Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, June 30, 2013

How to boot to desktop mode in Windows 8.1

Posted on 5:44 PM by Unknown
One of my chief complaints with Windows 8 is that Microsoft forced you to boot to the new Start screen rather than giving you the option of booting to the desktop--which is where I prefer to hang my computing hat.
You could work around this using any number of utilities (most of which were designed primarily to restore the missing Start button, essential if you are working in Desktop), but with the release of Windows 8.1, Microsoft has added the capability.
In other words, now you can boot directly to the desktop. It's not immediately obvious how--Microsoft still doesn't outfit Windows with any "guides to new features" or the like, a silly oversight--but at least it's easy once you know the steps.
1. After booting Windows 8.1 (here's how to get the preview if you don't already have it), click the Desktop tile to enter Desktop mode.
2. Right-click any open area in the taskbar, then click Properties.
3. Click the Navigation tab, then check the box next to Go to the desktop instead of Start when I sign in.
4. Click OK, then reboot. Windows should plunk you right into Desktop.
And that's all there is to it. If you want to go back to Start-screen booting, just repeat the process and uncheck the box in step 3. (Also, if you don't have a Navigation tab, leave a comment letting me know. This appears to be an issue for some users. I'm investigating why.)

Source
Read More
Posted in | No comments

Thursday, June 20, 2013

Five surefire ways to maximize your laptop's battery life

Posted on 10:19 PM by Unknown
You adore your laptop. It lets you get down to business wherever you happen to be—airport lounge, coffee shop, your home office. It’s the key to your competitive edge.
That is, until its battery croaks. Just as you’re putting the final details on your PowerPoint presentation. At the airport. Two hours before takeoff. And with no power outlet in sight. At that instant, you begin to wonder why you ever bought the ever-lovin’ boat anchor in the first place.
But love will bloom anew as soon as you recharge. Avoid the heartache, however temporary: Follow these five tips for maximizing your laptop’s run time.
Never miss an opportunity to plug your laptop into an AC outlet to top off its battery.

1. Plug in whenever possible

One surefire way to ensure that your laptop is always ready for action is to plug it into an AC outlet whenever possible. Keeping the machine fully charged makes it far more likely that you will always have the juice you need to complete your work. Purchase at least one extra AC adapter, so you’ll always have one in your office and one in your laptop bag for travel. If you work at home frequently, consider buying a third adapter to leave there.
Terminate the offending process by right-clicking it and selecting ‘Kill Process’.
A common misconception about laptops is that leaving the system plugged into AC power continuously will overcharge or shorten the life of its battery. Given that the lithium cells used in modern laptops will either catch fire or explode if overcharged, this is obviously not true. Lithium ion batteries stop charging once they reach full capacity, and keeping the battery charged reduces wear and tear on the power source, lengthening its useful life span.

2. Adjust the screen brightness

Modern displays with LED backlights are a major improvement over the CCFL (cold cathode fluorescent tube) backlit displays of yesteryear, in terms of both picture quality and power efficiency. Still, a laptop’s display claims a significant percentage of the power that the system consumes. As such, keeping the screen backlight low can increase your laptop’s run time noticeably. You should also take care in choosing where you work: A low backlight setting will be far more comfortable in a cafĂ© with soft lighting than in a brightly lit room.
Be aggressive in conserving power while your laptop is running on battery.
Another way to reduce the power the display consumes is to tweak the automatic backlight controls in Windows. Open Control Panel, choose Hardware and Sound > Power Options,and click Change plan settings for the active power plan. Choosing an aggressive timeout of 1 to 3 minutes under the ‘Dim the display’ and ‘Turn off the display’ options while the machine is operating on battery power will eke out more battery life by dimming or switching off the screen after the specified amount of inactivity. You can also click theChange advanced power settings option to set the level of brightness when the laptop is in the dimmed state.

3. Track down errant apps

One culprit often responsible for draining the battery ahead of its time is the presence of errant software applications that suck up disproportionate processor cycles. Unnecessary utilities running in the background, or an app that is hanging, can also cause this effect. Web browsers are particularly prone to the latter problem, due to the multiple plug-ins, rendering engines, and scripting engines embedded within them.
Use the tabs in Windows Task Manager to identify and kill errant programs that are sucking up battery life unnecessarily.
Modern CPUs save power by dynamically scaling back their clock speed to the minimum possible, but they can do so only when apps aren’t active. If you fail to deal with rogue apps, they will not only drain battery power—they might also slow down your entire system. One clue to the existence of an errant app is if your laptop fan frequently kicks into high gear when the machine should be idle.
Resolving the problem is relatively straightforward: Press the Ctrl-Alt-Delete key combination, launch Windows Task Manager, and use it to identify processes that are showing unexplained high utilization. If a program won’t exit normally, terminate the offending process by right-clicking it and selecting Kill Process. For Web browsers, shutting off all instances usually works. Should all else fail, perform a system restart.

4. Disable intensive background apps

Errant apps aside, applications that make intensive use of the processor or network should remain closed when your laptop isn’t plugged in. Peer-to-peer software such as BitTorrent clients and computationally intensive applications such as distributed-computing projects (Folding@Home, for example) are out. You can also confirm that Windows Update and other software updaters are not attempting to download large software patches.
Disabling automatic Windows Update functions outright is too draconian (particularly if you forget to reinstate the feature later), but periodically checking on your network usage for unexplained spikes will allow you to identify and stop large file transfers before they gobble up precious minutes of battery life.

5. Disable unneeded devices

You can disable unneeded hardware devices or ports to squeeze out a few more minutes of power, although this option isn’t possible with every laptop. Start by disabling unneeded wireless capabilities, such as built-in data modems and Wi-Fi and Bluetooth radios (many laptops have hardware switches for this purpose).
The optical-disc drive is another power guzzler that can drain batteries fast, so don’t leave a DVD or Blu-ray disc in the drive if you don’t need it. Finally, many laptops these days come with backlit keyboards; these are great when you’re in a dark environment, but you can save precious power by doing without the feature when your laptop is running on battery power.
Depending on your laptop model, you may be able to use Device Manager to disable unnecessary devices and ports.
Source
Read More
Posted in | No comments

Sunday, June 9, 2013

Add a Wi-Fi hotspot to Windows 8 with Virtual Router Plus

Posted on 2:34 AM by Unknown
Recently I spent a full week in a hotel, where I grudgingly paid for Wi-Fi so I could get some work done. Unfortunately, it was a per-device purchase: Only my laptop could get online. If I wanted Internet access on my phone (which had a weak indoor signal) and tablet (Wi-Fi only), I'd have to pay again. And again.
Hey, wait a minute, doesn't Windows let you set up a Wi-Fi hotspot to share its connection with other devices? It did, in Windows 7; it doesn't in Windows 8. Actually, the capability is still there, but enabling it requires some serious command-line tinkering.
Fortunately, I found Virtual Router Plus, a free utility that adds Wi-Fi hotspot capabilities to Windows 8. It works, but with a few important caveats.
First, be really careful during setup. The price of "free" here is that the installer comes packed with junkware. It's easy enough to bypass if you pay attention, but potentially troublesome if you don't.
On the first screen, choose Custom Installation, then uncheck the box below it. When you click Next, a pop-up will appear; click Cancel. Click Next again, then clear yet another checkbox. Now you're good to go with a clean install. Oy.
When you run the program, it'll pop open a help page in your browser, which you may need to verify whether you have the required device drivers. But skip that for now; instead, try using the utility.
To do so, give your network a name (i.e. SSID), then enter a password (to keep freeloaders out). Finally, choose the connection you want to share (which is probably whatever appears as the default). Now click Start Virtual Router Plus.
After a few moments, you should be able to detect your new network from your phone, tablet, or even another PC. But don't worry: your laptop will retain its own Internet connectivity at the same time.
As I noted before, the utility worked as advertised, but it did create one problem: I could no longer connect to the various virtual private networks (VPNs) I use. Your mileage may vary, and if you don't work with VPNs, you're golden. As for me, I unfortunately had no choice but to uninstall the utility to regain access.
From
Read More
Posted in | No comments

