Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, December 5, 2009

How to recover corrupted PowerPoint file using TEMP folder?

Posted on 6:24 PM by Unknown
Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become corrupted when you are trying to save it or if you were working on it and your PowerPoint application or windows crashed due to power failure. Windows saves a duplicate copy of working file as a temporary version. There is no need to use any third party software to manage these types of corrupted files, because you can recover them from TEMP folder. 
Follow the given steps to recover the corrupted files in MS PowerPoint: 


First click on Start button then click on Search option to start your search process.












Here type the *.TMP in "All or part of the file name" box then choose the "Local Hard Drives" option in "Look in" box.


Now click on Search button to start the search process of temporary files on your system local drives. 
After some time, windows locate the list to temporary files. Here arrange the all temp files as Date modified.

Now open the PowerPoint and try to open these temp files or double click on that file to run in PowerPoint.
Read More
Posted in | No comments

8 Tips for Safer Online Shopping

Posted on 10:23 AM by Unknown
The holiday season is upon us, and now more than ever that means shopping on the Internet.
This past Black Friday saw $595 million in online sales, an 11 percent increase compared to Black Friday 2008, according to online market tracker comScore.
But with the comfort and convenience of buying presents from your couch comes with security risks that even the most vigilant shopper can take for granted.
The browser used to be just a place to access Web pages, but as more people makes financial transactions and store personal data there, the security of browsers has become vital to consumers at home and IT managers at the office.
[ For complete coverage on Microsoft's new Windows 7 operating system -- including hands-on reviews, video tutorials and advice on enterprise rollouts -- see CIO.com's Windows 7 Bible. ]
Microsoft has offered up tips on how to fortify your browser against viruses, spam and malware.
Naturally, Microsoft would prefer you use Internet Explorer 8, although it's worth noting that Internet Explorer has been losing market share throughout 2009, and Mozilla's Firefox, Apple's Safari and Google's browser Chrome all have security features of their own.
Internet Explorer 8: Five Security Features for Enterprise Users
Internet Explorer currently has 63.6 percent of the browser market share, a six percent drop from January 2009, according to Web metrics company Net Applications.
Here are eight (as in Internet Explorer 8. Get it?) ways to have a safer time shopping online.
Keep your computer's software and browser current. Microsoft's Download Center is a good place to start.
Protect your computer with firewall, antivirus, antispam and antispyware software. Click here for a list of security software providers.
Beware of phishing scams and malware. IE8's SmartScreen Filter feature alerts users if a Web site you are trying to access has been reported as unsafe and allows you to report any unsafe sites you find. SmartScreen Filter and other security features can be accessed in IE8 under the Safety tab in the upper right hand corner.
Protect yourself against cross-site scripting attacks. Cross-site scripting, or XSS, attacks allow malicious code to be injected into Web pages that can lead to identity theft. What's most unsettling about XSS: everything looks normal to the user while unauthorized access is being given to a hacker and sensitive data is being stolen. IE8 has a built-in XSS Filter that is always on.
Identify Fake Web Addresses. By highlighting the domain name of a Web address in black, IE8 makes it easier to see a site's true identity, thus avoiding getting fooled by a deceptive Web site.
Browse more privately. The InPrivate Browsing option in IE8, located under Tools, allows you to surf the Web without the browser storing data about your session. Temporary Internet Files, Web address history, cookies and passwords are all disabled.
Make Sure Payment Web sites Use Encryption. Any Web site that processes credit card information must use encryption. To make sure of this, look for: An "s" after http in the Web address - it should read https; a closed padlock icon in the address bar or at the lower-right corner of the browser window; a green address bar - IE8 uses green to indicate a trustworthy site.
Never Respond to Unsolicited Requests to Update Your Account Information. An e-mail asking to update account information might be a scam for stealing your identity. Legitimate companies never send unsolicited e-mail or instant message requests for your passwords or other personal information.

 http://www.pcworld.com/article/183518/8_tips_for_safer_online_shopping.html
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How to change ur static ip
    To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem t...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • Optimizing Mouse PS/2
    If you still use PS/2 mouse, you can optimizing your mouse by change the sample rate. Start -> control panel -> switch to classic view...
  • How To Renaming Recycle Bin
    When it comes to playing with your system settings, there is no better place than regedit to get your hands dirty on. Regedit the short for ...
  • How to Speed Up Your SATA Hard Disk
    Windows Vista is featured with SATA support, but for your information the facilities is not 100% work. You need to do some click here and th...
  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Three old Windows right-click tricks that still rock
    They say you can't teach an old dog new tricks. But what about old tricks? As a longtime Windows user, I can tell you that occasionally ...
  • No Sound on Computer?
    No sound from computer? It is an annoying problem which bothers thousands of computer users. I got this problem once. When I used windows me...
  • CHANGE TITLE of WINDOWS MEDIA PLAYER
    1. Open registry editor. 2. Browse to subkey HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer. 3. Make a new string. ( Right...
  • Why you may want a desktop instead of a laptop
    Laptops long ago surpassed desktops in sales, and tablets and smartphones are taking major market share from laptops. The tendency is clearl...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ►  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ▼  2009 (32)
    • ▼  December (2)
      • How to recover corrupted PowerPoint file using TEM...
      • 8 Tips for Safer Online Shopping
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile