to get to Preferences

5.Go to the Advanced tab

6.Designate your music folder with the identical name as for the old computer by using the Change button

7.I like to check the ‘Copy files to iTunes folder when adding to library’

8.I also like to ‘ Keep iTunes folder organized’ so I check this also

9.Close iTunes

10.Place all your music in your designated music folder, just as it was in the old computer

11.Replace the whole contents of the ‘rest’ folder (called iTunes) inside the My Music folder that you will have located on this new computer. To do this you will be first deleting the contents and then placing your version within this folder. You do not want any stray items from the new installation of the iTunes application hanging around to interfere.

12.Open iTunes, and hopefully, all will be as on the old computer.

EASY COMPUTING TIPS

Run Control Panel from Task Bar /Start /Settings /Control Panel. The settings given are correct
for Windows 98 and Word 2000. They are offered as suggestions only - experiment with the
settings to suit you. Macintosh users should consult our factsheet, Apple Macintosh Shortcut
Keys and Tips.
  • 1. Make the mouse easier to use
a) Slow your mouse down
Slowing down your mouse greatly reduces muscle tension in your hand
1. In Control Panel double-click on Mouse
2. Select the tab Pointer Options
3. Under Pointer Speed move the slider left to Slow
4. Click OK
5.
You may also find it helpful to increase the interval between clicks when double-clicking.
b) Reduce the number of clicks
From the Tools menu at the top of any window, choose ‘Folder Options’. On the ‘General’ tab,
locate ‘Click items as follows’ and choose ‘Single click to open an item (point to select)’. After
making this change, you’ll find that items highlight when you point at them (no need to click),
and you only have to click once to open a folder or document. This may require a little time to
get used to. You can choose to have all icon names underlined (like web browser links), or
underlined only when you point at them.
There used to be a free program called Mousetool, which could simulate a click when the user
moved the cursor over an icon, but this is now a commercial product, Quill Nib. Visit
www.mousetool.com for an update.
  • 2. Avoid using the mouse as much as possible
a) Keyboard shortcuts
You don’t have to use the mouse to navigate and execute commands in Windows. For a full list
of keyboard shortcuts see our factsheet Windows shortcut keys. To show shortcut keys
for windows programmes, got to View/Toolbars/Customise/Options and click on show shortcut
tips in screen tips.
Windows was designed to be an intuitive and easy to use interface, i.e. if you want to do something,
using the mouse to point at a picture of it on the screen doesn’t need a lot of explanation.
However, although it takes a bit of time to learn the shortcuts, using them does speed up work
considerably, and avoids the discomfort that can be associated with mouse work.
b) Mouse keys
If you really can’t do without using the pointer, try switching on ‘Mouse keys’. Go to Ctrl
Panel, choose Accessibility Options then click the tab for Mouse. Tick the box for Mouse Keys.
This will allow you to move the pointer with the arrow keys on the number pad. You will need to
make sure your pointer speed is set quite fast for this (see point 1a).
  • 3. Adjust your screen
This allows you to fit far more information on your screen. N.B. Before changing monitor
settings check with your IT department or IT support service for monitor compatibility.
1. In Control Panel double-click on Display
2. Select Settings
3. Under Screen Area move the slider to the right to 800 by 600. (If you have a
17 inch screen try 1024 by 768 pixels)
4. Press Apply to test. If test is successful keep new setting
5. Now staying on the Settings tab, press the Advanced button.
6. Select the Adapter tab. Change the Refresh frequency to 70-75 Hz or higher
(remembering to check with your IT dept or IT support service for monitor
compatibility).
7. Re-adjust size and shape of screen using monitor controls (usually found on
the front of the monitor itself).
8. Is text too small? Leave the Adapter tab and choose the General tab. Then
under Font Size choose Large Fonts
9. Click OK.
  • 4. Adjust your keyboard
a) Slow your repeat rate down
Avoid mistakes that you then have to go back and correct…
1. In Control Panel double-click on Keyboard
2. Set Repeat delay – long, Repeat rate – slow.
b) Sticky keys
Some people find having to hold shift down while pressing another key awkward. Go to ctrl
panel, choose Accessibility Options and on the Keyboard tab tick the box marked ‘Sticky Keys’.
This will mean that to type the word ‘The’ you would type ‘SHIFT-t-h-e’ rather than ‘SHIFT+t-he’.
  • 5. Avoid unnecessary keystrokes
a) Auto-correct
Word can automatically correct errors you make. But did you know you can also use this
feature as a shortcut to inserting phrases and paragraphs you type frequently?
Go to tools. Choose Autocorrect. The first tab you see open in front of you contains a list
of commonly used spelling mistakes and typos. Beside them are substitutions that Word
will automatically make. Make sure that the box ‘replace text as you type’ is ticked. You
can add any common mistakes that you make.
You can also add commonly used phrases and assign them a shortcut.
So for example, you can input that ‘sig’ is an error and should be replaced with the
following phrase:
‘If you have any more questions do not hesitate to call the RSI helpline on 0800
018 5012 which is open between 11am and 5pm Monday, Wednesday and Friday.
Yours sincerely
Deirdre Rusling
Information Officer’
b) Predictive text
This guesses what you are about to type, saving you unnecessary keystrokes.
Go to tools. Choose Autocorrect. Then choose the tab Autotext. You will see a list of
commonly used phrases like yours sincerely, best wishes and so on. You can add your
own commonly used phrases such as your name, the name of your organisation or
department or any sentences or long jargon you use frequently. When you are writing a
document, if the computer recognises that you have typed the first few letters of the
given phrase, it will suggest the phrase in a box. Just hit return to accept the phrase or
carry on typing to reject it.
In summary…
Basically don’t use the mouse if you can type and don’t type if you can possibly avoid
it…

Friday, August 7, 2009

BlackBerry Storm








Available Features

  • Camera (3.2 MP)
  • Built-in GPS
  • Media Player
  • Video Recording
  • BlackBerry® Maps
  • Wireless Email
  • Organizer
  • Browser
  • Phone
  • Corporate Data Access
  • SMS/MMS

Size and Weight


Height:
4.43 inches (112.5 mm)
Width:
2.45 inches (62.2 mm)
Depth:
0.55 inches (13.95 mm)
Weight:
5.5 ounces (155 grams)

Display

  • High resolution 480 x 360 pixel color display
  • Transmissive TFT LCD
  • Font size (user selectable)
  • Light sensing screen
  • Supports over 65,000 colors
  • Screen Size: 3.25 inches (diagonally measured)


Camera & Video Recording

  • Camera: 3.2 MP camera with auto flash, auto focus, 2x digital zoom
  • Video Camera: Depending on the amount of built-in memory available for use, a third-party microSD card may need to be properly inserted into the BlackBerry smartphone to enable the video recording feature

Battery & Battery Life

  • Standby time: 15 days (356 hours)
  • Talk time: 6 hours
  • 1400 mAhr removable/rechargeable cryptographic lithium cell

GPS & BlackBerry Maps

  • Stand-alone and assisted GPS
  • Preloaded with BlackBerry Maps

Data Input & Navigation

  • SurePress™ touch screen
  • On screen keyboard: portrait SureType® and Multi-tap, QWERTY landscape
  • Dedicated keys: Send, End, Menu, Return

Voice Input & Output

  • 3.5mm stereo headset capable
  • Integrated earpiece/microphone
  • Built-in speakerphone
  • Bluetooth® v2.0 enabled; mono/stereo headset, handsfree

Media Player


  • Video format support: MPEG4 H.263, MPEG4 Part 2 Simple Profile, H.264, WMV
  • Audio format support: MP3, AAC, AAC+, eAAC+, WMA, WMA ProPlus

Ringtones & Notifications


  • Polyphonic/MIDI ringtones
  • MP3 ringtones
  • Vibrate mode
  • LED indicator

Bluetooth

  • Bluetooth® v2.0; mono/stereo headset, handsfree, phone book access profile, and serial port profile supported

Device Security


  • Password protection and screen lock
  • Sleep mode
  • Support for AES or Triple DES encryption when integrated with BlackBerry® Enterprise Server
  • FIPS 140-2 Compliant (FIPS Validation in Progress)
  • Optional support for S/MIME

Memory

  • Expandable memory – support for microSD™ card
  • 1GB onboard memory
  • 128 MB Flash (flash memory)

Wireless Networks


  • UMTS/HSPA: 2100 MHz
  • North America: 850 MHz GSM®/GPRS networks
  • North America: 1900MHz GSM/GPRS networks
  • Europe/Asia Pacific: 1800MHz GSM/GPRS networks
  • Europe/Asia Pacific: 900MHz GSM/GPRS networks
 
Dollar Dreams Copyright © 2009 Blogger Template Designed by Bie Blogger Template