Friday, June 7, 2013

Regain your PC's administrator rights, even if you don't have the password

Posted on 6:18 AM by Unknown
Your Windows PC has at least one administrator-level account. If you can't access that account, you've got a problem--you can't install or uninstall programs, or change certain settings.
I'll tell you a way to gain this access,  but first, ask yourself if you really should be doing this. If it's unquestionably your computer and you've forgotten your password (or if the previous owner failed to give it to you), you have every right acquire or change the password. But if it's a company computer and the IT department wants to keep full administrator control to itself, this is a good way to get fired. And if it's someone else's computer, it's a good way to get arrested.

You can access the password through the free Trinity Rescue Kit. It hasn't been updated in two years, but it still works like a champ.
Before we get into details, some warnings:
  1. Since it can change or remove the password, but not reveal the existing one, Trinity won't let you secretly gain control of the PC. The rightful administrator will find out that you've been tampering with it. 
  2. If there are EFS-encrypted files in the administrator's libraries, these files will become inaccessible. Decryption will only be possible if someone backed up the credentials ahead of time.
  3. I successfully tested this technique in Windows 7, and have every reason to believe that it will work in XP and Vista. It will not work in Windows 8.
Trinity downloads as an .iso file, which you can burn to a bootable CD. You can also use the Universal USB Installer to create a bootable flash drive. (If you don't know what I'm talking about, see Boot discs explained: An overview of booting your PC from something other than your hard drive.)
When you boot Trinity, you'll find yourself in an ugly, text-based environment. But not a difficult one. From the initial menu, selectWindows password resetting.
At the next prompt, select Winpass with prompt for username first, then enter the login name for the administrator account.
Most of the questions you'll be asked are easy to answer. When you get to the User Edit Menu prompt, select the first option, Clear (blank) user password. That will allow you to boot into the administrator account without entering a password.




Source
Read More
Posted in | No comments

Sunday, June 2, 2013

When malware strikes: How to clean an infected PC

Posted on 5:04 AM by Unknown
You work hard to protect your PC from the malicious thugs of our digital world. You keep your antivirus program up to date. You avoid questionable Web sites. You don’t open suspicious email attachments. You keep Java, Flash, and Adobe Reader up-to-date—or better yet, you learn to live without them.
But against all odds, a clever new Trojan horse slipped through the cracks, and now you’re the unhappy owner of an infected PC. Or perhaps a less-vigilant friend has begged you to clean up a plague-ridden mess.
Obviously, you need to scan the computer and remove the malware. Here’s a methodical approach that you can use to determine what the problem is, how to scan, and what to do afterward to protect the PC from future invasions.

1. Verify the infection

Is the PC in question really infected? I’ve seen people blame “another damn virus” for everything from a bad sound card to their own stupidity. The first step in restoring the system’s health is to determine whether what you’re dealing with is a virus rather than a problem with hardware, software, or user error.
If your PC is unusually slow, or if it seems to do a lot of things on its own that you haven’t asked it to do, you have reason to be suspicious. But before you decide that a virus must be responsible, take a moment to launch the Windows Task Manager (right-click the Windows taskbar, and select Task Manager from the pop-up menu). Open the Processestab, and check for any strange or unknown applications running in the background—especially those with nonsensical names and no recognizable authority listed in the description. The odd-looking “wuauclt” process is fine, for example, because it belongs to Microsoft (it’s actually part of the Windows Update service, as you can tell from the description.)
Of course, this is only general guidance; there's nothing to stop a piece of malware from masquerading as a legitimate process by sporting an inoffensive description. That said, you'd be surprised how often a piece of malware gives itself away with a line of strange characters or symbols where the process description should be.

2. Check for sure signs of malware

Truly insidious malware will preemptively block you from trying to remove it. If your PC suddenly won’t load utilities that might help you manually remove malware—such as msconfig or regedit—be suspicious. If your antivirus program suddenly stops loading, that’s a huge red flag.
AVG
Fake warnings like this one try to scare you into running a file to 'remove malware' (read: install malware) or giving up your credit card information to pay for bogus antivirus software.
Sometimes the attack is more obvious. If a program you don’t recognize suddenly pops up and starts displaying dire warnings and asks you to run an executable file or asks for your credit card number, your PC is definitely infected with some nasty malware. Never fork over your credit card information or other personal data to a program or website that tries to warn you that your PC is about to die. More often than not it’s a rogue program, fear-mongering malware that tries to scare you into giving up your private info by issuing doomsday warnings of imminent hard drive failure, catastrophic viral infection, or worse.

3. Check online for possible fixes

The one benefit of those scary pop-ups is that they could point you toward a cure. Use your favorite search engine to look for phrases that appear in the pop-up—you’ll probably find other people fighting the same infection. Their experiences could help you identify your enemy or even find step-by-step instructions for removing the malware. Be prudent: Take advice only from sites that seem reputable, and remember to perform a full scan of your PC after you’ve followed any instructions, even ours.
Barring any clues that lead you to a magic solution, scanning becomes your next and most important step.

4. Assume that your old virus scanner is compromised

Don’t waste time scanning your hard drive(s) with your regular antivirus program. After all, that program probably failed to catch the malware in the first place.
But don’t be too hard on it. Nothing’s perfect, and even the best antivirus program can occasionally miss a new or particularly cleverly designed virus. And once that virus slips through, your antivirus program is compromised. You have to assume that the malware, not the security software, is in control.
You need a fresh malware scanner—one that’s not already installed on your computer. It must be capable of detecting and removing malware from your PC, and you need to run it in an environment where the malware can’t load first. Linux is your best bet, but before you jump to that option, try booting into Windows Safe Mode to see if you can outflank your virus infestation there.

5. Use a lightweight scanner inside Safe Mode

Windows has a Safe Mode that boots a minimal version of the operating system, with generic drivers and nothing else. It doesn’t load most startup applications and—most likely—it won’t load the malware that’s infesting your PC.
To enter Safe Mode, boot your computer and press the F8 function key before Windows starts loading. The timing is tricky, so it’s best to mash F8 repeatedly from the moment the motherboard manufacturer’s logo appears onscreen until you get the boot menu.
Use the Windows boot menu to access Safe Mode.
When you reach that menu, select Safe Mode with Networking from the list of boot options. The with Networking part is important—you’re going to need Internet access to solve your virus problem.
Once in Safe Mode, open Internet Explorer (using other browsers in Safe Mode is often problematic) and run a reputable online virus scanner such as Bitdefender. For best results I recommend using the ESET Online Scanner, a Web-based virus detection app that is always up-to-date and runs off a remote server. You’ll have to accept a browser add-in, but the scanner should remove it when it’s done. Before you start the scan, click Advanced settings and enable as many extra levels of scrutiny as you can, including scanning file archives and browser data.
The ESET Online Scanner runs in your browser and does a thorough job of rooting out malware from your PC.
You might also try Trend Micro’s HouseCall. Though it isn’t a Web app, it is portable, so you can download HouseCall on another computer and copy it to a flash drive, thereby creating a portable PC virus scanner. Then, when you run into trouble you can plug the flash drive into the infected PC and run the program from there (you’ll still need an Internet connection for a definition update, however.) When using HouseCall, don’t run it on default settings: Before you click the big blue Scan Now button, click Settings and select Full system scan.
Trend Micro's HouseCall utility is another excellent, free virus scanner and malware removal tool.
Whichever scanner you use, don’t rush to get through this part of the process. Check the options and select the slowest, most thorough scan. Then, once the scan has started, step away from the PC. Read a book. Do the dishes. Spend time with someone you love. The scan will—and should—take hours.

6. Remember: The second scan's the charm

When that first scan is done—just to be sure—run another one with a different scanner. It’s easy, and you’ll sleep better after multiple scanners have assured you that your drive is clean.

7. Look to Linux as your last line of defense

Booting into Safe Mode may not short-circuit particularly malicious malware. If you still have trouble with an infection after running multiple scans in Safe Mode, you’ll have to bypass Windows altogether and avoid booting from the hard drive. To manage that trick, use a bootable CD or flash drive running a Linux-based antivirus utility.
You don’t have to know Linux to take this step. But you will want an Internet connection, since these scanners must go online to update their malware databases.
The first step is to download a bootable virus scanner as an .iso file. From it, you can easily create a bootable CD. In Windows 7, double-click the file and follow the prompts. In Windows 8, right-click the file and select Burn disc image. For earlier versions of Windows, you’ll need a third-party program such as the free ISO Recorder.
With its Windows-like user interface, the Kaspersky Rescue Disk will make you feel at home. But you have to be careful in setting up the scan. First, the Kaspersky Rescue Disk doesn’t update its malware dictionary automatically. To do this manually, select the Update Center tab and click Start update. Once the utility is updated, return to the Objects Scantab, click Settings, and set the security level to the highest position. Make sure that all of your hard drives are checked before you start the scan and leave the room.
When you boot your PC with the Kaspersky Rescue Disk utility, you'll find yourself in a custom Linux environment. Simply update the Rescue Disk, crank all the scan settings up to maximum power, and let 'er rip.
If you want to boot the Kaspersky Rescue Disk from a flash drive, you’ll need to download the prosaically named Utility to record Kaspersky Rescue Disk 10 to USB devices. Save it in the same folder as the .iso file, run the utility, and follow the wizard.
The F-Secure Rescue CD isn’t as outwardly friendly as Kaspersky’s program. In fact, it may make you nostalgic for DOS. But it works, though you may receive the following (unduly alarming) warning message: If a Windows system file is infected, the computer may not restart. I’ve never heard of anyone whose Windows system failed to restart after an F-Secure scan, and I suspect that the eventuality is very rare. I also suspect that if malware did infect a Windows system file—and if F-Secure couldn’t clean the file without destroying it—reinstallation might be your only option anyway.
The F-Secure Rescue CD is a bare-bones cleaning utility for when you need to wipe every piece of malware from your PC without starting Windows.
F-Secure has a stripped down, unattractive, text-based user interface. But unlike Kaspersky, it updates its definitions automatically (if it can find an Internet connection), and starts a full, thorough scan with no fuss—you have to do little more than agree to the EULA.
F-Secure doesn’t offer a special USB utility. If you want to move a copy of it onto a flash drive, you’ll have to download and run the Universal USB Installer. In Step 1, you’ll find F-Secure Rescue CD near the bottom of a very long list. I suggest you go straight to the bottom, and then look for it while slowly scrolling up.

8. Protect your newly disinfected PC

When you’re satisfied that your drive is clean, try rebooting into good old Windows. Then uninstall your old antivirus program—it has been compromised.
Of course, you don’t want to stay unprotected. Reinstall the program and update to the latest version, or (if you’ve lost all faith in it) install a competitor. For more information on how to choose the best antivirus program for your needs, check out our full rundown—with empirical testing—of the best security software available today.
Because when it comes to malware, a byte of prevention is worth a terabyte of cure.
Source
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • How Access Registry Using Command Prompt
    Firstly, you need to know that regedit.exe is a tool that created to access registry based on windows. And reg.exe is a tool that created ...
  • Pirate Bay to sue antipiracy site for pirating its design
    An antipiracy group may find itself in legal trouble after borrowing the look of the Pirate Bay Web site for a new campaign. The Pirate Bay...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ▼  June (5)
      • How to boot to desktop mode in Windows 8.1
      • Five surefire ways to maximize your laptop's batte...
      • Add a Wi-Fi hotspot to Windows 8 with Virtual Rout...
      • Regain your PC's administrator rights, even if you...
      • When malware strikes: How to clean an infected PC
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile