Techni Crack is a Blog contain tons of Technical and General informations regarding to Computers and Information Technology.This Blog gives all of you a chance to update your knowledge and New Developments in Computer and IT field. By using this blog you can clear your doubts and asking for new posts of your interest.

Friday, March 28, 2008

EQO for Mobile Users

What is EQO?

EQO is a free application that brings your world to your mobile phone. Chat on the go using MSN, AIM, Yahoo, Google Talk, QQ (NEW!), ICQ and Jabber, or call and text anyone in the world at super-low rates. Invite your friends to join your EQO network and you can use EQO to call them at 50% off EQO’s regular calling rate, or send them an EQO Message for free.

NEW! Check out EQO's cool new application on Facebook - EQO vibrator. Send free Vibes to anyone on Facebook, or send Vibes to your EQO freinds and their mobile phone will vibrate.

WHY YOU NEED EQO:

ChatChat with your IM buddies for FREE from your mobile phone.

ArrowEQO is compatible with all major IM services: MSN, AIM, Yahoo!, Google Talk, QQ (NEW!), ICQ and Jabber!

IM

PhoneTalk and text for cheap from your mobile phone.

ArrowCall or text from your mobile as much as you want, at some of the lowest rates in the world.

Build a network of EQO friends, keep in touch on the go, and save!

ArrowInviting your friends to join EQO is easy, and you can call other EQO users at 50% off the regular call rate, or send EQO Messages to them for FREE. So, the bigger your EQO network, the better it is.

ArrowSend your facebook friends Vibes with EQO Vibrator! Vibes are like pokes, but cooler, and they vibrate!
ArrowYou can get vibes on your phone too! When you download EQO, your phone will actually vibrate when you get vibed.

check out EQO vibrator now!

1. How to setup EQO on your phone

Learn how to get EQO up and running on your phone.

Setup EQO 1
Once you complete sign-up, EQO sends a text message with a link in it to the mobile number you provided during sign-up, click on the link. Your phone will ask you for permission to access the internet in order to download EQO to your phone – please say yes. EQO will now begin downloading to your phone. (EQO requires access to the internet to place calls, send messages and instant messages – please insure you have a data / internet plan on your phone).


Once downloaded, EQO will prompt you to start the application, and you’ll be asked for permission to allow EQO to access the internet – please say yes – it may take a few moments for EQO to connect.

Once connected, EQO will ask for permission to upload your address book’s contacts – please say yes. EQO will not store or retain your contact’s personal information for any purpose.
Setup EQO 2


Setup EQO 3
You are now ready to use EQO.


2. How to setup your instant messaging account on EQO

EQO supports all your favourite IM networks.

Select IM tab
Scroll to the IM tab of EQO on the right.


Select which IM network you’d like to access: AIM, MSN, Yahoo, Google Talk, QQ, ICQ or Jabber, and click on it.
Select IM network


logon
Enter the username and password you normally use to access your account and click on “OK”


Your IM account should now appear with “(connecting)” next to your name.
connecting


Select contact
start IM
Once connected, all you IM contacts will appear. Click on a contact, and begin messaging.


To setup another IM account, click on “Options”, then “Add IM Account” and repeat process above.
Setup IM account


3. Making an EQO Out Call or sending an EQO Out Text Message

Learn how to place calls and send text messages using EQO.

Check EQO status
To place an EQO Out call, make sure you are connected to EQO. If you are NOT connected, “Offline” will appear in the top left corner of your screen.


To connect to EQO, choose “Options”, then “Go Online”.
Connect to EQO


Connecting to EQO
A message displaying “Connecting” will appear in the top left corner of your screen. You will also notice the EQO logo flashing in the right hand corner of your screen.


Once connected, your account balance and the time will display, and the EQO logo will appear solid orange.EQO connected

To place a call or send a text message, scroll down and click on the person you want to contact, or click on “Dial Number” to dial the number directly. A menu of options will appear.
Place an EQO call


Start an EQO call
To place a call, click on “Call” or, to send a message, click on “Send Message”.

Sunday, March 9, 2008

23 Ways To Speed Up Windows XP

Since defragmenting the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
Bloggers Blog
Techni Crack
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
Bloggers Blog
Techni Crack
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

For more info
Bloggers Blog
Techni Crack

Boot Windows XP Fast

Follow the following steps

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' grayed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

For more info

Bloggers Blog
Techni Crack

11 Fast and Free Security Enhancements

Before you spend a dime on security, there are many precautions you can take that will

protect you against the most common threats.

1. Check Windows Update and Office Update regularly

(_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall.

SyGate (_www.sygate.com) and ZoneAlarm(_www.zonelabs.com) offer free versions.

3. Install a free spyware blocker.

Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy(_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies and Spyware Terminator(www.spywareterminator.com) is also good too.

4. Block pop-up spam messages in Windows NT, 2000, or XP

It can be achieved by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically.

Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l( A combination of letters, alphabets and Special
Characters). This will make it much harder for anyone to gain access to your accounts.

Bloggers Blog
Techni Crack

6. If you're using Outlook or Outlook Express, use the current version or one with the
Outlook Security Update installed. The update and current versions patch numerous
vulnerabilities.

7. Buy Anti virus software and keep it up to date.

If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., www.grisoft.com). And doublecheck your AV with the free, online-only scanners available at www.pandasoftware.com/activescan and http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features:

Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security

Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats
quickly and can take proper precautions.

10. Be skeptical of things on the Internet.

Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

11. Be regular viewers of the following blogs.

It will help you to know about the latest trends in Computer and Secrity fields.

Bloggers Blog
Techni Crack

10 Reasons Why PC's Crash-U must Know!

Fatal Error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1. Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Bloggers Blog
Techni Crack
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS Settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings
Bloggers Blog
Techni Crack
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your anti virus software manufacturer.
Some anti virus programmes are McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
Bloggers Blog
Techni Crack
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
Bloggers Blog
Techni Crack
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

If you need any help more please give it as comments...........

A to Z Useful Windows Run Commands

Do you use the Run feature in Windows XP?
For most, this feature remains unused (or rarely used). Why is that? Well, First off nearly all of the Run Commands Correspond to a particular Control Panel Item or a Utility, Tool or Task that can be accessed through Windows. There are, however, tools and utilities that I bet you never knew you had that can be accessed through the Run feature. The main reason most people don't use the Run feature is because they don't know the Commands. So, to solve that problem, I decided to put together the following listing, which lists A to Z Run Commands and what they correspond too...
Short Cut to Run- Windows Key + R
Accessibility Controls - access.cpl
Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Adobe Photoshop (if installed) - photoshop
Administrative Tools - control admintools
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard - fsquirt
Calculator – calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)* - directx.cpl
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
More Info at
Bloggers Blog
Techni Crack

Display Properties - desk.cpl
Display Properties (w/Appearance Tab Preselected) - control color
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (XP Prof) - gpedit.msc

Tuesday, March 4, 2008

Right Click On Web Pages That Don’t Allow Right Clicks

How you can right-click a webpage (e.g. to save pictures) that usually displays an error like ‘Right-click not allowed’ or ‘Please subscribe to do this action’ when you try to right-click.
In Internet Explorer, click Tools -> Internet Options.
Click on the Security tab of Internet Explorer then click the Restricted Sites zone.
Click the Sites… button and enter the URL of the website you would like to allow right-clicking on (e.g. http://www.clipart.com).
Click the Add button.
Click the OK button on the Restricted Sites dialog box.
Click the OK button on the Internet Options dialog box.
Visit the site and you should now be able to right-click content on the site.
Bloggers Blog
Techni Crack
You may need to reset the security settings for the Restricted Sites tab if the settings have been changed. In the Internet Options dialog box, under the Security tab, click the Restricted sites zone and click Default Level. Then click OK.

How To Recover a Dead Windows Machine

It’s dead, Jim! How do you bring your Windows PC back from horrid, gory Windows-induced Seppuku?

This process can take up to 48 solid hours of exasperating labor.
Back up your work. The first step in any restore is to back up your data from the hard drive. If your machine runs well enough attempt recovery, then you may be able to plug a USB2 hard disk and back up your files. It will make you feel a lot better to have that backup if the computer hangs halfway through the ‘restore’ and then never boots again. A failing hard drive can work intermittently enough to get the data off maybe once and then die for good.

New User

Sometimes a system that partially boots and/or misbehaves badly, or has a ‘dead’ application that can’t be run anymore can be ‘recovered’ simply by creating a new user account and logging in as that new user. A corrupted registry is the most common culprit for ‘dead’ windows machines, and a large subset of these (potentially) corrupt entries are in your user profile. On Linux machines, often ‘corrupt’ application settings are in a particular user account as well.
Go to Start->Settings->Control Panel->User Accounts.
Create a New Account.
Give it a Name.
Give it ‘Administrator’ privileges. (This sounds bad, and it is bad, but many Windows applications assume they’re ‘Administrator’ (’root’ in Linux) at all times. Reducing privileges can make the computer more secure, but can also disable some of your software.)
Reboot or log out and login as the ‘new’ user.
See if the system is stable.
If the system is stable, you will still have to restore all of the settings you had on the old account, and move the ‘My Documents’ contents from the old account to the new one.
BACK UP YOUR WORK.
You can’t trivially delete and re-use the dead old account. Windows will just try to re-use the same bad data again.
Bloggers Blog
Techni Crack
System Restore on Windows XP
Use System Restore for a shaky computer that still boots but doesn’t work well.
Go to Start->Programs->Accessories->System Tools->System Restore.
Leave the radio button on ‘Restore my computer to an earlier time’.
Click on ‘Next’.
Pick a date before the bad system behaviors began.
Reboot and see if it works better.
If it does not, try again with an earlier restore point.
Go through your documents and files. You’ll discover ‘versioned’ file names of various files that were modified between now and your restore point.
Delete or remove the ‘old’ files and make sure the ‘newest’ or most correct versions of files exist.
Windows XP does not come with a tool to browse the old restore point files to individually recover them, even though that would be super handy.
The Windows XP boot disk does not have a ‘System Restore’ tool to restore Windows to earlier states like this, so your computer must boot to use this method. If the machine does not boot, try one of the methods below to recover your data and your machine.

Boot with Linux
Download and burn a Linux boot disk from your favorite Linux distribution. You may need to use another computer if you have not done this already.
Boot from the Linux CD.
Mount the Windows partition.
Using Linux, back up your data from the damaged partition onto a USB drive, or the network, or burn a CD.
Bloggers Blog
Techni Crack
Use a Third Party Boot Disk
Try ‘UBCD’ (see link below), a free ISO of a self-booting CD image accompanied by a big pile of tools and utilities.
Various hard disk tools like ‘Partition Magic’ or ‘Norton Utilities’ come on a bootable CD that will let you tinker with ‘bad’ drives. It is best to back up any intact data before attempting to ‘recover’ lost data.

Use the Recovery Disk or Recovery Partition
Many manufacturers don’t give you a Windows boot disc anymore instead you get a ‘Recovery Disc’ or a ‘Recovery Partition’ that contains an image of the boot partition in the state hey shipped the machine.
Put the disc in (or boot off the ‘recovery partition’), follow the prompts, and the version of Windows with all the right drivers and all of the default unlicensed bundleware that came with the PC will be restored and ready to go and need licensing (or deletion) again.
This restore will not restore other applications that were installed, downloaded, etc.
This restore will not restore software licenses that you paid for on-line and didn’t keep the receipts and keys to.
This restore will not restore drivers for new hardware you added since you bought your computer.
This restore will usually destory any data on the Windows partition, including including personal information in Documents and Settings, which includes your ‘My Documents’ and anyone else’s ‘My Documents’ on the computer.

Reinstall from a Windows CD
If your computer didn’t ‘System Restore’ or have a ‘Recovery Disc’, but did come with a shiny Windows CD and still has that hologram license (or the license is often stuck on an inside door or on the case) then
Put the CD in the drive and boot from the Windows CD.
Change your BIOS settings to start the computer from the CD.
Install Windows and reboot the fresh install.
Rummage around for the driver CDs and any software CDs you had, and follow the prompts to install each driver CD for the motherboard, monitor, etc. as required.

Remove the Hard Drive
Pull the hard drive out of the dead PC if the computer can’t be made to boot, restore or install its operating system.
If you have one, plug an IDE drive into a USB2 or Firewire hard drive adapter to be plugged into another computer. Nearly external USB2/Firewire hard drive can be opened up and used temporarily in this manner.
If you don’t have an adapter, or your drive is SATA or SCSI, you can plug it into another computer’s available compatible port. Just make sure to configure BIOS so the drive you add doesn’t get booted on the host machine when it starts up, or any ‘infection’ could be spread to it, and Windows tends to throw a nasty fit attempting to ‘detect’ the new computer, and XP wants a new ‘authorization’.
Backup the data from the mounted drive.
If the drive won’t mount (and the host OS definitely can mount the NTFS file system), then try some data recovery software (this may require you to plug the drive into an IDE/SATA/SCSI device directly). If that doesn’t help, the data on the drive may just be lost to you.
Bloggers Blog
Techni Crack
BACK UP YOUR WORK! When the hard disk PHYSICALLY CRASHES, your work is probably lost, no matter what. Even investing thousands of dollars for data recovery might not get much more than file fragments back. Back up early, back up often. An ounce of backup is worth a TON of re-creating things from scratch.
Get some REAL system recovery software, like Norton Ghost (formerly PowerQuest Drive Image), and make hard drive image backups of your own boot drive with ALL of your software and drivers installed. It turns a day-long, maybe even week-long ordeal into a mere 45 minute cuss-fest when ANY version of Windows self-destructs and croaks on you. Especially useful if your living is based on your PC. It also means that you don’t have to “live with” a Windows installation that has gone ’senile’ from all the viral and spyware junk that crawled into it, or got wrecked when you bought a new piece of hardware that installed 100 megs of buggy garbage into the OS to ‘extend it’, instead of a simple device driver.
You really should have backed up the data very routinely on your own, every month or so, or whenever you did “important work”, but almost no normal computer user ever does. Tragic.
If you have system restore, be sure to save everything, and create a new, named checkpoint just before you install a new piece of hardware or a new driver. There will usually be a lot less mess to back out of when you need to.
Save your passwords, registration codes, receipts, etc. When you make logins/passwords, or receive registration codes, record them somewhere safe.
A text file on a cheap little USB thumb drive can be used for saving information like logins, passwords, utility company addresses, online accounts, etc. and whatever other ‘private’ things, like tax records. It can sit in a box, or a safe only to come out when you NEED it, and keep all those private things will be off-line and unavailable to the various frightful things that get into Windows. Anyway, if the computer takes a dump all over you, then all that stuff you lazily and insecurely left on the PC for anyone ELSE to steal will not die with it. Grow a carpal tunnel and type those passwords when you’re prompted. You won’t forget them so much.
Make two partitions when you partition and format a hard disk, or buy a second hard disk. One partition gets Windows and the software installations. One partition gets the data and work files, like the contents of ‘My Documents’. When you need to STOMP the Windows partition, the other data can remain safe and relatively untainted. A second hard disk can even be UNPLUGGED so the Windows install or other system recovery software can’t “accidentally” reformat it “for you”.
To a degree, the ‘two partitions or two drives’ thing applies to Linux and other operating systems. For straight-forward recovery after a little mishap or major disaster, you seriously don’t want OS/programs and your personal documents and work intermixed.
The partition (or separate hard disk) with your data and work files should be formatted ‘FAT32′ and have ‘System Restore’ turned OFF. That way, if you have to mess with or re-format or restore a backup copy of a mangled Windows partition, you don’t have to overwrite all of your current work, and you can get that drive mounted by nearly any other OS.
What drives ‘System Restore’ operate on can be configured from “Start->Settings->Control Panel->System”, then picking the ‘System Restore’ tab.
Nothing you do with the software can really damage modern hardware. However, sometimes things like the CMOS memory can be overwritten, and (if you leave jumpers set the wrong way) even EEPROM BIOS on the motherboard can be stomped.
CMOS is relatively easy to ‘fix’, just go into the BIOS settings for the motherboard and reset it and then set the time and reconfigure it back the way it used to be.
EEPROM BIOS being clobbered, well you’ll have to order a new chip from the manufacturer and swap it out. Some flash-able BIOS chips have a ROM backup that they can always revert to. If not, and it’s soldered to the motherboard, then the motherboard will need to be replaced. If the BIOS can be flashed, find out which jumper (if any) disables flashing the BIOS and make sure that’s disabled, and you should never have this problem.
A USB2 backup drive that’s probably twice as big as the hard drive in your computer can be had dirt cheap. It’s a good investment for backing up data. After the initial, time consuming backup, incremental backups take only a few minutes. Then the backup drive can be unplugged and put away somewhere safe, preferably where the same kinds of physical disasters that kill your computer won’t get it, too.

ONLY when the documents, internet shortcuts, mail, work files, etc. that the user used to have are safely and securely backed up onto another hard drive and/or burned to a CD or DVD, should you attempt to format or reinstall Windows.
Bloggers Blog
Techni Crack
Don’t get carried away. THINK. What’s more important? Booting this irritating, dead box, or the data (contacts, mail, work, documents, media, etc.) that it contains? The DATA is job #1. NOT the computer

Crack Office 2007 activation without a crack

For those who don't like confronting with Microsoft
For this procedure, you will need
* Office 2007 that requires activation
* A computer able to run Office 2007 (XP or higher required for Office 2007)
* At least 3 minutes of time
Instructions
* Uninstall Office 2007 from your computer if you have it on there right now
* Install Office 2007 IMPORTANT! When installing Office 2007, when it asks for a serial number, just click Continue and with the dialog that pops up, click No. Then continue with your installation.
* Once Office 2007 is installed, you should be able to open Office apps and be prompted for activation. This is normal.
* Close all open Office apps.
* In Windows Explorer, browse to C:\Program Files\Common Files\Microsoft Shared\OFFICE12\Office Setup Controller\Proof.en
* In any plain text editor you want, open Proof.xml
* Find:

Code:

      </Feature> <Feature Id=”SetupXmlFiles” Cost=”1248″>
<OptionRef Id=”AlwaysInstalled”/>
</Feature>


* Replace "AlwaysInstalled" to "neverInstalled" (make sure to get the casing right) so that it will look like the this:



Code:



</Feature> <Feature Id=”SetupXmlFiles” Cost=”1248″>
<OptionRef Id=”neverInstalled”/>
</Feature>


* Save the XML file.

* That's it! You're done. Next time you open an Office app, it will not rudely ask for a serial number

The Trojan hidden in Monster.com

The Trojan stealing the data was hidden in a fraudulent advertisement on online job sites like Monster.com


Security researchers have unearthed the single largest cache of stolen identities, thanks in part to a Trojan stealing the data that has been hidden in a fraudulent advertisement on online job sites like Monster.com.

Don Jackson, a researcher with security company SecureWorks, told InformationWeek that he found 12 data caches connected to one group using the latest variance of the Prg Trojan, which also is known as Ntos, Tcp Trojan, Zeus, Infostealer.Monstres and Banker.aam. Several of the 12 found caches contain information on about 4,000 to 6,000 identity theft victims, but one contains about 10,000 and the largest one contains 46,000.

He estimates that between the 12 caches, there probably is information on about 100,000 stolen identities.

“That’s at least four times as large as the largest ones I’ve run across before,” said Jackson. “That tells me they’re using a lot of different methods to do what they do or they’ve found really reliable methods to do it.”

Bloggers Blog
Techni Crack

Jackson calls the identity theft organization behind the caches the “car group” because they’ve named each of the servers storing the information for a different auto manufacturer, like Ford, Mercedes, Chrysler, and French carmaker Bugatti.

The data, which includes bank and credit card account information, Social Security numbers, online payment account usernames and passwords, comes from victims who were all individually infected with the Trojan beginning in early May.

He said the latest variant of the Prg Trojan has been running on fraudulent ads on at least two online job sites. One, he said, is Monster.com. Representatives from Monster did not return a request for an interview.

“The hackers behind this scam are running ads on job sites and are injecting those ads with the Trojan,” said Jackson. “When a user views or clicks on one of the malicious ads, their PC is getting infected and all the information they are entering into their browser, including financial information being entered before it reaches the SSL-protected sites, is being captured and sent off to the hacker’s server in Asia Pacific.”

Jackson said one server is still collecting stolen data and they are seeing 9,000 to 10,000 victims sending information to the server at any one time. When someone clicks on the advertisement, they’re taken to a malicious Web page where their computer is infected with the Prg Trojan.

He said they’ve given information about the caches and the phony ads to the FBI. Jackson also said they tried contacting Monster.com but they haven’t received a response yet.
Bloggers Blog
Techni Crack
“When I first discovered this large cache of data, I couldn’t figure out how the hackers were compromising so many Web sites, and as a result, infecting so many victims,” added Jackson. “However, when I uncovered the Trojan-injected advertisements, it made total sense. These job sites get tons of traffic so it is no wonder that the hackers are having such success.”

The Trojan is designed to exploit several different software flaws, including vulnerabilities — all of which have been patched by the vendors — in Microsoft’s Internet Explorer browser, WinZip and Apple’s QuickTime.

Jackson said they found the caches by writing signatures that detect the Trojan communicating with the hackers’ command server, which sends out instructions to the malware and accepts data from it. Researchers followed the traffic back to several servers. He said some are located in the Russian business network, others are in Hong Kong, and they believe the major cache is on a server in Malaysia.

Different hacker groups are selling a kit that helps malware authors compile new versions of the Prg Trojan. The kit, which sells for about $300 on underground forums and marketplaces, even re-scrambles the code to evade anti-virus detection.

SecureWorks noted that computers infected with the Prg Trojan will have a backdoor proxy server listening for connections on Port 6081. “This port is in not assigned to legitimate services and is not hidden by the rootkit functionality. f port 6081 is open on your computer, you are likely infected with the Prg Trojan,” said Jackson. “If anti-virus is not detecting the infection, then you will need to boot the computer into Safe Mode and run another scan. If that fails, manual removal or reinstalling the operating system may be necessary.”

Monday, March 3, 2008

Assigning a Static IP Address

To assign a Static IP Address to your network connection follow these steps:

1. Open Network Connections

2. Right click the connection you wish to assign a Static Address to and choose Properties.

3. In the Properties box that comes up select “Internet Protocol TCP/IP” and click the Properties button beneath.

4. In Internet Protocol TCP/IP Properties place a dot in “Use the following IP Address“.

5. Enter the IP address you wish to use and OK the change. Click OK on Local Area Connection Properties.

6. Reboot

How To Detect what process is thrashing your hard drive

Every once in a while you notice that your hard drive is working extra hard for what seems like no reason. A background process has taken your hard drive hostage, forcing it to thrash loudly as it struggles to keep up with the high rate of reads and writes. Your computer responds slowly as the process overloads the physical limitations of your drive. What are you to do?The solution is simple, although a little tricky at times: identify and stop the process that is killing your drive. There are two methods and tools that you can use to identify the process.

Method 1
Click on the Start Button and key in Reliability. Click on the Reliability and Performance Monitor shortcut.
On the main screen click on the Disk section down arrow to see a list of all processes and the files they are writing or reading from your drives.
Click on the Read or Write headings to sort all disk operations to identify which process and file is currently using the disk the most.
Bloggers Blog
Techni Crack
Method 2
Visit Microsoft’s Sysinternals web site and download Process Explorer.
After you have started Process Explorer, click on the View menubar item and then Select Columns.
Click on the Process Performance tab and check:
I/O Reads
I/O Read Bytes
I/O Writes
I/O Write Bytes
Hit OK.
You will now see the new columns listed for each process. To identify what process is killing your hard drive, just look for the process with the highest number of Reads or Bytes

Avoid Compulsory Registration in a Website

Many websites on internet need you to register to acess the information, like many forums force you to register to have acess to their discussion pages. Below are some techniques that i found to bypass compulsory registrations on websites.

BugMeNot

Bugmenot- Free login Details to bypass compulsory registration

Bugmenot is a groovy website to find and share logins for websites that force you to register. Just fill in the web adress in the search box and Login details will be provided if available for that particular site.
For more information on using Bugmenot, you can see Wikihow Article on using Bugmenot.

Also you can download Bugmenot Firefox Extension to bypass compulsory web registration via Firefox’s right-click context menu.

Google Bot

Most of the websites today get maximum number of visitors from google. So all the websites including ones that require registration, would like to see their content indexed by Google. Therefore as soon as they detect the google bot, they allow it to acess pages that are normally restricted to human users, so if a normal human being visits the website using a web browser, he is politely redirected to the “Please register first” webpage.

There is a cool Firefox Extension called Firefox User Agent Switcher that lets you switch the user agent so that the reg-only website is fooled to think that you are a web spider.

You can download the Firefox user agent switcher extension here . After downloading and installing the extension you have to do the following:-
Goto Tools>>Extensions>>Select User Agent Switcher

Click Options button and select User Agents from the Sidebar.

Then click Add to add new User Agent.

In the description box write “Google Bot” and in the User Agent Box write “Mozilla/5.0 (compatible; googlebot/2.1; +http://www.google.com/bot.html)” .

Done. Enjoy ! Bypass Registration on Websites with Google Cache

This trick even work on some websites that usually require paid registration in order to access their content.
Find the exact page that you want in a list of Google search results. For example, if you know there’s a page on RegisteredAccess.com that has some data about turtles that is only accessible to registered users, you can search on google for “site:RegisteredAccess.com turtles”. Once you find the link to this article, you can simple click on “Cached” to see what version Google has.

Working with Username and Password, using net user command

The following example shows the syntax of the net user command:
net user [username [password | *] [options]] [/domain]
username {password | *} /add [options] [/domain]
username [/delete] [/domain]

You can use the net user command to create and modify user accounts on computers. When you use this command without command-line switches, the user accounts for the computer are listed. The user account information is stored in the user accounts database. This command works only on servers.
Bloggers Blog
Techni Crack

You can use the following parameters with the net user command:• username
Is the name of the user account you want to add, delete, modify, or view. The name of the user account can have as many as 20 characters.
• password
Assigns or changes a password for the user’s account. A password must satisfy the minimum length set with the /minpwlen option of the net accounts command. It can contain as many as 14 characters.
• *
Produces a prompt for the password. The password is not displayed when you type it at a password prompt.
• /domain
Performs the operation on the primary domain controller (PDC) of the current domain. This parameter applies only to computers running Windows NT Workstation that are members of a Windows NT Server domain. By default, Windows NT Server-based computers perform operations on the PDC.
• /add
Adds a user account to the user accounts database.
• /delete
Removes a user account from the user accounts database.

CONVERTING FAT32 to NTFS

Converting a partition from FAT32 to NTFS can be done by an inbuilt utility in the Windows XP operating system — but it is important to realise that it is a one-way process. You cannot convert back, except possibly by use of Partition Magic 7.01, and that is not always successful. Windows XP has no tool for converting from NTFS to FAT32.

There are a couple of things to do in advance if the conversion is to be efficient. If you do not take these preliminary steps, you are liable to end up with only 512 byte clusters, which is not a good idea.

What happens is that FAT32 partitions formatted by most Windows versions except Windows XP itself (and possibly Windows 2000) have an odd multiple of 2 kilobytes in the “system” sectors before the data area, where the File Allocation Tables themselves and clustering start. Therefore, clusters 4 KB in size are not aligned on 4 KB boundaries, as NTFS will want. CONVERT.EXE, finding it cannot use 4K clusters, gives up and makes the clusters only 512 bytes (one half KB) instead.

It is, therefore, important to realign the partition before conversion, by moving all the data area up to a 4K boundary. (This will absorb odd sectors at the far end which otherwise would not get used). For this, I suggest BootIT NG, from BootitNG.com. This is a shareware program, priced at US$30 but with a 30-day fully functional trial. You may well find it valuable also for its Disk Imaging and Partition Management capabilities.

Download the BOOTITNG.ZIP file to its own folder, extract the contents of the ZIP file, then run BOOTITNG.EXE, which will make a bootable floppy. Boot this floppy. For purposes of Partition Management, there is no need to install the program to hard disk, so click Cancel Install, thus entering Maintenance. Click Partition Work. Highlight the partition you intend to convert. Click Slide, which has an option check box to Align for NTFS only. Click OK. As it has to move almost every sector on the entire partition, this will take a very long time — schedule it for a meal break, or start it to run overnight. (If it finishes quickly, that probably means that the partition was properly aligned already.)

Then restart the computer, boot Windows XP, being sure to logon as an Administrator, and defragment the disk. This ensures that there is, as far as possible, a contiguous area for the NTFS Master File Table. It is best if there is a fairly substantial amount of free space while you do it.
Bloggers Blog
Techni Crack
Now use the Windows XP convert tool: Go to Start | All Programs | Accessories | Command Prompt (or, from a Run box, type CMD) and, assuming you intend to convert C:, give the command:

VOL C:

Note the name of the disk in the first line, and the Volume Serial Number (for example, 3F4E-2D1B) in the second. Then type:

CONVERT C: /FS:NTFS

It will ask for that name in confirmation. Then it will ask two further questions. Reply Y each time to set up conversion to happen at the next boot, then restart the machine. (If you are converting a partition other than the operating system’s partition, you may find that it runs without rebooting.) After returning to Win XP, the hard disk will work for two or three minutes, tidying up. Leave things alone during this time.

Change a MAC Address

MAC addresses were designed to be fixed numbers that cannot be changed. However, there are several valid reasons to want to change your MAC address
Changing a MAC Address To Work With Your ISP

Most Internet subscriptions allow the customer only a single IP address. The Internet Service Provider (ISP) may assign one static (fixed) IP address to each customer. However, this approach is an inefficient use of IP addresses that are currently in short supply. The ISP more commonly issues each customer dynamic IP address that may change each time the customer connects to the Internet.ISPs ensure each customer receives only one dynamic address using several methods. Dial-up and many DSL services typically require the customer to log in with a username and password.
Bloggers Blog
Techni Crack
Cable modem services, on the other hand, do this by registering and tracking the MAC address of the device that connects to the ISP.

The device whose MAC address is monitored by an ISP can be either the cable modem, a broadband router, or the PC that hosts the Internet connection. The customer is free to build a network behind this equipment, but the ISP expects the MAC address to match the registered value at all times.

Whenever a customer replaces that device, however, or changes the network adapter inside it, the MAC address of this new equipment will no longer match the one registered at the ISP. The ISP will often disable the customer’s Internet connection for security (and billing) reasons.
Change a MAC Address through Cloning

Some people contact their ISP to request they update the MAC address associated with their subscription. This process works but takes time, and Internet service will be unavailable while waiting for the provider to take action.A better way to quickly workaround this problem is to change the MAC address on the new device so that it matches the address of the original device. While an actual physical MAC address cannot be changed in hardware, the address can be emulated in software. This process is called cloning.

Many broadband routers today support MAC address cloning as an advanced configuration option. The emulated MAC address appears to the service provider identical to the original hardware address. The specific procedure of cloning varies depending on the type of router; consult product documentation for details.
MAC Addresses and Cable Modems

In addition to MAC addresses tracked by the ISP, some broadband modems also track the MAC address of the host computer’s network adapter within the home network. If you swap the computer connected to the broadband modem, or change its network adapter, your cable Internet connection may not function afterward.In this case, MAC address cloning is not required. Resetting (including recycling power) on both the cable modem and the host computer will automatically change the MAC address stored inside the modem.
Changing MAC Addresses through the Operating System

Starting with Windows 2000, users can sometimes change their MAC address through the Windows My Network Places interface. This procedure does not work for all network cards as it depends on a certain level of software support built into the adapter driver.In Linux and versions of Unix, the “ifconfig” also supports changing MAC addresses if the necessary network card and driver support exists.
Bloggers Blog
Techni Crack
Summary - Change a MAC Address

The MAC address is an important element of computer networking. MAC addresses uniquely identify a computer on the LAN. MAC is an essential component required for network protocols like TCP/IP to function.Computer operating systems and broadband routers support viewing and sometimes changing MAC addresses. Some ISPs track their customers by MAC address. Changing a MAC address can be necessary in some cases to keep an Internet connection working. Some broadband modems also monitor the MAC address of their host computer.
Bloggers Blog
Techni Crack

Although MAC addresses do not reveal any geographic location information like IP addresses do, changing MAC addresses may improve your Internet privacy in some situations.

Find a MAC Address

The method used to find a MAC address depends on the type of network device involved. All popular network operating systems contain utility programs that allow one to find (and sometimes change) MAC address settings.
Find a MAC Address in Windows

In Windows 95, Windows 98 and Windows ME, the winipcfg utility displays the computer’s MAC address. Use the ipconfig utility (with the /all option) in Windows NT and any newer versions of Windows.Both ‘winipcfg’ and ‘ipconfig’ may display multiple MAC addresses for one computer. One MAC address exists for each installed network card. Additionally, Windows maintains one or more MAC addresses that are not associated with hardware cards.
Bloggers Blog
Techni Crack

For example, Windows dial-up networking uses virtual MAC addresses to manage the phone connection as if it were a network card. Some Windows VPN clients likewise have their own MAC address. The MAC addresses of these “virtual” network adapters are the same length and format as true hardware addresses.
Find a MAC Address in Unix or Linux

The specific command used in Unix to find a MAC address varies depending on the version of the operating system. In Linux and in some forms of Unix, the command “ifconfig -a” returns MAC addresses.You can also find MAC addresses in Unix and Linux in the boot message sequence. These operating systems display the computer’s MAC address on-screen as the system reboots. Additionally, boot-up messages are retained in a log file (usually “/var/log/messages” or “/var/adm/messages”).
Bloggers Blog
Techni Crack
Find a MAC Address on the Macintosh

You can find MAC addresses on the Macintosh in the TCP/IP Control Panel. If the system is running Open Transport, the MAC address appears under the “Info” or “User Mode/Advanced” screens. If the system is running MacTCP, the MAC address appears under the “Ethernet” icon.

Hard Drive Repair and Diagnostic Tools- Part I

If you've ever had your hard drive die on you, then you know how painful it is to try to retrieve the important documents, family photos, MP3s, and videos that you worked so hard to put together.

Hard drives can fail because they get overheated, they get corrupted from viruses, or just because they get too old. You can prevent hardware failure by regularly checking the health of your hard drive with tools provided by your hard disk manufacturer or computer-maker.

Bloggers Blog
Techni Crack

For instance, Western Digital has a Data LifeGuard Diagnostics tool that you can use to check your hard drives for errors and other defects. If any are found, it can repair bad sectors on your disk at your discretion. To be comprehensive, this kind of testing can take more than an hour to complete depending on how large your drive is.

If you have a different brand of hard drive, I've included some links to other brand-specific hard disk-checking tools:

Fujitsu

Diagnostic Tools work with IDE/ATA/SCSI drives. It can perform random seek/read tests along with more detailed surface scans.

Hitachi

Drive Fitness Test tests any brand of desktop and notebook hard drive and logs error events for easy tracking. Checks for cable and temperature problems.

Hitachi Drive Fitness Test

Maxtor

Bought by Seagate. See Seagate entry below.

Samsung

HUTIL Drive Diagnostic Utility works exclusively with Samsung hard drives and can function regardless of the state of your PC's operating system.

Samsung HUTIL

Seagate

SeaTools for Windows tests USB, ATA, SATA, SCSI, and 1394 drives. It works with all kinds of hard drives including Maxtor. DOS version also available.

Bloggers Blog
Techni Crack

SeaTools for Windows

Western Digital

Data LifeGuard Diagnostics tool can test and repair WD FireWire, USB, or EIDE drives.

Extra

By the way, if you really need a comprehensive set of hard drive management and diagnostic tools, you can download a copy of Ultimate Boot CD (available in DOS or Windows flavors).

10+ E-mail Best Practices to Share

1.Prevent virus outbreaks and spam

Viruses are often spread through e-mail. You can greatly reduce the spread of e-mail viruses by using antivirus software, using only e-mail services that offer automatic antivirus protection (such as AOL, Google, Hotmail, and Yahoo), opening e-mail only from trusted sources, opening only attachments you're expecting, and scanning attached files with antivirus software before opening them.
Bloggers Blog
Techni Crack
Spam is loosely defined as unsolicited bulk e-mail and loosely correlates to the junk mail that turns up in your home mailbox. But spam represents more than unwanted clutter. It clogs e-mail accounts—and networks and servers—while trying to sell products, spread jokes, or propagate Internet hoaxes.

Reduce the amount of spam you receive by being cautious where you post your e-mail address. Avoid publishing your e-mail address on Web sites or submitting it to every site or organization that requests it.

Never forward chain messages, which often reveal coworkers’ and colleagues’ e-mail addresses to other parties. Use caution when accepting e-mail offers or agreeing to accept mailings from vendors; subscribe only to Web sites and newsletters you really need and consider creating a generic Hotmail or Yahoo e-mail account for these subscriptions.

Don’t open unsolicited e-mail. If you accidentally open spam, don’t click links offering to unsubscribe or remove you from the mailing list unless the sender is a trusted vendor

2. Avoid phishing attacks

Phishing scams are designed to steal consumers’ personal information. They often use doctored and fraudulent e-mail messages to trick recipients into divulging private information, such as credit card numbers, account usernames, passwords, and even social security numbers.
Bloggers Blog
Techni Crack

Online banking and e-commerce are generally safe, but you should always be careful about divulging personal and corporate information over the Internet. Phishing messages often boast real logos and appear to have come from the actual organization, but those messages are frequently nothing more than copyright infringements and faked addresses. If you suspect a message possesses any credibility, you are much safer calling the company directly—preferably at a telephone number printed on a paper statement or invoice—and talking to an authorized representative.

3.Manage your Inbox

Sort messages by priority, subject, date, sender, and other options to help find important e-mail that requires your attention. Proper e-mail etiquette dictates that you respond to all e-mail in a timely fashion. Generally speaking, you should respond to all professional e-mail within a business day, even if it’s just to say you’ve received the message and will look into the matter. Occasionally, you may receive an e-mail thread that contains responses from several people; always read the entire thread before responding.
Bloggers Blog
Techni Crack

4.Compose professional messages

Writing subject lines can be tricky, but you should always include one. The goal is to summarize the message without being too wordy or too vague. Long subjects tend to be skimmed or ignored, and they don’t always fully display in e-mail viewers. For best readability, use sentence case for subject lines rather than all caps:

Agenda for meeting on 02/03/2008

Not

AGENDA FOR MEETING ON 02/03/2008

5.Properly use CC and BCC

The carbon copy (CC) and blind carbon copy (BCC) features found in most e-mail clients allow you to send copies of an e-mail to others you need to keep informed but who aren’t necessarily the primary recipients.
Bloggers Blog
Techni Crack

When copying others, be certain the e-mail message pertains to them. If you use e-mail address lists, verify that all of the members of the list should receive the e-mail, too, and remove those who don’t need to be included. And use the BCC feature sparingly. If sensitive topics require BCCing others, it may be best to take the matter offline and discuss it in person.

7.Obey etiquette rules when forwarding messages

Before you forward an e-mail, make sure that all recipients need to receive the message. In addition, be careful when forwarding sensitive or confidential information. Never forward proprietary information to external audiences or to unauthorized recipients. Before clicking the Send button, review whether a message’s contents are appropriate for each listed recipient.

8.Don't be a party to a flame war

Flame wars are heated e-mail exchanges that are more emotional than reasoned, and they have no place in professional communications. If you receive a flame or suddenly find yourself in a flame war, take a little time

before responding, if you respond at all. Think about the situation and reply rationally not emotionally.
Bloggers Blog
Techni Crack

You may also decide not to reply but to deal with the issue in person. Often, flame wars are started because of a simple misunderstanding. An ill-phrased comment (or even a well phrased one) can be misconstrued by a recipient, who then fires off a salvo in response. Instead of replying, go talk to the person and discuss the message. If talking with the person doesn’t end the problem, involve a manager for assistance in resolving the issue offline.

9.Protect e-mail addresses

Don't divulge your coworkers’ e-mail addresses to vendors, friends, or others outside the organization. Verify that recipients listed in the To and CC fields should be receiving messages and that you won't be revealing others' e-mail addresses in the process. Don't post your or coworkers’ e-mail addresses on Internet forums or bulletin boards, on Usenet groups, in chat rooms, or in other public areas.

Here are a couple of simple ways to help keep others’ e-mail addresses private. First, use the BCC feature when you need to hide their e-mail addresses from external audiences. Second, delete their addresses from messages you forward. It takes only a few moments and will reduce the chances of coworkers’ e-mail addresses proliferating in the wild.

10.Be smart about handling attachments

E-mail attachments consume inordinate amounts of e-mail server space and network bandwidth and are often the culprits behind virus outbreaks—but they're often the easiest way to transfer files. Just be sure to follow these guidelines when e-mailing attachments:

1. Don’t attach large files to an e-mail.

2. Limit the number of files you attach to a message to five or fewer.

3. Save attachments to your hard drive and then delete the e-mail message containing the attachment.

4. Don’t open unexpected attachments or those sent by unknown parties.

5. Always scan files with an antivirus program before opening an attachment. Never click an attachment without first confirming that it’s virus-free.

6. Don't annoy recipients by forwarding attachments they can’t access. If an attachment requires a new or less-common application, say so in your message.

11.Don't include sensitive or potentially embarrassing information

Don't make the mistake of thinking your e-mails are private. They're not. Think of them as postcards. You should never include any information in an e-mail that you wouldn’t want published on the front page of your local newspaper. In other words, never send confidential, proprietary, sensitive, personal, or classified information through e-mail. You should also refrain from making inflammatory, emotionally charged comments in e-mail.
Bloggers Blog
Techni Crack

12.Know when to use e-mail (and when not to)

Businesses provide e-mail for professional, business-related use, not for jokes, gossip, or chain e-mails. Also remember that you shouldn't send an e-mail to do a conversation's work. Complicated subjects are often difficult to explain face to face, much less in an e-mail. Instead of firing off a complicated explanation via e-mail, set up a short meeting to address the issue in person.

E-mail is also a poor stand-in for conversation when conducting critical, difficult, and/or unpleasant discussions, such as issues related to human resources matters. Touchy communications are best handled in person.

13.Hoaxes, scams, and urban legends - the downside of email

Email hoaxes are the online equivalent of urban legends. Email hoaxes may entail a variety of subjects from virus warnings to false stories of plans to start taxing email. Often they are harmless in nature, but they can cause unnecessary chaos and sometimes fear. Most people have good intentions when they forward these email messages. They are probably unaware that they are circulating an email hoax.

It is important to recognize when you receive a hoax so that you can play a part in stopping it from spreading. With email hoaxes, it is often difficult to distinguish whether or not it is truth. Many sound like they are doing you a favour by warning you of something dangerous (a computer virus, medical risk, etc.). The email will often look legitimate by falsely citing reputable sources.

Here are some questions to consider if you suspect an email may be a hoax:

· Does the email suggest that you email it to everyone you know?

· Does the email start out by saying 'This is not a hoax'?

· Can you see that the email has already been forwarded through a lengthy chain of people?

· Does the email cite a source (i.e. CNN) but no date that the info was released or link to that source's web site?

· Does the email sound too good to be true? (i.e. Microsoft will pay you $5 for everyone you send this to)

· Does the email have an 'urgent warning'?

· Does the email ask you to delete files?

If you answer yes to any of these questions, you may be dealing with an email hoax.

Before you consider forwarding any email that asks you to forward it to anyone else you should be able to do the following:

· Verify the original date the message was created and sent.

· Verify the original sender of the message.

· Verify any quotes made by any organizations mentioned with specific URL's (web addresses) that backup the claims made in the message.

· If the e-mail is for a cause, be able to verify the date of any action mentioned and/or the specific piece of legislation that is mentioned

· Just Google it to find out whether it is a HOAX or NOT