Welcome to ItQLab

How wonderful it is that nobody need wait a single moment before starting to improve the world. ~Anne Frank

IT Support Tips to make a difference in your daily life and provides system enhancement and development services and system maintenance support to endusers, is designed by

Top Internet Security

Posted by Saboor Adem Wednesday, March 31, 2010 0 comments

The year 2009 was a bad one for PC security: Online attackers created more malware last year than in the previous 20 years combined. Clearly, this means that in the realm of computer security, the rules have changed, and you can no longer rely solely on traditional definition-based antivirus software and firewalls to protect your PC. Instead, to meet this new breed of threats, you need a new breed of security.

Over the past few years, security suites have been improving, thanks both to the enhancement of traditional detection methods and to the addition of behavioral analysis. The latter technology detects malware based exclusively on how it acts on your PC--a good way of catching threats so new that security vendors haven't yet made definitions to identify them.

And many suites now have cloud-computing features that compare questionable programs and files against online databases to better identify the latest threats. With these cloud features working alongside behavioral analyses, suites can better detect malware they've never seen before.
Almost all the security suites we tested this year also in­­clude some form of antirootkit technology. (Rootkits--a kind of stealth malware used to hide infections--were once the concern only of big businesses, but they have gradually become more commonplace.)
All these changes mean that security suites are detecting and blocking malware faster than ever.

Nonetheless, we found some significant differences in just how well security suites protect your PC. We tested 13 suites in all. Norton Internet Security 2010 took the top ranking, owing to its strong overall malware detection. Kaspersky Internet Security 2010 was a close second. AVG Internet Security 9.0 placed third for its malware detection and speedy system performance. Closely following the top picks was a com­petitive middle tier of suites from Avast, BitDefender, McAfee, Panda, PC Tools, Trend Micro, and Webroot. The suites from Eset, F-Secure, and ZoneAlarm lagged, due to acceptable, but not great, malware protection.

For antimalware testing, PCWorld contracted the services of AV-Test.org, a respected security testing company. We looked not only at traditional signature-based detection but also at how well the suites cleaned infections, removed rootkits, and detected malware based on behavioral analysis.
But what if the suite slows your system performance to a crawl? This year we added a battery of tests to measure such drag: changes in boot times, application launch times, and the time to create or open a batch of documents, among other tests, both with and without the security suites running (see "The Performance Hit" below).

All the suites we reviewed had anti­virus, antispyware, and antispam components, plus a firewall. Some, such as Eset Smart Security 4 and PC Tools Internet Security 2010, had little beyond those core functions. The rest offered extra capabilities, such as parental controls, online backup, and Internet browser protection.

Here's our list of the suites, in order of rating, plus our Top 10 chart. Click on any name to see the full review.
Norton Internet Security 2010
Kaspersky Internet Security 2010
AVG Internet Security 9.0
PC Tools Internet Security 2010
BitDefender Internet Security 2010
Avast 5.0 Internet Security
McAfee Internet Security 2010
Panda Internet Security 2010
Webroot Internet Security Essentials
Trend Micro Internet Security Pro 2010
F-Secure Internet Security 2010
ZoneAlarm Internet Security Suite
Eset Smart Security 4
Top 10 Internet Security Suites of 2010
The Performance Hit
Every time we run our annual security suites showdown, we get plenty of feedback from readers. (You can add your own comments at the bottom of this article.) The most common question: How much will a security suite slow down my PC?
For this year's roundup, we included a battery of tests to evaluate how security suites affect your PC's speed. Our testing, conducted by German security lab AV-Test, measured 11 key aspects of a suite's im­­pact on PC performance: boot time, application launch time, file copy operations, application installation time, and more. We also looked at how quickly a suite will scan your PC for viruses and other malware.
Alwil's Avast Internet Security had the least impact on system performance, with faster-than-average scores in all tests, and very good scan speeds.
While top-ranking Norton In­­ternet Security didn't have quite as light an impact on system performance as Avast, it put up very good scores overall, though performance dragged a little more than average in a couple of tests. Norton also had faster-than-average scanning speeds.
Another big name, though--McAfee Internet Security--was one of the weaker performers here. It had a heavier-than-average impact on PC performance in most tests, and its on-access scan speed (which simulates how well a suite can scan for malware when files are opened or saved to disk) was the slowest of all the suites we tested.

HTC Touch

Posted by Saboor Adem Tuesday, March 30, 2010 0 comments

The Taiwanese mobile manufacturer HTC is in no way lagging behind any other major mobile makers in terms of technology or innovative product features. The only thing its lagging behind from others, perhaps is the hype that others create or get. It quitely entered the wold market and our countrymen now don't hesitate to vouch on HTC's touch phones. And that too in the era of Apple iPhone.
Following groundbreaking innovations like the Android-powered G1 and the iPhone-bothering Touch HD, Taiwanese whiz kid HTC has gone back to the future with its latest handset, an updated version of the original Touch from 2007. many telecommunication countries have always loved new technology and poses as the biggest market for the mobile manufacturers. However, its a budget conscious country too. HTC launched the Touch Viva.

It's launched with an alternative budget handset with the same styling as the Touch 3G, but offers a few updated features over its predecessor. With higher specced alternatives seemingly emerging almost weekly from HTC, the HTC Touch Viva is more easily defined by what it is missing, most notably a 3G connection, GPRS and a 3.5mm jack, plus it's several megapixels short of a decent camera.
Holding back to the original Touch's form factor, with a large D-pad flanked by call start and stop buttons, it manages the trick of being slightly larger than its predecessor, but lighter too, and comes at a little over half the price of an HTC Touch or Pro.

It uses the lessons learned from the Touch's shockingly rapid learning curve, but the cost-cutting omissions soon make themselves known. It has the TouchFLO interface riding on top of the Windows Mobile 6.1 Professional OS, for instance, but not the slightly more groovy TouchFLO 3D. It doesn't look as good, but it looks okay, certainly better than the original, and it's every bit as practical.
It was a strange decision to recess the touch screen though, which means it's awkward to reach it with your thumb at the edges, where the scroll bars are. It means you're encouraged to use the stylus, whether you want to or not. There could be an argument that the recession helps to protect the screen, but not as well as the cover that came with the original Touch (there isn't one with the Viva), and what's the point of protection if it interferes with useability?
Almost as debilitating is the lack of 3G, though it will deliver quad-band GSM as well as 2.5G GPRS and EDGE. You'll find Wi-Fi included though, so higher-speed browsing isn't an impossibility, you'll just be a bit restricted about where you can do it.
The screen is a sizeable 2.8-inches with 240x320 pixel resolution - nothing that's going to push the envelope but perfectly adequate for what's required. The internal memory has been beefed up to 128MB from the painfully measly 64MB of the original and there's a microSD card slot too, though it's under the battery so unlike the original Touch, it's not hot-swappable.
Perhaps surprisingly, the 210 MHz TI OMAP 820 processor is the same as that in the original Touch. Improved processor speed is generally given with updated smartphones, though to be fair, it only seemed to struggle when we had half a dozen applications running at once. Listening to music while browsing the web for instance, didn't present any problems.

The browser defaults to Opera, though Windows Explorer is also available, and browsing is for the most part every bit as good as on other recent Touch models. You can move around web pages by brushing the screen in whichever direction you choose, and pressing the zoom icon onscreen produces a slider which allows you to adjust the page size to whatever you like. Unfortunately, there's no accelerometer on board, and no option to switch the display's orientation to landscape mode, the best way to view full web pages.

The onscreen keyboard is just about big enough to work with thumbs, though again, the lip of the recess can make it a bit tricky to reach the characters at the extreme edges of the screen. We also missed having the option to flip the handset on its side, which might also have made room for larger keys, though switching to compact Qwerty keyboard mode, where each key has two letters helped speed things up a bit.

HTC's addictive YouTube connection is here, allowing you to browse and view the site's online video with ease and fortunately, it switches to landscape in this app for viewing video.
The camera sports a mere two megapixels, which seems almost perverse in these eight-megapixel plus times. The camera has always been the weak link on HTC's Touch devices, with even the five-megapixel version on the recent Touch HD failing to deliver as well as other similarly specced snappers and with no autofocus or flash, photography is clearly not a priority here. That said, there's a 2x digital zoom and the pictures aren't bad if they're taken in reasonable light and don't have much movement going on in them. Viewing pictures isn't as much fun as on other Touchs models however, as the Viva doesn't do the automatic zoom thing when you move your fingertip in circles on the screen, or allow you to brush your way to the next picture.

The music player is the same as other Touch handsets and very good it is too, even through the surprisingly punchy loudspeaker. Disappointingly though, it doesn't come with any headphones, which wouldn't be so bad if it had a 3.5mm headphone jack, but it only has the USB type, so you'll either need to use headphones which already have one of these connections (which are usually pretty shoddy) or you'll need to get an adaptor. Either way, you're probably not going to be listening to music or viewing videos on the bus straight out of the box, which seems unnecessarily stingy.

Battery life is better though, and we got a good couple of days of average use out of it, something we always struggled to manage with the original Touch.
It's not so sexy from a spec point of view, but with its attractive price point, the HTC Touch Viva could prove to be popular with corporate road warriors who get their works phone provided for them. If the recent highly specced versions of the Touch have been a bit rich for your blood and pocket, then this is a perfectly worthy alternative, and if you really need 3G connectivity (and GPS) on a budget, you can always step up to the Touch 3G.

Google Nexus One

Posted by Saboor Adem Sunday, March 28, 2010 0 comments

Google stepped up its attack on the smartphone market on Tuesday, introducing a new touch-screen handset called Nexus One that is widely seen as a rival to Apple’s iPhone.

Google also said that it would sell the Nexus One, which it called a superphone, exclusively through a new online store.

Google, which earns the vast majority of its revenue from advertising, said it was dipping its toes in the direct retailing business not to reap profits from the sale of phones but to broaden the availability of handsets running its Android software.
“There is an opportunity to make some margin on the unit sales, but that’s not the objective here,” Andy Rubin, a vice president of engineering in charge of the Android technology, said during a press conference at Google’s headquarters here. “Our primary business is advertising.”
Consumers will be able to buy the Nexus One for $529 unlocked or for $179 with a two-year calling plan from T-Mobile. Google said that the Nexus One would be available on Verizon Wireless in the United States and on Vodafone in Europe later this year. It said it hoped to add other devices and carriers to the direct-to-consumer program in the future.
Some analysts said they were impressed by the speed of the Nexus One and by some of its capabilities. Google has voice-enabled all text boxes in the device, so a user can, for example, compose an e-mail message by speaking into the phone rather than typing. But they expressed disappointment that Google had not done more to shake up the industry by, for example, subsidizing the phone through profits from advertising.

“It would have been nice to see them roll out something really unique,” said Danny Sullivan, the editor of SearchEngineLand and a longtime Google analyst. “It is more evolutionary than revolutionary.”
The Nexus One, which was built by HTC, a Taiwanese electronics manufacturer, has a 3.7-inch screen and runs the latest version of Google’s Android operating system. At less than a half-inch thick and 4.6 ounces, it is slightly thinner and a tad lighter than the iPhone. It has a removable battery, a 5-megapixel camera with an LED flash and can shoot both still images and video.
Google executives called the Nexus One “exemplar” of what is possible with Android today. They said Google was pleased with the success of Android, which in little more than a year has grown from one device on one carrier to 20 devices with 59 carriers around the world. But they decided to work closely with HTC to design the best possible device based on its software.
The only person in the room who did not appear ready to concede that the Nexus One was the best Android device in the market was Sanjay Jha, the co-chief executive of Motorola, which recently introduced the Android-based Droid.

“I think the Nexus One is a good phone; I think the Droid is a good phone,” Mr. Jha said. But Mr. Jha appeared to embrace Google’s plan to market phones directly to consumers. “I see this potentially as an expansion of the marketplace,” he said.
Similarly, cellphone carriers appeared unperturbed by Google’s plan to sell unlocked phones directly to consumers. “We certainly welcome bringing more choices to the marketplace,” said John Taylor, a spokesman for Sprint. Jeffrey Nelson, a spokesman for Verizon Wireless, said his company was aware of Google’s plans for a store when it signed a broad cooperation agreement with Google.
For now, the Nexus One phone works only on cellular networks using the G.S.M. standard, which in the United States is used by AT&T and T-Mobile. It can run on AT&T’s network if the unlocked-phone owner has an AT&T SIM card, but it will work only on the older and slower EDGE network, not the faster 3G network, Google said.
The Nexus One has a high-speed 1-gigahertz Snapdragon chip from Qualcomm, which keeps multiple applications running quickly. It has some 3-D display capabilities, and Google collaborated with Cooliris, a Silicon Valley start-up, to incorporate that company’s technology, which showcases photos along a scrolling wall of images. Google also introduced a version of Google Earth that runs on the Nexus One.
“It looks like a really cool phone,” said Charles Golvin, an analyst with Forrester Research. “But it is not a game changer.”
Peter Chou, the chief executive of HTC, refused to disclose sales forecasts for the Nexus One, but he said that the device “pushes the limits of what’s possible on a mobile phone today.”
While the Nexus One may be a rival to the iPhone, Google and Apple are approaching the cellphone market with very different strategies: Apple makes money by selling phones and Google makes money by selling ads. But there is little doubt that the two companies are on a collision course.
If the Nexus One or other devices sold through Google’s store succeed, they could eat into the appeal of the iPhone. Meanwhile Apple said Tuesday that it had acquired Quattro Wireless, a mobile advertising start-up, indicating that it has plans to attack Google’s core advertising business.

Computer Batteries

Posted by Saboor Adem Tuesday, March 23, 2010 1 comments

Types of batteries

There are three types of computer batteries found on a computer. The first type of battery is the backup battery, which is commonly referred to as the CMOS battery. This battery is what holds your computer's computer settings, such as the time and date. This allows your computer to remember basic computer settings and allows you to boot the computer without entering those settings each time you start the computer.
Next, the bridge battery is only found in portable computers and is used as a temporary backup for the main battery. This allows you to remove the main battery and replace it with a good battery without having to turn off the computer.

The third type of battery is the main battery. The main battery as explained above is also only used with portable computers and is used as an alternate source of power for when the computer is not connected to a standard wall outlet.

Battery technologies

Li-ion:-Short for Lithium-ion, Li-ion is a fragile technology requiring protector circuit, the Li-ion is used where very high energy density is needed and cost is secondary. Li-ion batters are generally more expensive but have never experienced memory issues that have affected other battery technologies.

Pioneering work for the lithium battery began in 1912 by G. N. Lewis but it was not until the early 1970's that the first non-rechargeable lithium batteries became commercially available. Attempts to develop rechargeable lithium batteries followed in the eighties, but failed due to safety concerns.

Lithium is the lightest of all metals, has the greatest electrochemical potential, and provides the largest energy content. Rechargeable batteries using lithium metal as an electrode are capable of providing both high voltage and excellent capacity, resulting in an extraordinary energy density.

After much research during the eighties, it was found that occasional shorts from lithium dendrites could cause thermal run-away. The cell temperature quickly approaches the melting temperature of lithium, which results in violent reactions. A large quantity of rechargeable lithium batteries sent to Japan had to be recalled in 1991 after a battery in a cellular phone exploded and inflicted burns to a man's face.

Because of the inherent instability of lithium metal, especially during charging, research shifted to a non-metallic lithium battery using lithium ions from chemicals such as Lithium-Cobalt Dioxide (LiCoO2 ). Although slightly lower in energy density than with lithium metal, the Li-ion is safe, provided certain precautions are met when charging and discharging. In 1991, Sony commercialized the Li-ion and is presently the largest supplier of this type of battery.

Li-polymer:-Short for Lithium Polymer, Li-polymer is a battery technology that is a lower cost version of the Li-ion that first started being used in 1996.

Nicad-Trademarked name for a Nickel-Cadmium battery owned by SAFT America Inc. Nicad is a type of rechargeable battery, made mostly of of nickel and cadmium. A primary problem with nickel-cadmium batteries was that they needed to be completely drained of power before they could be recharged.
Known as a memory loss or memory effect, if the battery was not completely drained, once the battery reaches its last low level, the battery would go dead, assuming that no power was left.
NiMH:-Short for Nickel-Metal Hydride and also abbreviated as Ni-MH, NiMH is a type of rechargeable battery used primarily in portable computers.

Research of the NiMH system started in the seventies as a means for hydrogen storage for a Nickel Hydrogen battery. The metal hydride alloys were unstable in the cell environment and the desired performance characteristics could not be achieved. As a result, the development of the NiMH slowed down. New hydride alloys were developed in the 1980's that were stable enough for use in a cell. Since the late eighties, the NiMH has steadily improved, mainly in terms of energy density. Design engineers have indicated that the NiMH has a potential of yet higher energy densities.

What is WiMAX?

Posted by Saboor Adem Monday, March 22, 2010 0 comments

WiMAX or Worldwide Interoperability for Microwave Access, known also as IEEE 802.16, is a telecommunications technology that enables data transmission with broadband speeds and wide coverage without a need for physical connection. WiMAX enables:
-Wireless portable/mobile broadband connectivity.
-Wide cell phone like coverage
-Wireless alternative for cable and DSL last mile broadband access.
-Wireless broadband connection that does not require line-of-sight connection between subscriber and base station.

What is the difference between WiMAX and WiFi?
Distinguishable difference between WiFi and WiMAX are speed and coverage area. Look at the comparison below.
On the technical side, moreover, WiMAX operates on licensed spectrum where frequencies are exclusively allocated to the carriers. Thus, the operators will be able to emit more power without fear of interference. While WiFI, on the other hand, operates on unlicensed spectrum posing the possibility of interfere with other devices. Reportedly, baby monitors and microwave ovens had caused signal overlapping with WiFI.
On the technical side, moreover, WiMAX operates on licensed spectrum where frequencies are exclusively allocated to the carriers. Thus, the operators will be able to emit more power without fear of interference. While WiFI, on the other hand, operates on unlicensed spectrum posing the possibility of interfere with other devices. Reportedly, baby monitors and microwave ovens had caused signal overlapping with WiFI.

How fast is WiMAX compare to current broadband technologies?
Typical WiMAX speed is very competitive compared to prevalent broadband technologies. Considering that most of those technologies are wired, requiring additional cables for operation, WiMAX capabilities show flexibility and velocity at the same time. Consider the following comparison of WiMAX internet with existing and upcoming broadband technologies;

Can WiMAX offer mobile functions?

Yes. Approved in late 2005, the fixed WiMAX 802.16d have now a mobile extension, IEEE 802.16e, optimized for mobile applications. This new standard adds features to WiMAX to support wireless connectivity for moving clients, thus enabling subscribers to access the internet with high speed while in motion. With this standard, devices with built-in mobile WiMAX cards would be able to maintain broadband connection even when they are in the train or a car.

Who offers WiMAX Services? How much does it cost?

In the US, WiMAX broadband for residential and business services are currently offered by the MetroBridge Networks, Towerstream, Valtech Communications, Clearwire, Sprint Nextel, NextWave Wireless, Open Range, Conterra, Open Range Communications, Conterra, RazzoLink, DigitalBridge, Nth Air, NextPhase Wireless ,Rapid Systems, Sling Broadband and Rainbow Broadband in limited areas. WiMAX costs starts from $29 a month for residential and $300 for business plans.

What is the future for WiMAX?

Once widespread, WiMAX can prove its ability to cover a whole city or even a whole country. Undeveloped nations, for example those who cannot still afford nationwide cable infrastructure, would benefit hugely through WiMAX because cable construction is waived. Moreover, the reduced cost and increased coverage would allow financially challenged people to afford internet connection where ever they are. Business oriented people on the other hand would benefit as much, as the mobile broadband service would increase opportunity and stimulation, bringing the internet wherever they are.

Miximum 20MB can be sent through email. some time if need to send more than 20 MB, can utilize following link. its easy and free.
The Easiest Way to Email or Send Large Files to Anyone http://www.transferbigfiles.com/

What does mean 3G ?????

Posted by Saboor Adem Sunday, March 21, 2010 0 comments

Telecommunications companies nowadays, boast about their 3G services and its coverage. But what does a 3G network mean? What is the 3G wireless internet network that we can get through our phones all about? Can we really get mobile internet access comparable to the wired broadband internet? In this article, you would find out the meaning and endeavors of 3G, together with details necessary to appreciate and take advantage of 3G networks.
What is a 3G Network?
Third-generation or 3G, also known as IMT 2000, is a family of radio interfaces which evolved from previous generations to facilitate wider range of services and advanced network capacity. According to the definition of ITU (International Telecommunications Union), 3G includes the following technologies:
  • EDGE (Enhanced Data rates for GSM Evolution)
  • CDMA 2000 (Code Division Multiple Access)
  • UMTS (Universal Mobile Telecommunications System)
  • DECT (Digital Enhanced Cordless Telecommunications)
  • WiMAX (Worldwide Interoperability for Microwave Access)
What is 3G capable of?
It enables network operators to offer subscribers a wider range of advanced services while achieving greater network capacity through increased bandwidth, transfer rates and spectral efficiency. 3G networks are intended to facilitate smart phone advanced capabilities such as the following.
  • Higher data speed
  • Enhanced audio and video streaming
  • Video-conferencing
  • High speed Web and WAP
  • IPTV (TV through the Internet)
How do we use 3G?
To access the 3G network, you need to have 3 things:
  • 3G Compatible Device
  • 3G Network Subscription Plan
  • 3G Coverage
First, you need to have a 3G device which may be a 3G phone or any device with a 3G embedded module. Devices other than 3G mobile phones, such as video cameras, gaming devices and even vending machines are able to accessible to the network as long as it has a 3G embedded module. Furthermore, portable integrated 3G USB modules that would enable laptops to access the network are also available to the market.
Secondly, you need a subscription to a 3G network service provider to get 3G connectivity. These services are often called data plan or network plan. SIM cards or data cards helps the service provider identify its subscribers at this point.
Lastly, to access the 3G phone network you need to be in 3G cities or area where it is available. Through the 3G device and subscription plan, you can access the 3G network whenever within the 3G network. But even if you are not in one, you could still you the previous generation features provided by your carrier because 3G have backwards compatibility. The list of carrier coverage is included on the last part of this article.
What are 3G Mobile Phones?
When we speak of 3G devices, one single device comes to our mind: 3G phones. Simply explained, a 3G phone is any phone which is compatible with the 3G network; it could access the 3G network if given a data plan.
The difference between previous generation phones may not be obvious to the consumers, although there are few similarities among 3G phones which are obviously aimed to maximize the 3G features. They commonly have two cameras, one allowing the users to have video calls and the other for regular camera functions. It also requires a SIM card which enables the service providers to identify the subscribers. Other than that, is usually caters applications that enables video/music download and internet access.
What are SIM cards? And how do we use it?
A SIM or subscriber Identity Module card is a removable memory chip that stores service-subscriber key that is used to identify the subscriber inside a network. It also stores contact numbers, text messages and other data allowing the SIM card user to switch to a new phone easily, by simply inserting the SIM card from the old to the new cell phone.

Apple iPad -Coming April 03,2010

Posted by Saboor Adem Saturday, March 20, 2010 1 comments

I Pad a magical and revolutionary product at an unbelievable price with most required options. wonderful ..... find the video

Unlock samsung mobile phone

Posted by Saboor Adem 1 comments

Note: PLEASE BACK UP YOUR FILES BEFORE UNLOCKING
This will also bring the phone to default settings
1. First do a CUSTOM reset: *2767*2878# (star 2767 star 2878 hash) turn off the phone
2. take out the battery and sim and put wrong network SIM and insert a half of it,so it won't ask for network password and shows "Insert SIM" message. Now put the battery ,and switch the phone on .(phone shows "Insert SIM" message.)
3.With out turn off the phone push the sim fully in. At this stage the phone is still asking to "Insert SIM"
4. Make a FULL reset by typing: *2767*3855#(star 2767 star 3855 hash)
5. The phone should reboot working with "wrong" sim inside.
6. Make a Change the NCK password to 8 zeros by typing: *7465625*638*00000000*00000000#(star 7465625 star 638 star 8zeros star 8zeros hash)
7. Now Disable network lock By typing: #7465625*638*00000000#(hash 7465625 star 638 star 8zeros hash) Phone is unlocked (check with *#7465625#)
If you want more goto this link http://a123.07x.net/tutorials/Unlock_Samsung_Mobile/index.htm

So much information is on the web, its mind boggling. Thankfully we have searchengines to sift through them and catagorize them for us. Unfortunatly, there is still somuch info that even with these search engines, its often a painstakingly slow process(something comparable to death for a hacker) to find exactly what you're looking for.
Lets get right into it.
I use google.com as my primary search engine because it presently tops the charts as far asthe sites that it indexes which means more pertinent info per search.

1. Page translation.Just because someone speaks another language doesn't mean they dont have anything useful to say. I use translation tools like the ones found at http://babelfish.altavista.com and http://world.altavista.com to translate a few key words I am searching for. Be specific and creative because these tools arent the most accurate things on the planet.
2. Directories.These days everything is about $$$. We have to deal/w SEO (search engine optimization) which seems like a good idea on paper until you do a search for toys and get 5 pornsites in the first 10 results. Using a sites directory will eliminate that. You can narrow your search down easily by looking for the info in specific catagories. (PS google DOES have directories, they're at: directory.google.com)
3. Here are some tips that google refers to as "advanced"
A. "xxxx" / will look for the exact phrase. (google isnt case sensitive)
B. -x / will search for something excluding a certain term
C. filetype:xxx / searches for a particular file extention (exe, mp3, etc)
D. -filetype:xxx / excludes a particular file extention
E. allinurl:x / term in the url
F. allintext:x / terms in the text of the page
G. allintitle:x / terms in the html title of that pageH. allinanchor:x / terms in the links
4. ORSelf explanatory, one or the other... (ie: binder OR joiner)
5. ~XSynonyms/similar terms (in case you can't think of any yourself)
6. Numbers in a range.Lets say you're looking for an mp3 player but only want to spend up to $90. Why swim through all the others? MP3 player $0..$90 The 2 periods will set a numeric range to search between. This also works with dates, weights, etc
7. +Ever type in a search and see something like this:"The following words are very common and were not included in your search:"Well, what if those common words are important in your search? You can force google to search through even the common terms by putting a + in front of the denied word.
8. PreferencesIt amazes me when I use other peoples PCs that they dont have their google search preferences saved. When you use google as much as I do, who can afford to not have preferences? They're located on the right of the search box, and have several options, though I only find 2 applicable for myself...A. Open results in new browserB. Display 10-100 results per page. (I currently use 50 per page, but thats a resolution preference, and 5X's the default)
9. *Wildcard searches. Great when applied to a previously mentioned method. If you only know the name of a prog, or are looking for ALL of a particular file (ie. you're DLing tunes) something like *.mp3 would list every mp3.
10. Ever see this?"In order to show you the most relevant results, we have omitted some entries very similar to the X already displayed. If you like, you can repeat the search with the omitted results included." The answer is YES. yes yes yes. Did I mention yes? I meant to.
11. Search EVERYWHEREUse the engine to its fullest. If you dont find your answer in the web section, try the group section. Hell, try a whole different search engine. Dont limit yourself, because sometimes engines seem to intentionally leave results out.ex. use google, yahoo, and altavista. search the same terms... pretty close, right? Now search for disney death. Funny, altavista has plenty of disney, but no death...hmmm.
If you've read this far into this tutorial without saying, "Great, a guy that copied a few google help pages and thinks its useful info" then I will show you WHY (besides accuracy, speed, and consistancy finding info on ANYTHING) its nice to know how a search engine works. You combine it/w your knowledge of other protocol.
Example:Want free music? Free games? Free software? Free movies? God bless FTP! Try this search:intitle:"Index of music" "rolling stones" mp3Substitute rolling stones/w your favorite band. No? Try the song name, or another file format. Play with it. Assuming SOMEONE made an FTP and uploaded it, you'll find it.
For example....I wanted to find some Sepultura. If you never heard them before, they're a Brazilian heavy metal band that kiks ass. I started with this:intitle:"Index of music" "Sepultura" mp3 <-- nothingintitle:"Index of música" "Sepultura" mp3 <-- nothingintitle:"Index of musica" "Sepultura" mp3 <-- not good enoughintitle:"Index of music" "Sepultura" * <-- found great stuff, but not enough Sepultura
t this point it occurs to me that I may be missing something, so I try:intitle:"index of *" "sepultura" mp3 <-- BANG!(and thats without searching for spelling errors)Also try inurl:ftp
I find that * works better for me than trying to guess other peoples mis-spellings.
The same method applies for ebooks, games, movies, SW, anything that may be on an FTP site.
I hope you enjoyed this tutorial, and I saw that recently a book and an article was written on the very same topic. I havn't read them as of yet, but check em out, and get back to me if you feel I missed something important and should include anything else.
intitle:"index of" "google hacks" ebook
Ps. I've said it before, I'll say it again...
BE CREATIVE.You'll be surprised what you can find.

C Cleaner

Posted by Saboor Adem Friday, March 12, 2010 0 comments

CCleaner allows the user to remove unused temporary files from Internet browsers and other supported applications along with browsing history, cookies, recycle bin, and AutoComplete form history.[2] It allows for the cleaning of the recycle bin, memory dumps, file fragments, log files, system caches, application data, and various other data. The program also includes a Registry Cleaner to locate and correct problems in the Windows Registry such as missing shared DLLs, unused file extensions and application paths.
CCleaner supports the cleaning of temporary and unneeded files from certain programs, including Firefox, Opera, Internet Explorer, Safari, Google Chrome, Foxit Reader, Microsoft Office (97, XP, 2003, 2007), Nero Burning ROM, Java, Windows Live Messenger, ZoneAlarm, Flash Player, QuickTime, VirtualDub, Windows Media Player, Paint.NET, 7-Zip, Avira AntiVir, Spybot - Search & Destroy, Windows Registry Editor, eMule, KaZaA, Google Toolbar, Netscape, Adobe Acrobat, WinRAR, WinAce, WinZip, and many other applications.
CCleaner assists in the uninstallation process by allowing users to uninstall programs from CCleaner itself. In addition, CCleaner also allows the alteration of start-up programs, similar to the Microsoft Windows MSConfig Utility. Users can disable several start-up programs to free up processor speed at start-up. As of version 2.13.8, CCleaner also allows users to delete System Restore Points.
U can download in following link: http://www.piriform.com/ccleaner/download/standard

Reasons why PCs crash!!!!!

Posted by Saboor Adem Tuesday, March 9, 2010 0 comments

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager
Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is
www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
2 Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.
3 BIOS settings
very motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).
4 Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5 Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card's manufacturer on the internet and search for the most recent drivers for it.
6 Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates (
www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).
7 Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
8 Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from
www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.
Remember to restore all the BIOS settings back to their former settings following installation.
9 Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from
www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
10 Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Convert File System, fat - fat32 to ntfs

Posted by Saboor Adem Monday, March 8, 2010 0 comments

pen a DOS prompt and give the command
convert d: /fs:ntfs
this command would convert your d: drive to ntfs.
if the system cannot lock the drive, you will be prompted to convert it during next reboot.
Normally you should select yes.
Conversion from fat/fat32 to ntfs is non-destructive, your data on the drive will NOT be lost.
Be aware that converting to ntfs will make that partition of yourdrive unreadable under dos unless you have ntfs utilites to do so.

Stop Spam

Posted by Saboor Adem 0 comments

Change Mcft to microsoft
HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE

Below you'll find many ways (sorted in the most successful ratio first) to stop the Windows Messenger service, depending on your system environment, some may require more than one process. This service is available only on NT, 2K, XP & Server 2003. Administrator Login is REQUIRED
About The Messenger Service

* Messenger is a Windows Service that runs in the background
* Messenger is not the same as MSN Messenger or any other Instant Messaging Program
* Messenger does not facilitate two-way chatting
* Many Windows Programs, Firewalls, UPS and Antiviruses require the Messenger Service
* Antivirus and UPS software, among others, may not work if Messenger is disabled
* The Messenger Service is usually turned on by default in most Windows NT, 2K and XP systems
1. Manually
1. Example 1
1. Click Start, Run and enter the following command:
RunDll32 advpack.dll,LaunchINFSection %windir%\inf\msmsgs.inf,BLC.Remove
NOTE: This will prevent a long delay when opening Outlook Express if you have the Contacts pane enabled
2. To prevent this, click Start, Run and enter {REGEDIT}
Go to:HKEY_LOCAL_MACHINE\Software\Mcft\Outlook Express
3. Right click in the right pane and select New, Dword value
4. Give it the name Hide Messenger Double click this new entry and set the value to 2
5. End result should look EXACTLY like this:
System Key: [HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Outlook Express]
Value Name: Hide Messenger
Data Type: REG_DWORD (DWORD Value)
Value Data: (2 = remove messenger)
2. Example 2
1. Copy and paste the following to Run Command Bar in the Start Menu:RunDll32.exe advpack.dll,LaunchINFSection%windir%\inf\msmsgs.inf,BLC.Remove

3. Example 3
1. If Example 5 didn't work, then try this - Many users miss or don't know of it
2. Click on Start then go to RUN and type:C:\WINDOWS\inf\sysoc.inf
3. Change:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
4. To:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7
5. Then use Add/Remove Windows Components to remove MessengerNOTE: You can also prevent access to Windows Messenger using Group Policy or the Set Program Access and Defaults utility added by default in Windows XP SP1 and Windows 2000 SP3

4 Example 4
1. Open Windows Messenger
2. From the menu, select "Tools" then "Options" then "Preferences" tab
3. Uncheck "Run this program when Windows starts"
4. Open Outlook Express
5. From the menu, select "Tools" then "Options" then "General" tab
6. Uncheck the option to "Automatically log on", if it's there
7. Also in Outlook Express, select "View" then "Layout"
8. Uncheck the option to "display Contacts" - The program will open a connection and display a list of all Contacts on line if you do not
9. In "Startup Folder" make sure there is no entry there for Messenger
10. Open Norton Anti-Virus if you have it installed
11. Click "Options" then "Instant Messenger"
12. Unckeck "Windows Messenger (recommended"NOTE: This list ought to work in disassociate MSN from Outlook Express, so that it'll only start up if you really want it to

Ways to Speed Win XP

Posted by Saboor Adem 0 comments

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will.Each can enhance the performance and reliability of your customers' PCs.Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

How To Block Websties Without Software, block websitesSteps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 http://www.sitenameyouwantblocked.com/ , and that site will no longer be accessable.
5] Done!
-So-
127.0.0.1 localhost127.0.0.2 http://www.blockedsite.com/-->
www.blockedsite.com is now unaccessable<--
For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.
IE: 127.0.0.3 http://www.blablabla.com/
127.0.0.4 http://www.blablabla.com/
127.0.0.5 http://www.blablabla.com/
etc

Step 1 - Modify Explorer.exe FileIn order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry!!!
make a backup of your registry before making changes!!!Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ WinlogonIn the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.