Ads 468x60px

Labels

Thursday, March 21, 2013

Microsoft Windows 7 is the latest public release version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 7 is the newest and most beautiful Microsoft OS. But Windows XP and Windows Vista are enough for us. Is it really necessary to update our OS to Windows 7? There are dozens of reasons, big and small, to get Windows 7. I designed it to simplify your everyday tasks, work the way you want, and make new things possible. To see what I mean, you can start with the top 10 reasons. 1. Get quicker access to all of your stuff: use Pin and Jump Lists to keep the programs and files you use the most right at your fingertips. 2. Manage open windows more easily: resize and arrange windows simply by dragging their borders to the edge of your screen. 3. Quickly find what you're looking for: use Windows Search to find a specific file, program, or e-mail in a few seconds. 4. Share files and printers among multiple PCs: from one Windows 7-based PC to another, you can share files, music, photos, and even printers across your home network. 5. Stay entertained effortlessly: with Windows Media Center you get one place to enjoy your photos and music, watch and record live TV, and watch free Internet TV. 6. Easily create and share movies: create great looking movies and slideshows and share them on YouTube in minutes. 7. Connect to networks easily: view and connect to any available wireless network in as few as three clicks. 8. Do more and wait less: improvements that can accelerate sleep and resume and make your PC more responsive help you get more done. 9. Don't leave programs behind: run many Windows XP productivity programs in Windows XP Mode. 10. Offers your PC better protection: help keep your PC, your information, and your family safe. Compare with Windows XP and Windows Vista, Windows 7 is more powerful. Built upon the security foundations of Windows Vista, Windows 7 introduces the right security enhancements to give users the confidence that Microsoft is helping keep them protected. Businesses will benefit from enhancements that help protect company sensitive information, that provide stronger protections against malware and that help secure anywhere access to corporate resources and data. In this session we will discuss the core security features of Windows 7 and explore their usage scenarios. But such as Administrator password,Windows 7 still using the same encrypt arithmetic as the previous versions of windows. That means that if you need to reset Windows 7 password, you can just use the similar methods like Windows Vista or Windows XP or use some Windows 7 password recovery tool which is used for Windows 7 password reset.

Dell has produced the Vostro 1400 with both low cost as well as great performance. The Dell Vostro series is focused basically on the small enterprises, so that there is no doubt for consumers to take on this uber-low cost and amazingly great specification. It is a stylish and light system especially for frequent travelers. The Dell Vostro 1400 is a more powerful performer with a portable design, with the use of Intel CPUs and a 14.1 inch screen, with a pocket friendly cost. You are now loaded with Intel Celeron M540 CPU, and 1GB of DDR2 667MHz RAM, a 120 GB hard drive and also the Intel GMA X3100 graphics. Considering the cost and the specification you are getting a Dell Vostro 1400 worth its price. The usual 120 GB of disk space of Dell Vostro 1400 is great for user with small enterprises. The incorporated Intel GMA X3100 graphics card is good if you work daily and daily task like presentations and movies but with non-high definition etc. is good. The Vostro 1400 ships as standard with the Microsoft Windows Vista and is fine and also the standard Celeron 540 can work on the Vista. For movie watchers its good news as the panel runs at a resolution of 1,280x800 pixels that is great for movies with widescreen display. The notebook PC is powered with Duo mobile technology with 1.66 GHz Intel core2 duo processor T5470, with an 802.11g Wi-Fi, and 8 in 1 media card reader. The weight of the Dell Vostro 1400 is around 2.45 kgs, with 2MB L2 Cache, and 800MHz FSB, Intel 965GM Express chipset, standard 24xCD burner/DVD-RW combo Optical drive, 80-GB SATA hard disk drive (5400rpm), 1-GB DDR2 SDRAM. The dell has given an enhanced long-lasting and the chassis are magnesium-alloy, strike zone hard drives and sealed keyboards. The Windows Vista Home Basic version with preinstalled provides a wireless 1390/802.11g Wi-Fi mini card for wireless connectivity and is also provided with an integrated 10/100 Gigabit Ethernet Lan controller, IEEE 1394, VGA video output and S-video and in-built stereo speakers, built-in 56 kbps V.92 Fax/Modem and 4xUSB 2.0 ports. The Dell Vostro 1400 has an 85 WHr 9-cell lithium Ion primary battery, which gives you a battery life of 8 hours when fully charged. The dimension of the 1400 is width is 13.13 inch, the height is 1.53 inch and the depth is 9.61 inch.

If you want your business or corporation to be highly productive, you have to form an organised, stable and secure network that consists of workstations and dedicated servers. Dedicated servers are required if you want to create an intranet that hundreds of computers will access. When it comes to file sharing and communication, a good dedicated server will give you the stability and performance that your business needs. If you are still looking for a reliable dedicated server, you should choose Dell for the following reasons. Dell are a top brand for computers and laptops these days yet arguably they haven?t really been so successful in the tablet and smartphone industry. This is why Dell has made the decision to follow the path of IBM and focus more on the enterprise sector. Dell remains committed in serving consumers but their new focus is good news for emerging companies that are looking for good server solutions. With this shift, Dell can focus on enhancing their PowerEdge line-up of servers. As of 2012, Dell introduced the 12th generation of PowerEdge tower, rack and blade servers. There are dozens of models to choose from, which is always good for businesses because they can choose the right specs for their networking requirements at a reasonable price. The price of each configuration is listed on the Dell website so you can always move on to another model for comparison purposes and see what the cheaper dedicated servers are missing. The Dell website has a PowerEdge section where you can choose the type of server you want. Then you can choose your segment so you will be pointed to the right configuration. Their newest servers are equipped with the latest 32nm E5 Xeon Processors. You are able to choose the number of processors and cores per processor depending on the role of your server. You can also choose from a variety of operating systems including Microsoft Windows Server 2008 R2 64-bit including Hyper-V, Microsoft Windows Small Business Server 2011, Red Hat Enterprise Linux, SUSE Linux Enterprise Server and even VMware vSphere. With such futureproof specifications, these Dell dedicated servers should be ready to handle future operating systems like Windows 8 Server. Since Dell is so committed to the enterprise now, Dell dedicated server owners should have better access to support when problems arise. Dell features global support and aims to reduce the level of IT complexity through their dedicated Dell Services team. Dell has an extensive support site where you can engage in live chat conversations with members of the support team or contact Dell experts through email or phone. With Intel developing new chips, Dell will definitely be one of the first to feature new PowerEdge models that feature more powerful and efficient hardware to make businesses even more productive. On top of that, some of the biggest corporations and enterprises use Dell dedicated servers for reliable operation.

What is Windows 7?


Windows 7 is the name for the upcoming version of the Microsoft Windows Operating system. The operating system has gone under a number of different codenames including Blackcomb and Vienna but is now called Windows 7 - this was possibly to make it sound less enticing upon the release of Windows Vista in order to encourage people to buy Windows Vista rather than waiting. That said, in October 2008 Microsoft said that Windows 7 would be the name of the software on its release.



The software will follow Windows Vista (which is version 6) which, in turn, followed on from Windows XP (Version 5.1) and Windows 2000 (Version 5)When can we expect Windows 7?



Microsoft is working on a 3-year timeframe for this project. Windows Vista notably suffered a number of setbacks in its development which meant that there was a big gap between the release of Windowx XP (October 2001) and Vista (31 November 2006).



By virtue of its size and the legacy software it supports, Windows has a lengthy gestation period which is why there were problems with the release of Vista.



According to an article written by Microsoft's Doug How, Windows 7 will be released in mid-2009. This is subject to how rocky the road is on which Microsoft lays its roadmap.How big an imporovement will Windows 7 provide?



Windows 7 is intended to be an incremental update rather than a full-blown re-write. This means that the aim is to make it fully compatible with existing device drivers, applications and hardware.





Current areas of focus are:



Improving performance Windows Vista, although it had more funcitonality, was noticably more resource-hungry and therefore slower than Windows XP



Multi-touch support Microsoft have been working on the Surface PC which enables people to touch, move & resize images using more than one finger. This will pave the way for elaborate computing as seen in the film Minority Report



A new taskbar Quick Launch and the toolbar have been merged to create a "Superbar"



A redesigned Windows Shell



A home networking system called HomeGroup a simplified version of the Active Directory for home networks



Handwriting recognition Automatic learning is a handwriting recognition feature that is available on Tablet PCs and external tablets. This feature collects data about the words that you use and how you write them. Automatic learning is enabled by default, and the handwriting recognition software will attempt to recognize and improve its interpretation of your handwriting style and vocabulary.



Support for virtual hard disks



Improved performance on multi-core processors



Improved boot performance



Colour bit depths of 30 & 48 bits



Internet Explorer 8 a new Internet browser focusing on security, ease of use, improvements in RSS, CSS and Ajax and including automatic crash recovery & web slices



Windows Media Player 12 Windows 7 will include a new version of Windows Media Player



Windows Media Center Windows Media Player finally comes with a wider range of codecs (DivX, XviD, H.264, AAC, ABC HD and the Flip format), and Media Center supports IPTV and DVB-T. Put a DVD in your PC and it will play automatically. And you can play shared music from a HomeGroup on any PC, or even stream it to a DLNA device like a Sonos ZonePlayer



Microsoft Paint Windows 7 will include a dramatically improved version of Microsoft Paint, the most dramatic upgrade to this software since the first versions of WindowsHow will it look?



Windows 7 will take a more desin-led approach, making it easier to use as a result. Mant of the Windows applications, like Paint & Wordpad will use the Ribbon that Office 2007 uses with the aim of putting things where people expect to find them in a way they can understand.



The changes will aim to remove the perception that PCs are difficult to use. For example, there are six different methods that you can use to open up your email client in Vista (including icons on the desktop, taskbar, system tray & Start menu): Windows 7 replaces these with an icon on the taskbar that launches Outlook and gets you back to it once it's open.


How to: Show-IT - Add contacts to the Address Book in Microsoft Windows XP.


Solution:



In the Start menu, select 'All Programs'. Select 'Accessories'. Click 'Address Book'. In 'Address Book', to create contacts available to all users, click 'Shared Contacts'. In the 'File' menu, click 'New Contact'. In the 'Properties' dialog, click each tab and fill in the details. Click 'OK'.



Details:



Click here to view Show-IT. This will display a Flash movie tutorial on how to add contacts to the Address Book in Microsoft Windows XP. The Microsoft Windows XP provides an address book in which you can maintain contact information and use the information in applications such as Microsoft Outlook Express and Microsoft Outlook. To add a contact to the Address Book:



1) Click the 'Start' button and select 'All Programs'.



2) Select 'Accessories' and click 'Address Book'. The 'Address Book' is now displayed.



3) To create contacts available to all users, click 'Shared Contacts'. The Address Book window



4) In the 'File' menu, click 'New Contact'. The 'Properties' dialog box is displayed. The 'Properties' dialog box



5) Click each tab and fill in the details.



6) Click 'OK'. The contact is added to the list on the right. Contact list



7) In the 'File' menu, click 'Exit' to exit the Address Book.



Symptoms:



How to: Add contacts to the Address Book in Microsoft Windows XP.



Keywords:



add contact address book Microsoft Windows XP



Applies To:



Microsoft Windows XP Professional


Supporting Users and Troubleshooting a Microsoft Windows XP Operating System After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams.... * Reinforces what you learnt - fill in the gaps of what you missed * Gets you used to answering questions to build confidence and familiarity Here are 10 Multiple choice exams questions for you to practice on: ______________________________ Question 1# - A user changes the mouse scheme on his system. After changing it, he finds that his mouse no longer works and he asks you for help. How can he restore his system? A. Use system restore to revert to a time prior to the changes made to the mouse B. Implement the Automated system restore C. Roll back the driver D. Unplug the mouse and plug it back in. Then enter the device manager and set the default scheme _____________________ Question 2# - You are the Desktop Support Technician for a remote office in your company. The IT department at the main office sends you a new security template to apply to the users and computers in your office. You want to identify what the changes are so you gauge the impact, if any, on the users. What can you use? A. In the Security Configuration and Analysis snap-in, use the Analyze function B. In the Security Configuration and Analysis snap-in, use the Compare function C. Use the Local Security Policy to compare the settings D. In the Local Security Policy administrative tool, use the Analyze function _____________________ Question 3# - A user is running Windows XP Home Edition on her home computer. She has read about Automated System Recovery (ASR) and wants to implement this feature on her home computer. What do you tell her? A. Automated System Recovery is not available on Windows XP Home Edition B. ASR can be turned on in Windows XP Home Edition by modifying the Control Panel System applet C. Automated System Recovery is automatically running. system restore points are automatically created daily and at key points such as when a key application or driver is installed D. In order to make ASR restore available, she needs to create an ASR backup. _____________________ Question 4# - As the Desktop Support Technician for your company, you complete the upgrade of several computers to Windows XP Professional. One computer was previously running Windows Millennium Edition and the user complains that a vital program is no longer functioning. They need their installation reverted back to ME so that they can run this program. What do you do? A. Use Control Panel, Add/Remove Programs to revert to Windows ME B. Reinstall Windows ME on the system and reinstall the vital application C. Use Automated System Recovery to revert to Windows ME D. Use Roll Back to revert to the Windows ME installation _____________________ Question 5# - You work 4 days a week at the office and on Friday's you work from home. You decide to configure Remote Desktop on your work computer so that if needed, you can access it from home on Fridays. You successfully create VPN with your company network are able to access other resources, however you are unsuccessful in creating a Remote Desktop Connection. Why? A. You need to enable ICS on your home computer B. You need to disable ICF on your home computer C. You need to ask the network administrator to open port 80 in the firewall D. You need to ask the network administrator to open port 3389 in the firewall _____________________ Question 6# - What is the difference between Remote Assistance and Remote Desktop? A. Remote Assistance allows you to connect to your work computer from home, and have access to all of your applications, files, and network resources, as though you were sitting in front of your computer at work. Remote Desktop allows a helper to see your computer screen and communicate to your through a chat box. B. Remote Desktop allows you to have access to a Windows session that is running on your computer, when you are at another computer. Remote Assistance allows a helper, for example, a friend, to use an Internet connection to access your computer to provide assistance C. Remote Assistance allows you to have access to a Windows session that is running on your computer, when you are at another computer. Remote Desktop allows a helper, for example, a friend, to use an Internet connection to access your computer to provide assistance. D. Remote Desktop uses TCP port 3389, but Remote Assistance uses TCP port 443 _____________________ Question 7# - A user purchases a new sound card for his system. After installing it and using the enclosed CD to install the drivers on his Windows XP Professional system, he is prompted to reboot. Prior to reaching the logon screen, his system displays a Stop Error. What should he attempt first? A. Last Known Good B. In-place upgrade (repair C. Restore Point D. Automated system restore. _____________________ Question 8# - You are a desktop support technician for your company. Users have Windows XP Professional installed on their systems. A user calls asking for assistance with configuring a computer application. You realize that you can assist her with the problem using Remote Assistance. How can a Remote Assistance session be started? (Choose all that apply) A. The user sends a Remote Assistance request via ICS B. The user sends a Remote Assistance request via email C. The user sends a Remote Assistance request via Windows Messenger. D. You, as the expert, create the connection _____________________ Question 9# - A user uses his Windows XP Professional mobile computer to work at the office and while on the road. While in the office he connects to the network using the NIC card installed in his system. While on the road, he swaps out the NIC card with a modem. When he does this, he needs to reconfigure the hardware and it always takes him a long time. What can he do to make this an easier process? A. Create a separate hardware profile named Road. In the road profile disable the drivers for the NIC and enable the drivers for the modem B. Create a separate hardware profile named Road. In the road profile delete the drivers for the NIC and enable the drivers for the modem C. Create a separate user profile and use this while on the road D. Create a roaming profile and select this when booting up _____________________ Question 10# - A user wants to increase the speed of data access on his Windows XP Professional system. He's purchased three additional physical disks and has installed them into his computer. What configuration will give him the best read performance with the most amount of usable space? A. Striped volume B. Spanned volume C. Extended volume D. RAID-5 volume _____________________ ANSWERS MCDST Certification Question 1# - Correct Answers: A MCDST Certification Question 2# - Correct Answers: A MCDST Certification Question 3# - Correct Answers: A MCDST Certification Question 4# - Correct Answers: A MCDST Certification Question 5# - Correct Answers: D MCDST Certification Question 6# - Correct Answers: B MCDST Certification Question 7# - Correct Answers: A MCDST Certification Question 8# - Correct Answers: B,C MCDST Certification Question 9# - Correct Answers: A MCDST Certification Question 10# - Correct Answers: A ___________________________________________

Here are instructions for you to convert MJPEG to flash or FLV with Flash Video MX Std, you can also get some general knowledge about MJPEG, flash and FLV from this article. What is MJPEG? M-JPEG stands for Motion JPEG. It is a video format that uses JPEG picture compression in each frame of the video. Frames of the video don't interact with each other in any way (like they do in MPEG-1, MPEG-2, etc.) which results in much bigger file size, but in other hand, it makes the video editing easier because each of the frames has all of the information they need stored in them. What is flash? Flash (previously called Shockwave Flash and Macromedia Flash) is a set of multimedia software created by Macromedia and currently developed and distributed by Adobe Systems. Files in the SWF format, traditionally called "Shockwave Flash" movies, "Flash movies" or "Flash games", usually have a .swf file extension and may be an object of a web page, strictly "played" in a standalone Flash Player, or incorporated into a Projector, a self-executing Flash movie (with the .exe extension in Microsoft Windows). Flash Video (FLV) files have a .flv file extension and are used from within.swf files. What is FLV? Flash Video is the name of a file format used to deliver video over the Internet using Adobe Flash Player (formerly known as Macromedia Flash Player) versions 6?10. Until version 9 update 2 of the Flash Player, Flash Video referred to a proprietary file format, having the extension FLV. The most recent public release of Flash Player supports H.264 video and HE-AAC audio. Flash Video content may also be embedded within SWF files. Notable users of the Flash Video format include YouTube, Google Video, Yahoo! Video, Reuters.com and many other news providers. How to convert MJPEG to flash? 1. Launch Flash Video MX Std You can convert MJPEG to flash with Flash Video MX Std only if you have the program installed. Here is the main interface: 2. Import Input the video in the "import video" box: 3. Settings a) Click "Edit", you can reduce the video duration as well as crop the video size by the "trim" and "crop" functions. Video effect also can be adjusted in the "Effect" tab. b) Add images and text by clicking "Watermark" depends on individual needs. c) "CuePoint" also is a very powerful feature: A "navigation" cue point allows you to seek to a particular frame in the FLV file because it creates a key frame within the FLV file as near as possible to the time that you specify. An "event" cue point enables you to synchronize a point in time within the FLV file with an external event on the web page. Generate a picture as the first frame of the output file by the snapshot function if needed. 4. Add special effect and choose player skins. This is a stage just for you to show personality. a) You can choose the favorite one from various player skins, preloaders and special effects by checking corresponding functions. b) On the Player "Profile" tab, you can set the player profile such as skin auto hide. There are default profiles for you to choose from. What's more, you can create a new player profile, and save it for future use. In the Navigation on click section:

In modern computer networks, computer time synchronization is of critical importance. Many transaction-processing operations require accurate synchronisation of client and server in order to maintain a coherent processing order. The latest versions of the Microsoft Windows operating systems have a time synchronization utility built into the operating system, called ?w32time'. The Microsoft time applet runs as a service and allows a Windows network to provide synchronization of a domain. This article discusses how to configure the latest Windows operating systems to operate as a network time server. The article describes how to change the registry entries to configure w32time. Before changing any of the registry settings, it is generally a good idea to backup the registry. This is so that if any problems arise, the registry can be restored to its previous state. Microsoft Windows 2000 Based Network Time Server Microsoft Windows 2000 has a pre-installed network time synchronization service, which can synchronize to a NTP Time Server. By changing the time service registry settings, the service can also act as a network time client and time server to synchronize other computers in the domain. Firstly check to ensure the 'Windows Time' service, w32time, is present in the systems service list. The application executable is 'w32time.exe'. The parameter list for w32time should be present in the in the registry at: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters The Windows 2000 operating system can operate as a time client and synchronise to a time server by setting the parameter 'NTP Server' to the IP address of a Time Server. By default, the Windows 2000 machine will synchronize to the specified time server every 8 hours, or 3 times a day. In order to maintain more accurate synchronization, the synchronization period can easily be reduced. Set the ?Period' parameter to how many times each day synchronisation is required. Setting the parameter to 48 will activate synchronization with the time server once every half hour, which is about right. The Windows 2000 operating system can also be configured to act as a time server by setting the 'Local NTP' registry flag to the value '1'. After changing the registry settings for w32time, the service must be restarted for the settings to be activated. 'W32time' can be re-started from the service control panel in the Administrative Tools menu. The service can also be controlled via the DOS net command by using: ?net start w32time' and ?net stop w32time' Microsoft Windows 2003 Based Network Time Server Microsoft Windows 2003 expanded on the original Windows 2000 SNTP synchronization service by providing a true NTP implementation. The pre-installed Windows 2003 time service can synchronize to a NTP Server. By modifying registry settings, the time service can act as both a time server and client to synchronize other servers and workstations in the domain. Ensure that the 'Windows Time' service, w32time, is present in the systems service list. The registry parameters for the Windows 2003 w32time should be present in the registry at: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time To configure Windows 2003 to synchronize to an external time server, edit the following entries in the registry: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config\AnnounceFlags Set the ?Announce Flags' registry entry to 5 indicating a reliable time reference. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NTPServer\Enabled Changing the ?Enabled' flag to the value 1 enables the NTP Time Server. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters\Type Set the ?Type' registry entry to ?NTP', which specifies synchronization to a NTP time server. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NTPClient\SpecialPollInterval The ?Special Poll Interval' registry entry defines the period in seconds that the Windows 2003 operating system should poll the time server. A recommended value is 900, which equates to a polling period of every 15 minutes. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters\NtpServer This parameter is used to provide domain names or IP addresses of NTP time servers that the operating system can synchronize to. Each domain name or IP address should be separated by a space. Debugging the Windows Time Synchronisation Service A number of problems may be encountered when configuring the Windows time synchronisation service. Both the SNTP and NTP protocols operate using the UDP protocol. Therefore, the TCP/IP network protocol must be active for SNTP\NTP to operate correctly. Additionally, synchronisation problems may become apparent when SNTP or NTP attempts to synchronise to an inaccurate time reference or if network round-trip delays are excessive. Synchronizing Time on Other Network Devices In addition to synchronizing Microsoft Windows machines, network time servers can also be utilised to synchronise other network devices, such as switches, routers and hubs. Any network device that can synchronise to a NTP or SNTP time server can be pointed to the Windows network time server to synchronise time. In this way the whole network and accompanying devices can be synchronised to an accurate time reference.

5. No Pop-up Windows Make Sure You Pop-up windows happen to be on the rise lately around the website. These are smaller minor windows that pop-up with some details or crucial advertisement on them. They do nothing at all but clutter the individual's display unnecessarily. It's best if all links open inside the exact same window. However exceptions for your utilization of a pop up window may be for conditions like if a webpage contains a website link listing then it may possibly very good to place all these links within a pop up window. Nonetheless being a basic rule steer clear of by using pop up windows they make your everyday living as well as the person's simpler. Furthermore, working systems like Microsoft Windows XP at the moment are equipped with Pop-Up Blocker (this tells you how welcome pop ups are to people). six. Use Plain Vanilla Fonts Maybe you have at any time heard of fonts for instance Neuropolitical? No? Very well it exists and it is a fanciful font that has a futuristic typography to it. You may be surprise to find out that I am truly discouraging you from using these kinds of fanciful fonts. Why? Are you able to picture the frustration for your customers of possessing to learn your whole web page in default times new roman all simply because they tend not to possess the font you applied installed on their devices. Restrict the usage of these kinds of fanciful fonts for your graphical designs only. Stick to your very good old combo of Arial, Verdana and Tahoma. 7. No revolutionary plug-ins For individuals who've by no means heard from the word plug - in , don't be alarmed it can be simply a executable for example a application or animation or audio/online video stream that needs an external software package to become installed or plugged in (therefore the term) into your computer to run. Most internet designers would jump in the chance of by using as a lot of plug-ins a few of which have certainly not even been heard of just before. They feel that this fanciful plug-ins would impress the consumer even so more often then not the reverse occurs. It draws readers aside from your web page. No one likes to wait for an excess minute or two to let software program to download on their computer only to observe some senseless animation or hear to some audio which has no value on the web site's core goal. Maybe you have ever seen internet sites like Yahoo! Google or Lycos? You'll observe they do not have plug-ins in any way. However like all the things else in such a world, you will discover exceptions even when it involves plug-ins. For instance, when you would like to work with animation on your own site you can use Macromedia Flash and you can build a hyperlink from your website to enable customers to download its plug in through Macromedia's internet site so they can view your blog post's Flash content material. 8. In no way underestimate meta tags Meta tags are a group of particular key words that are used to describe some aspects of the articles of the site. It can be widely utilized in HTML based mostly websites. The information that's presented within a meta tag will enable engines like google to index your webpage to ensure that folks working with the look for motor to search to get a distinct info could possibly have the opportunity to find it on your own site additional quickly. In shorter, meta tags when correctly selected will help your webpage obtain a lot more exposure and far better listings on search engines.

Introduction


When visiting the Windows or Microsoft Updates website, you may experience the following error: "The website has encountered a problem and cannot display the page you are trying to view."



This error had me stumped for a little while and was very frustrating. Here are some step you can take to resolve the problem. It may not work in every case, but is worth a try.First Steps



Windows update relies on the Windows Installer Service to install it's updates on your system. Make sure that you have Windows Installer 3.1 installed. To get it use the following link:



http://www.microsoft.com/downloads/details.aspx?FamilyID=889482fc-5f56-4a38-b838-de776fd4138c&displaylang=en



After you have this installed, clear your temporary internet files and try Windows Update again. If it works, then you need not read any further.



If you still cannot access Windows Update, try the following:



Open your Windows Services by clicking on 'Start' then 'Run.



In the 'Run' box, type 'services.msc'



Find the 'Automatic Updates' service and click 'Stop'



Find the 'Background Intelligent Transfer Service' and click 'Stop'



Navigate to C:\Windows\System32 and delete the folder titled 'CatRoot2'



Go back to your services window and restart both of the services that you just stopped a moment ago.



Restart your computer and try Windows Updates again.



This should fix most Windows and Microsoft Updates errors. If not proceed below.Register the Wups2.dll file in Windows



Different scenarios may render the DLL that Windows Update uses unregistered. This can happen when installing a service pack and skipping the reboot. To register the DLL do the following:



1. Stop the Automatic Updates service. To do this, follow these steps:



2. Click Start, click Run, type cmd, and then click OK.



3. At the command prompt, type the following command, and then press ENTER: net stop wuauserv



1. Register the Wups2.dll file. To do this, follow these steps:



2. At the command prompt, type the following command, and then press ENTER: regsvr32 %windir%\system32\wups2.dllNote For a computer that is running Windows XP Professional x64 Edition, type the following command, and then press ENTER: regsvr32 %windir%\syswow64\wups2.dll



3. Click OK on each verification message that you receive.



4.



Start the Automatic Updates service. To do this, type the following command at the command prompt, and then press ENTER:



net start wuauserv



5. Exit the command prompt. To do this type exit, and then press ENTER.Other Considerations



Sometimes, spyware, malware or viruses can affect Windows Updates and cause these error messages. You can check for these types of infections by using MalwareBytes Anti Malware which can be obtained at: http://www.malwarebytes.org.



Use the same instructions that I have for removing the Antivirus 2009 trojan to scan for these infections. Here is the link to that hub: http://hubpages.com/hub/Removing-the-Antivirus-2009-Trojan



Please let me know if this hub was helpful by leaving me a comment.



Thanks for reading!!!


Overview This whitepaper describes how to use InstallAware for deploying applications running on the Microsoft .NET Framework. Although the .NET Framework makes deploying applications easier thanks to features like the Global Assembly Cache, which eliminates shared resource conflicts often encountered by Win32 applications, there are still unique challenges to the deployment of .NET applications. One significant challenge is the download and installation of the .NET Framework, which requires considerable bandwidth and increases the setup package size dramatically. InstallAware addresses this challenge using a combination of unique deployment technologies, including WebAware Installations, superior compression, and MSIcode scripting. InstallAware's unique WebAware Installation technology is used to isolate application runtimes from the main setup program, while still providing a self contained installer that works without mandating an Internet connection. This technology works well with the .NET Framework runtime, greatly simplifying deployment by downloading and installing the runtime only when called by the setup. Another key InstallAware technology is the superior LZMA/BCJ2 compression, which pre-processes data using call jump converters to increase compressibility, and then compresses the optimized data streams using a very large 32 MB data buffer. The LZMA/BCJ2 algorithm is so efficient that it reduces the size of the .NET Framework to literally half its already compressed size. While offering new and unique technologies, InstallAware is completely standards based - every InstallAware setup is a pure Windows Installer (MSI) package that can execute directly, without requiring a third-party scripting runtime to be previously installed. Windows Installer is the only Microsoft approved installation technology and is a requirement of Microsoft logo certification programs. It offers several other advantages such as elevated-privilege installations in high-security contexts and automated corporate deployment using Active Directory Group Policy. These benefits make MSI packages the only accepted software distribution format for large enterprises. Creating a .NET Project To create a simple .NET Project using InstallAware, perform the following steps. 1. Click the InstallAware button on the top left corner of the IDE window, then choose New Project - .NET Setup on the application menu. The New Project window is displayed. 2. The .NET Setup project type is pre-selected. Additionally, the New Project window lists other types of templates, wizards, sample projects, and project converters. 3. Under the Project Name field, accept the default value of My dotNET Setup, or provide your own project name. Projects are normally created under your My Documents folder, and reside inside their own subfolders. If you would like to use a different folder, enter that folder name here, or use the suggested value. Click OK when you're ready to create the project. 4. The IDE has now created a new setup project from the chosen template, and displays the Welcome Page in the MSIcode tab. Various other pages are available allowing you to view the complete source code of our setup project. You can take a look at these source codes later, once the basic setup has been built. To get started, choose the Design tab switch to the Design Views which you'll be using to create your setup. 5. The Application Information designer appears, providing a summary of the various designers that have been categorized under this heading. In the InstallAware IDE, each designer is categorized under a particular heading for easy access. All available headings and designers are listed on the tree view at the left of the IDE, and also in the View group of the on the Design tab. Clicking a heading or a designer switches to that design view. Designers perform a variety of installation tasks ? from basic steps like copying files and creating registry keys, to complex operations like installing application runtimes, hardware drivers, running SQL scripts, and more. As you work with the designers, they seamlessly add to and update the underlying MSIcode sources of your setup. Remember ? the designers provide a rapid way to prototype the basic behavior of your setup, but you are not restricted to what they offer. The full power and richness of the MSIcode scripting language is always just one click away. Take a moment to review the Application Information heading. It provides links to the designers it contains, along with their brief descriptions. The See Also section provides links to related designers under other headings. When you're ready, click the Project Properties link to access the first design view we'll be working with. 6. The Project Properties designer allows you to make high level changes to the installation, such as choosing the default Target Folder, and the default Shortcut Folder. The $PROGRAMFILES$ variable is displayed in the Target Folder field. It represents the location of the Program Files directory on the destination computer. InstallAware denotes variables by enclosing them within dollar signs, in the form $VARIABLE$. Variables are defined and modified in the script that remains accessible from the MSIcode view. In InstallAware 7, the Receive Application Updates check-box lets you serve unlimited application updates to your user base after you ship your product. If you are interested in this functionality, check this box and choose the Web Updates heading for more information. Also remember that help in the InstallAware IDE is never more than one button away. At any time you are confused or need more information, just press F1. Context sensitive help guides you through the current design view, MSIcode command, or whatever else you may be doing at the moment. 7. The remainder of the design views may be accessed by clicking their names on the left of the main IDE window. You may skip the Summary Information designer for this project. The summary information is recorded directly into the MSI database (Windows Installer package) that will be created by InstallAware, and is visible in Windows Explorer when the MSI file is right-clicked. You may wish to update the default values provided by the .NET setup template to ensure that they accurately reflect your company and product information. 8. Now click Add-Remove Programs to switch to this designer which customizes how the application is shown in the Control Panel | Add-Remove Programs applet. You may also customize the icon of the setup package here. Click the Load Icon button to load any icon that represents your application. You are free to use icons of any color and pixel depth that are supported by Windows. Edit the other fields as necessary to reflect your company and website information. 9. Click Application Requirements. The Application Requirements designer helps you enforce any run-time hardware or software requirements that your application may have. Windows 98 has already been selected as the Minimum Operating System, since the .NET Framework is not supported on Windows 95. Internet Explorer 5.01 Service Pack 1 has been selected under Minimum Internet Explorer Version, which is another requirement of the .NET Framework. If your .NET application has other requirements - such as memory, resolution, color depth, or IIS version, set them here. You may also encrypt your entire setup payload with a global password on this screen. Simply provide a password for the Setup Password field, and InstallAware encrypts your application files and data using strong 256-bit AES encryption. In InstallAware 7, the Special Requirements section lets you configure additional options for your setup. You may force your application to install only on real hardware ? disallowing instances on Virtual PC or VMware virtual machines. You may put setup in native 64 bit installation mode, requiring native 64 bit hardware. You may also check Administrator Privileges, if your application requires an administrator account to run successfully. However, InstallAware installations work without administrator privileges, even if they copy files to protected system folders. 10. Click Application Runtimes. The Application Runtimes designer lets you add runtimes required by your product to your setup with the click of a single check-box. The .NET setup template has pre-selected .NET Framework 2.0 for you, together with Windows Installer 3.0 which is required by .NET Framework 2.0. If your .NET application requires the older .NET Framework 1.1, simply uncheck these runtimes, and then check the .NET Framework 1.1 runtime. Doing so will also automatically include the Windows Installer 2.0 runtime, which is required by .NET Framework 1.x. Any time you choose an item on this list, its dependencies will be selected as well, taking the guesswork out of complex runtime installations. Notice the Options button on this screen that is currently disabled. This button will be automatically enabled when you highlight an application runtime with configurable options. For instance, this button lets you configure the instance name to test for (and install, when not found), when the Microsoft SQL Server Express 2005 with Service Pack 2 runtime is checked and highlighted. 11. Click Features. This designer takes us under the Setup Architecture heading. The Features designer lets you define the logical components of your product, as will be seen by end-users when they are installing your product. For the hypothetical application here, two features have been defined: Visual Notepad, corresponding to the main application, and Shell Extension, an optional sub-feature of Visual Notepad. Define the logical components of your .NET application here, along with their descriptions. You may also use the Up/Down arrow buttons to reorder the appearance of your setup features. If your application does not have any configurable features, simply skip this designer. In that case, you may want to remove the pre-defined feature (called My dotNET Setup in our template project), and uncheck the feature selection and setup type dialogs (called componentstree and setuptype) in the Dialogs designer, so they are not shown during the installation wizard sequence. 12. Click Files. Files may be added to a particular feature of your setup, or unconditionally to the entire installation. Check the Filter Files by Feature check-box to activate the feature selection combo-box on this screen. Then choose Feature Independent to unconditionally install files, or select the particular feature you wish to add files into. To add an entire folder to your setup, browse to that folder using the directory browser, and click Add Folder. To add files, first browse into the folder containing the files to add, and then highlight all the files to add, clicking Add Files when ready. In InstallAware 7, you may also drag-drop files directly from Windows Explorer into any folder to install them there. Notice the list of variables that are displayed under the Target Folders list. $TARGETDIR$ is a special variable which indicates the destination directory chosen by the user at install time. You may also choose another pre-defined location, such as $WINSYSDIR$ for the system directory or $WINDIR$ for the Windows directory. You may display more pre-defined folder locations on this list. Right-click the view and choose Add System Folder. Then, choose the special folder to add, such as the My Documents folder of the end-user. This way, you may directly install files to a variety of pre-defined system folders on the target machine. Once you've added some items to the Target Files listing, it's easy to make further changes. Just double-click the item to update, or highlight multiple items, right-click, and choose Edit Files. The Install Files dialog box appears, allowing you to fine tune the settings of the items being installed. This dialog box controls many advanced settings for installing files. You may edit the Source Files field and specify any wildcard pattern for installing files (for any folders you added above, this field contains the mask *.* which means "everything"). You may edit the Exclude Wildcards field and specify a mask of files to ignore when building your setups. You may edit the Target Folder field and change the destination directory of files being installed. For instance, to copy files to a subfolder of the user chosen directory, you would enter $TARGETDIR$\subfolder in this field. You may self-register files at install time by checking the File is Self Registering DLL check-box. If the files you are installing are shared by more than one application, be sure to check the Shared DLL File field in this dialog box. Review the other available options and check the ones as required by your application. When you're done making your changes to your files, click OK to continue. 13. Next focus on the Registry designer to create the registry entries required by your application. Click Registry. The hypothetical application has some registry entries defined under the Shell Extension feature. These were imported from a self registering COM server using the Import button. Use the Import button to import registry data from a .REG file or a self registering COM server (of course, you may also elect to check the File is Self-Registering DLL check-box in the Install Files dialog to register your servers). The remainder of the Registry designer works much the same way as the Files designer. Expand keys under the Source Keys heading, click the Add Key button to add entire keys together with their subkeys, and click the Add Values button to add a selection of values. Customize keys and values by double-clicking the item to update, or highlight multiple items, right-click, and choose Edit Value. Adding registry elements to specific features of your application is again possible using the Filter Keys by Feature check-box. 14. Click Shortcuts. The Shortcuts designer displayed here already contains one entry for uninstalling the example application. Existing entries are removed using the Delete button, and customized using the Edit button. To add a new shortcut, click the New button. The New Shortcut dialog box allows to easily define shortcuts, and can place them in frequently used system locations such as the Quick Launch toolbar and the Desktop, at the click of a single check-box. You don't need to memorize your application paths to populate the Shortcut Target field either ? just click the Browse button to visually locate the file that the shortcut should point to. You may type any value in the Shortcut Target field ? you are not limited to the list of files you are installing with your application (as shown by the Browse button). You may type a path to a pre-existing file on the target system, or even enter a URL. To create a shortcut that launches a URL in the default system browser, simply type in the full URL path inside the Shortcut Target field, instead of a file path. 15. We'll skip the remaining two designers under this heading. Choose the Dialogs designer, under the User Interface heading. The Dialogs designer lists each wizard panel that will be displayed by your installer at run-time. Clicking the Edit button customizes a dialog in the dialog editor (every aspect of each dialog is fully customizable). The check box option next to each dialog name determines if the dialog is to be shown during the installation. The Change Theme button lets you instantly switch to a different set of dialogs - 15 unique themes are available, and you may build your own. Feel free to explore the remaining designers on your own ?our hypothetical application does not need them. We now skip ahead to the Deployment section. 16. Choose Build Settings under the Deployment heading. InstallAware offers three build options, the last of which is especially useful for deploying .NET applications. The Uncompressed Directory Layout option builds your setup files without compressing them, and creates multiple directories in the build folder as part of the process. This option is ideal for CD/DVD distributions. The Compressed Single Self-Installing EXE option packages the application files inside a single downloadable EXE file, so you do not have to worry about distributing multiple folders. The Compressed Web-Based EXE option enables Web Media Blocks, which enable you to optimize your download package by taking out the optional components from the main setup file. Once you've chosen this option, switch over to the Web Media Blocks designer to explore this build option in detail. 17. Click Web Media Blocks. The Web Media Blocks designer lets you define the different parts that your setup file can be split into. This is a unique and critical benefit of InstallAware, and makes Partial Web Deployment (also called WebAware Installation) possible. In the .NET template project, there are two predefined Web Media Blocks, in addition to the main setup file. The Microsoft Windows Installer 3.0 web media block seamlessly downloads and installs the Windows Installer runtime, if it is not found on the target system. Similarly, the Microsoft .NET Framework 2.0 web media block downloads and installs the .NET Framework. Files added to the setup using the Feature Independent are included with the main installer file - allowing the installer to always install those files, even if an Internet connection is unavailable. The remaining Web Media Blocks correspond to the features that you have created for your setup. When setup is running, it will attempt to download Web Media Blocks only if the corresponding runtimes are missing and/or the connected features have been chosen to be installed by the end-user. 18. On the Project tab, in the Build group, click Web Deploy and wait for the build process to complete. Then click Output Folder Folder in the same group. You should observe that the following three files have been created as the result of the build: * My dotNET Setup.exe: This is the main setup executable, which contains the installer and the feature independent files for the setup project. * Microsoft .NET Framework 2.0.7zip: This is the Web Media Block that contains the .NET Framework 2.0. * Microsoft Windows Installer 3.0.7zip: This is the Web Media Block that contains Windows Installer 3.0. Other Web Media Block files may also exist; based on the features you defined for your setup, and whether or not they contained any files. To tell the installer where to find the Web Media Blocks at runtime, double-click a Web Media Block in the Web Media Blocks designer. The Define Web Media Block dialog box appears. Populate the Download URLs list to point the installer to one or more actual download locations at run-time. Web Media Block files do not have any special server requirements. Simply make them available for download as ordinary files at the indicated URLs, and the installer will obtain them on-the-fly. Using more than one URL increases scalability and reliability. If your web server does not serve 7zip files due to security restrictions, you may rename the extensions of the created Web Media Block files to an approved extension, and upload them accordingly. Just make sure the Download URLs list points to the exact locations of the files on the server, including the file extensions ? the initial file name of the Web Media Block as created by the build process is not important. You may also specify FTP sites, network locations, or other file sources (not necessarily Internet locations) among the URLs to be used. Your InstallAware installation will obtain the Web Media Blocks successfully if the target machine can "download" them from one of the specified URLs. Using Internet Explorer (or your favorite browser) on the specified URLs is a great way to test that Web Media Blocks are uploaded correctly and being served. If you would like to save time during builds, you may also check the Skip on Build check-box. This is a very convenient option, especially for application runtimes that do not change in between different builds of your own application. When Skip on Build is checked, InstallAware will not copy any files belonging to that Web Media Block, nor will it compress any data in that Web Media Block, effectively eliminating that part of the setup from the build process, and therefore improving build speed. As long as you have a pre-built copy of that web media block, you may skip it during builds and save time. InstallAware 7 also offers the option to individually encrypt each Web Media Block using 256 bit strong AES encryption. Just populate the Password field to turn on encryption. Individually encrypting each Web Media Block makes it harder for your setups to be compromised with the loss of a single global password, as each Web Media Block can potentially be using a unique password. Coupled with the superior compression provided by the InstallAware engine, Compressed Web-Based EXE builds provide the industry's leading solution for online software distribution. With the new individual encryption options and URL lists in InstallAware 7, online software distribution becomes even more reliable, scalable, and secure. You may notice that when you perform a CD or Single File build, Web Media Blocks are not created, even though they have been defined; this makes it easier to build for multiple media types when generating your setups. In fact, you can click Batch Build in the Compile group on the MSIcode tab to build for multiple media types in one pass. Just select each desired build type. 19. Finally take a peek at the setup script, which has been automatically generated and maintained for you so far by the visual designers. Choose the MSICode tab, and then choose the My dotNET Setup page next to the Welcome Page. On the top left combo box, choose Apply Changes. On the top right combo box, choose Install Product. This takes you right to the place in your script where most of the install actions take place. Look around the script. This script is a genuine programming language, called MSIcode. MSIcode provides complete branching code execution for Windows Installer, another unique benefit of InstallAware, also called Genuine Scripting for Windows Installer. Not only does this feature make developing setups easier - it also eliminates the design overhead by providing a simpler development model than is ordinarily possible with Windows Installer. You simply author your human readable MSIcode script, using either the Design Views or the MSIcode view, and InstallAware produces a logo compliant MSI for you automatically at build-time. MSIcode is the easiest way to describe the content and logic of an MSI database, significantly simplifying the setup development process, and reducing development, maintenance, and support costs for your setups. Also notice the Install Files, Create Shortcut, and Write Registry commands in the script. You will recall them from the edits we made in the Files, Registry and Shortcuts designers. The InstallAware IDE features two-way integrated code editing, so that when you make changes in any of the Design Views, the changes are always reflected in the MSIcode view, and vice versa. This allows you to rapidly prototype your setup in the Design Views, and then switch to the MSIcode view to fine-tune your installation. When you build your setup, the resulting installer will always be a logo certifiable MSI installer database - InstallAware takes care of the necessary MSI table insertions and MSI sequences for you. Absolutely no custom action authoring is required with InstallAware! There are many more MSIcode commands to try ? just scroll the list on the right of the script editor. Each command executes a specific installation task, saving you countless hours of custom development effort. You may drag-and-drop commands from there into the setup script, or select a line in the script editor and simply type the first few letters of a command ? this activates smart code completion. The script editor features all modern conveniences such as copy/paste, find/replace, and more. You may even use code folding and define your custom code folding regions to organize your setup script. 20. This concludes the creation of your .NET application installation. Make ample use of the available Design Views and MSIcode to refine your setup, and ship when ready! Deployment Scenarios Independent Software Vendors (ISVs) Isolate Application Runtimes Most ISVs distribute their setups on the Internet. This means downloads have to be as small as possible - smaller files mean more downloads and less bandwidth consumption. Especially for .NET applications, the standard 23 megabyte size of the .NET Framework can be a huge problem. InstallAware works around this problem by both stripping runtimes from the main product download, and also by using superior compression to reduce the .NET Framework size to only 12 megabytes. Secure Installers with Authenticode Code Signing Especially with the release of Windows XP Service Pack 2, and the upcoming Windows Vista, users are cautioned strongly against installing packages that aren't digitally signed. InstallAware supports Authenticode code signing technologies to verify the integrity of downloaded content. Protect Application Features ISVs can use Web Media Blocks to strip crucial application components from their public downloads. Using scripting, the installer can query user and system information to verify that the end-user is eligible to install protected features. Only if the user is authenticated (by, for example, querying a web page with user credentials), will the installer proceed to download the protected Web Media Blocks. Deploy Unlimited Web Updates In InstallAware 7 is the ability to deliver unlimited updates to your users over the web. The update experience closely resembles that of Windows Update ? displaying standard message balloons in the system tray (even on old Windows versions that do not support tray balloons), and customizable dialogs that configure the update schedule, list available updates, and install them. Improve the End-User Experience InstallAware present a single, unified user interface during the entire setup process. Separate install wizards or progress windows are never shown when launching custom third party installers and/or configuring application runtimes. InstallAware even natively captures and displays the progress of lengthy runtime installs like .NET Framework 2.0 in your InstallAware setup wizard, improving the user experience. Leverage One-Click Incremental Patching InstallAware provides a one-click patching mechanism that works by building a patch against older versions of the installer. This is done by simply showing the setup project where the older installer files of the product are found. When a patch is built, it contains only the minimum incremental data required to bring a product up-to-date with the latest installation files. Incremental patching saves developers and end-users time and effort in updating their current installers. Build Logo Certifiable Installers Microsoft's Designed for Windows logo program provides ISVs with a way to certify the stability, reliability, and quality of their solutions. Most enterprises today will not even consider software titles that do not have a logo certified MSI installer, for reasons of automating and securing their corporate deployment. For any product to pass testing for the Designed for Windows logo programs, an MSI installer for that product, with the following features, is required: * No ICE (MSI database internal consistency evaluator) errors must be found * MSI databases should support advertising InstallAware setups are automatically logo compliant. No matter how complex or simple the setup script, the output MSI files always pass ICE tests, and support advertised installations. Rapidly Customize Installers for Product Editions ISVs typically produce several editions of their products, tailored for different market and user segments. Because these products rely on the same core, their installers are often very similar. Typically the highest edition features the most complex install, with files and logic being stripped away progressively as the product editions are traversed. Instead of building and maintaining multiple installs for each edition, InstallAware lets developers define compiler variables, which work much like IFDEF statements found in programming languages. Based on the values of these compiler variables, parts of the setup script can be excluded from the build process, thereby emitting customized installers with absolutely no manual effort. Communicate with End-Users InstallAware makes it very easy to build custom dialogs that capture any kind of information from the end-user at install time. Simply use the dialog editor and customize an existing dialog, or build your own from scratch. Use edit boxes, drop-down combo boxes, radio buttons and check-boxes to interact with end-users and survey them as an integral part of your installation ? not on a web form where they can walk away from your download. Seamlessly submit captured information to a web server. Ask end-users where they found about your product, why they are uninstalling, and more! Enterprise Information Technology Scenarios Allow Partners to Customize Their Own Installers InstallAware features a COM automation library, along with an ASP scripting object that enables access to that library from ASP web pages. Using COM automation, enterprises could programmatically emit complete setup projects and scripts, and then build them on-the-fly in response to partner requests. For instance, consider an enterprise product that is made available to a large number of resellers, each with its own language and branding requirements. A web site could be built where resellers could upload their custom text and branding images. Then, when the Build Installer button is clicked, InstallAware automation could be invoked to dynamically build a customized installer, which would make the custom setup available for download as soon as the build process finished. This would reduce the burden on an enterprise when supporting its resellers. Lock Down Installers to Only Run Inside a Network InstallAware's Web Media Blocks are able to download files not only from the Internet, but also UNC paths. Where sensitive application and data are involved, an installer could be built that placed all its contents inside Web Media Blocks, and those Web Media Blocks placed on locations accessible only inside the corporate network. Even if these installers were to be "stolen", they would not actually work, since they would attempt to download Web Media Blocks from a location that would not exist on an outside site. Use Silent Installs for Automated Software Distribution Installing and maintaining applications deployed onto thousands of computers on a corporate network can rapidly escalate into a maintenance nightmare. Because InstallAware installations are Windows Installer based, they conform and interoperate well with large scale corporate deployment scenarios. Applications can be silently installed, removed, and monitored - all without user intervention or knowledge. Log files can be created from installations to provide additional debugging data in case deployment problems arise. Group Policy Deployment InstallAware setups are fully compatible with Active Directory deployment using Group Policy, as well as other automated deployment technologies. Push installers onto thousands of desktops with a single click. Shell to and Repackage Installs Typically, when deploying older software, corporate administrators are required to convert old and nonstandard package formats into the MSI package format. Even when working with MSI based installers, packages may need to be installed with a precisely defined set of configuration settings, to ensure proper operation. InstallAware addresses both these needs. InstallAware's Shell to MSI technology enables the execution of any MSI package, with a specified set of configuration settings, as an integral part of a larger software installation process. In fact the Shell to MSI process is so efficient that it even captures the progress of the spawned installation. With non-MSI packages, the PackageAware tool that ships with InstallAware provides a migration path: PackageAware takes before and after snapshots of the state of the system as a legacy package is installed. It then encapsulates the delta of the system snapshots in a ready-to-build, customizable InstallAware setup project. Both these technologies enable seamless and painless installations of large numbers of interdependent packages across the entire corporate network. Allow Non-Administrative Installs Since InstallAware setups are Windows Installer based, they automatically leverage the ability of Windows Installer to perform low level changes to the system even when administrator rights are not present. As long as the Always Install Elevated group policy has been defined by the corporate administrator for user accounts, all InstallAware installations will successfully install inside locked-down user environments, making it unnecessary for a system administrator to manually log on and install the desired product on the system. Use Advertising for Install-On-Demand and Self-Healing Advertising is a Windows Installer term for two similar concepts: 1. An installation that runs in advertised mode creates shortcuts, registers file types, and creates registry entries required by the product - overall creating the impression that the application has been installed. However, it does not actually copy any files, until the application has been invoked for the first time, from either the Start Menu, or by double-clicking its associated file in Explorer. 2. Advertised shortcuts and file types both enable the above behavior, and also repair a damaged application by copying missing files whenever they are invoked. They do this by checking that all required files are present when they are being invoked. InstallAware setups fully support both of these advertising technologies. Plus, InstallAware adds the capability of storing each feature of an advertised installation as a Web Media Block to seamlessly download it on-demand from any desired URL.

Introduction to Positioning Label Text Properly


Once I figured out how to print labels on Word on Windows 2007 I realized that positioning the text on the label had a little different feel to it than on previous editions of Microsoft Windows.



Once I figured it out, I thought I'd try an article on the subject. Here's a step-by-step method to position or align text on Microsoft Windows Word 2007.



If you have an older version of Word, see my link at the bottom for different instructions.Step 1 - Highlight The Text



Find the text you have typed into the label and highlight it. This is the text that you want to align within the labelStep 2



Right click on the the highlighted text and choose CELL ALIGNMENT.Step 3 - Selecting The Right Position for Text



A box will appear to the right of cell alignment, with buttons that allow you to change the position of your text.



Microsoft Word is great for label text alignment. You can position the text in just about any postion you want. Center right, center left, upper left, upper right, center bottom, etc etc.



See the image below? See the nine little squares next to 'cell alignment' that I have circled? Select the position or alignment you wish your label text to appear by clicking the square that corresponds to the postion you want you text. For example, if you want your text to appear in the lower right corner of the label, click the lower right block. If you want the label name to appear dead center, click the block that is right in the center.Step 4



If your text size is too small, look to the upper part of your computer screen and you'll see the box with the various font sizes. It is the one with a number in it, located next to the font styles. If you are not seeing it, make sure you are in the "Home" tab. Highlight your text and change the font size.Step 5



Of course, any other changes you may need such as bold, underline, etc etc can be done in the same fashion. All of these commands are located near the font style, font size commands.



I hope this article helps.



If you want to learn how to print labels from Windows Word 2007, please click the link below.


Dell studio XPS delivers 15.6-inch full HD 1080p widescreen make an exhibition of. With 15.6inch LED back-lit full HD make an exhibition of and graphics remembrance (ATI Mobility Radeon M96XT Graphics) 0f 1024 MB pictures go alive. Watching movies and before a live audience games on laptop with HD make an exhibition of is really a marvel go genuine. The HDMI A/V output provides you to hook up the Studio 1555 to a compatible HDTV to brand an exhibition of your creations to a arrogant audience. Provided with 2.0 Mega Pixel camera on front margin, with facial recognition software lacking doubt secures your central processing unit to the same extent soon to the same extent you're away. Sports Intel Core 2 Duo laptop of 2.13 GHz with Centrino 2 knowledge, 3 MB L2 reserve and 1066 MHz front face automobile. Featuring pre-installed 4GB RAM remembrance speeds up multi tasks. Performance of Dell Studio XPS is quite powerful with 4GB RAM bidding in no way give permission you down. You dont even apprehension in relation to muti tasking queasiness anymore. Dell has pre-installed Microsoft Windows 7 at home Premium operating method. Windows 7 is the easiest, fastest, and virtually each person engaging version of Windows yet. It is assumed with the intention of Windows 7 is designed in lieu of nearer and extra dependable performance and sinking battery consumption. If you desire in lieu of nearer and extra dependable operating method so therefore Microsoft Windows 7 Ultimate is the solution. Windows 7 delivers powerful performance and as well saving power. The keyboard glows with light thumbs down difficulty day of the week otherwise night, precisely like Apple Macbook Pro and Apple Macbook Air. Dell has provided multimedia buttons which is widely held around these days, glows as soon as activated. Track pad is smooth and soft which is quite impressive to the same extent it is at ease to wastage. You don't retain to apprehension in relation to battery power indicator, precisely keep an eye by simply read-through the color of the indicator. Squirrel away vast amount of data, photos, movies and extra with 320 GB firm drive. Plus don't apprehension in relation to separate speakers which looks awful in lieu of laptops, Dell Studio XPS provides built-in stereo speakers with integrated subwoofer with the intention of earnings thumbs down separate cables otherwise wires no matter which, precisely emancipated hands. Open out your capabilities with fast internet with all the newest knowledge Draft-N Wi-Fi damage, which is five time nearer performance and twice the range of existing wireless knowledge. With Dell Remote Access you can simply access photos, composition, movies and extra lacking a doubt on your at home method using an additional mainframe connected to internet. You don't even smell the sound of virus to the same extent it skin texture pre-loaded McAfee Security fix in lieu of anti-virus protection with 30 days of updates. Pro-loaded software as well includes Microsoft mechanism. It has 3 USB 2.0 ports in lieu of involving a open range of peripherals from digital cameras to composition players. As well has microphone and earphone jack in lieu of listening to composition, chatting online, making calls and extra. With 6 cell battery, backs up in lieu of 3 satiated hours. Contains 1 HDMI docks to bond to other HD make an exhibition of diplomacy. Comes with a 8-in-1 memory card reader which is pretty worthwhile to slot in you're digital camera's remembrance license, mobile's remembrance license. And by the side of keep on but not smallest amount RJ-45 docks in lieu of Ethernet docks in lieu of involving internet through LAN. Dell Studio XPS weighs merely 6.4 pounds which is at ease to cart around anywhere you walk off, really 6.4 pounds is not with the intention of gray except you're 10-year-old child. The package contains: Dell Studio XPS 1640 notebook PC Rechargeable lithium-ion battery AC adapter and Operating directions

.NET is a consistent software development framework that enables the creation of various Windows desktop and Web applications. .NET technology is comprised of several technologies (ASP, XML, OOP, SOAP, WDSL, UDDI) and programming languages (VB, C++, C#, J#) while it also ensures the compiled code?s portability between different computers running under Windows systems. Also, the code can be reused regardless of programming language in use. .NET Framework is a component shipped with Windows. Actually, .NET 2.0 comes with Windows Server 2003 and can be installed on previous versions, including Windows 98; .NET 3.0 is installed on Windows Vista and can be also installed on Windows XP versions with SP2 and Windows Server 2003 with SP1. In order to develop applications using the .NET platform it is recommended to have three essential components: - a set of programming languages (C#, Visual Basic .NET, J#, Managed C++, Smalltalk, Perl, Fortran, Cobol, Lisp, Pascal etc.) - a set of development environments (Visual Studio .NET, Visio) - a library of classes for creating Web services, Web applications and Windows desktop applications. While developing .Net applications you can use: - Specialized servers ? a set of Enterprise .NET servers (SQL Server 2000 family, Exchange 2000 etc.) which provide database storage functions, email, B2B applications (Business to Business ? e-commerce between business partners). - Web services ? useful in applications that require user identification (eg. .NET Passport ? an authentication that uses a single name and password for all visited websites) - Included services for non-PC devices (Pocket PC Phone Edition, Smartphone, Tablet PC, Smart Display, Xbox, set-top boxes etc.) The .NET Framework is an important part of the .NET technology, being the ultimate interface between .NET application and the operating systems, and currently containing: - C#, VB.NET, C++ and J# languages. In order to be properly integrated within the .NET platform, these OOP languages meet a set of specifications called Common Type System (CTS). Their basic elements are comprised of: classes, interfaces, delegation, value and reference types, and as mechanisms they use: inheritance, polymorphism and exception handling. - The common platform for program execution is called Common Language Runtime (CLR) and it?s used by all 4 languages. CTS is part of CLR. - The set of libraries needed in order to create desktop or Web applications, called Framework Class Library (FCL). .NET Framework component consists of compilers, libraries and other executable files useful in running .NET applications. All appropriate files are generally located in directory C:WindowsMicrosoft.NETFrameworkV2.0 ? (depending on the installed version). So if you?re asking why should you choose to use .NET, here come some arguments. Firstly, it provides us a set of tools that you can use within other programs, provides easy access to databases, allows the creation of drawings and other graphics elements. System.Windows.Forms namespace contains tools that enable the implementation of graphical user interface elements. Using these controls, you can quickly design and develop various interactive graphical user interface elements. .NET also provides classes that perform most of the common tasks that programmers face on a daily basis, thereby reducing application development time.

Ever wanted a phone which can work and write on just a slight touch of yours? Ever wanted a handy phone which has all the latest features. Then the answer is the magnificent SAMSUNG 18000 OMNIA II. Some of the amazing features of the mobile phone are: Samsung I8000 Omnia 2 is an extremely gorgeous 3G phone having a touch screen feature that comes in glamorous looking casing of black color.The magnificent screen of the mobile phone has a resolution that offers high quality of screen display that is 480/ 800 pixels and this amazing screen can support handwriting recognition function on touch screen. The wonderful mobile phone works on Microsoft Windows of Mobile operating systems version 6.1 and the mobile phone has 3 memory sizes that are 2GB, 16GB and 8 GB version. It can also support an external memory card that can be inserted into the card slot that allows the owner to add thirty two GB of MicroSD memory.The SAMSUNG 18000 OMNIA II supports a 3G HSDPA technology that provides the owner with a very high speed of internet connectivity and the owner can enjoy the use of multiple features on the handset. The wonderful mobile phone also supports Wi-Fi or WLAN technology that allows the owner to gain Internet connection through a connection between their phone and local WLAN as well as by connection with nearby hotspot so that a wire free internet connection can be established.There is also present an in- built GPS system that enables the user an information on the nearby places of concern and the user is able to find out the nearest cafes and restaurant very quickly as well as very easily on their mobile phone. The gorgeous mobile phone has integrated 5MP camera feature that can support main picture as well as video focused functions. Its in- built camera as well as the video feature includes a detection feature of picture smile, an automatic focus of camera, picture blogging, video settings, in-built flash of dual LED and video recorder.The video footage can be viewed in the entire popular video format that includes DivX format, H264 format, XviD, WMV, MPEG4 and H263.

Microsoft Windows 7 - Review


Windows 7 looks set to be the next desktop operating system, with many organizations refreshing their PC estate as they migrate up. Microsoft Windows 7 is a version of Microsoft Windows, a series of operating systems produced by Microsoft for use on PC’s, including home and business desktops, laptops, and a whole range of devices.



Windows 7 was officially released on July 22, 2009;



It was available in retail on October 22, 09.



Windows 8 will take over from Windows 7, which does not have a release date yet. Windows 7 is a more focused, incremental upgrade to the Windows OS line, and new features include:



Multi-touch support



Redesigned Windows Shell



New Superbar taskbar



A home networking system called Home Group



Improved performance



There are a number of standard applications that have been included with prior releases of Microsoft Windows, including Windows-Calendar, Windows-Mail, Windows Movie-Maker, and Windows Photo-Gallery, are not included in Windows 7 most are instead offered separately at no charge as part of the Windows-Live Essentials suite.



Below I have included a video on Windows 7 Installation guide, for those of you who need help/assistance in installing the Operating System.



6 reasons why Windows 7 is the next best thing:



Faster speed, better performance - Windows 7 is designed to make PCs start up, shut down, resume from standby, and respond faster, new features have also been added to simplfy things.



Streaming files and media in your home - Music, videos or photos can be easily streamed using Windows 7, on your PC to your home audio system and similar network devices. With the new media streaming features introduced make your PC an excellent hub for video, audio, recorded TV, photos and more throughout your home.



Jump Lists - Windows 7 new feature Jump Lists are a handy way to quickly reach the files you've been working with previously; just right click on the icon on your taskbar, e.g. By right-clicking on the Microsoft PowerPoint icon, it will show your most recent PowerPoint documents. You can also pin any files to the Jump List so they always appear for easy access.



HomeGroup Network - When you first install Windows 7 to any pc in your home, a new network is automatically added to your home network, namely “HomeGroup”. This allows users to access, share files, as well as sharing a printer. Various files including digital photos can be stored and shared, and accessed from any PC/Laptop in the house.



Improvements to taskbar and wider range of options - Navigating through programs has become less time consuming, as this version of Windows allows you to pin any program you maybe viewing/using to the taskbar, so it’s always a click away. Icons can be rearranged on the taskbar very easily by clicking and dragging programs. You can access files and windows by simply hovering over the icon, which will show you thumbnail of all programs opened, to get a full screen preview of any window, hover over the thumbnail.



Reduce interruptions - A new Action Centre icon which can be found on the tray icon for easy access, which alerts you to any immediate problems which need to be address, you can access the information at any time regarding any problems to your computer, which get’s stored automatically.



Video guide on Installation for Mac.


Microsoft Corporation developed 7 Version of windows for Personnel computers except Network Operating system. I think 7 means 7th windows version for Personal computers except Network Operating System. (Windows for work groups Windows 2000 Professional , Windows Sever versions, Windows 2003, Windows 2008)


This is the version of windows developed by Microsoft for Personnel Computes1. Microsoft windows 3.x



2. Microsoft windows 95



3. Microsoft windows 98



4. Microsoft windows Me



5. Microsoft windows XP



6. Microsoft windows Vita



7. Microsoft Windows 7Windows 7 is True Operating System running on personal computer with advance features than previous version for more info Visit Windows 7 home Page.



www.microsoft.com/windows/windows-7/ -



An operating system (OS) is an interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of the computer that acts as a host for computing applications run on the machine.


3. Powerful Security that Is Versatile and Simple to Use VeriSign Code Signing validates both the strength of software and the identity of the creator. Using public key infrastructure (PKI) and digital signature technology, VeriSign Code Signing verifies the identity of the publisher and confirms that your code has not been tampered with or corrupted. Also support time stamping which allows users to verify that the certificate was valid at the time of signature. Time stamping provides time relevance and ensures the signature does not expire. 4. Up to $125,000 Extended Warranty The Netsure Protection Plan provides limited warranty protection up to $125,000 against unauthorized use, disclosure, compromise, unauthorized revocation, loss of use, and erroneous issuance. 5. VeriSign Code Signing Certificates support the broadest range of platforms in the industry, including: Microsoft WindowsMicrosoft Windows Phone and Windows MobileMicrosoft Office and Visual Basic for Application (VBA)Microsoft AzureJavaAdobe AIR and Adobe ShockwaveQualcomm BREW Bottom line, by assisting you distribute software more effectively, VeriSign Code Signing Certificates can help you increase downloads and maximize revenue.

Windows 7 List of God Modes


Windows 7 comes with a lot of secret shortcuts for developers. Note, these shortcuts are not intended for normal users or for other operating systems other than Windows 7. There have been reports of instant and endless BSOD on Vista 64.



Try these at your your own risk. I take no responsibility to what happens when you try these on your computer ;)



Step 1: Right click.



Step 2: Click create folder.



Step 3: Name or Rename the new folder to "GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}".



Step 4: the folder's appearance changes to look like the control panel.



Step 5: Open the folder and to reveal the list of godly shortcuts.



As of Windows Vista, each Control Panel item is given a canonical name for use in programmatically launching that item. This topic lists each Control Panel item, its canonical name, and its GUID.



Windows 7 Control Panel Canonical Names



The following canonical names are defined for Control Panel items in Windows 7. All names are also valid on Windows Vista unless specified otherwise. Not all Control Panel items are available on all varieties of Windows and some Control Panel items might appear only when appropriate hardware is detected. These canonical names do not change for different languages. They are always in English, even if the system's language is non-English.



you can make more GodeMode Folders using the "Control Panel Item.{GUID}" or any "name.{GUID}"


Microsoft Windows 7 is the latest public release version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 7 is the newest and most beautiful Microsoft OS. But Windows XP and Windows Vista are enough for us. Is it really necessary to update our OS to Windows 7? There are dozens of reasons, big and small, to get Windows 7. I designed it to simplify your everyday tasks, work the way you want, and make new things possible. To see what I mean, you can start with the top 10 reasons. 1. Get quicker access to all of your stuff: use Pin and Jump Lists to keep the programs and files you use the most right at your fingertips. 2. Manage open windows more easily: resize and arrange windows simply by dragging their borders to the edge of your screen. 3. Quickly find what you're looking for: use Windows Search to find a specific file, program, or e-mail in a few seconds. 4. Share files and printers among multiple PCs: from one Windows 7-based PC to another, you can share files, music, photos, and even printers across your home network. 5. Stay entertained effortlessly: with Windows Media Center you get one place to enjoy your photos and music, watch and record live TV, and watch free Internet TV. 6. Easily create and share movies: create great looking movies and slideshows and share them on YouTube in minutes. 7. Connect to networks easily: view and connect to any available wireless network in as few as three clicks. 8. Do more and wait less: improvements that can accelerate sleep and resume and make your PC more responsive help you get more done. 9. Don't leave programs behind: run many Windows XP productivity programs in Windows XP Mode. 10. Offers your PC better protection: help keep your PC, your information, and your family safe. Compare with Windows XP and Windows Vista, Windows 7 is more powerful. Built upon the security foundations of Windows Vista, Windows 7 introduces the right security enhancements to give users the confidence that Microsoft is helping keep them protected. Businesses will benefit from enhancements that help protect company sensitive information, that provide stronger protections against malware and that help secure anywhere access to corporate resources and data. In this session we will discuss the core security features of Windows 7 and explore their usage scenarios. But such as Administrator password,Windows 7 still using the same encrypt arithmetic as the previous versions of windows. That means that if you need to reset Windows 7 password, you can just use the similar methods like Windows Vista or Windows XP or use some Windows 7 password recovery tool which is used for Windows 7 password reset.

Imagine the next time you join a discussion about using RSS. When you start sharing the fascinating RSS facts below, your friends will be absolutely amazed. Sometimes the most important aspects of a subject are not immediately obvious. Keep reading to get the complete picture. RSS is widely becoming a very powerful marketing tool on the Internet. It has been picked up by Internet marketers around the world every day who knows about its usefulness. Nevertheless, there are still a majority of people on the Internet who haven?t used RSS to syndicate their content. This new technology can change the way you keep in touch with your subscribers or readers permanently in a lot of ways. For people who still don?t know what the RSS is, here?s a definition - RSS is an acronym for "Really Simple Syndication" or "Rich Site Summary", and the XML extension is the format used for distributing your NEWS Headlines via the Web, which is known as Syndication. Syndication is what makes RSS so powerful - you can unleash your message across the web instantly to your subscribers and readers through RSS. So what are the 8 most powerful reasons you should be using RSS? Read below: 1. Readers can opt-into feeds. Like autoresponders, RSS allows your prospects to opt-into the feeds they are interested in and also be able to opt-out when they want to through their RSS feeds reader. It is almost similar to building a list of subscribers! 2. You don?t have to maintain an RSS feed. This is a ?burden-take-off? for savvy and busy Internet marketers as RSS is free to use and it doesn?t require that much effort as building a list. Of course, everything has its pros and cons. When you don?t need to spend time for your opt-ins, you won?t have a closer relationship with them and it makes promoting your product much harder. 3. You have the ability to Syndicate your content. This is the true power of RSS. It gives you the ability to Syndicate your content ? and e-mail your subscribers instantly letting your them know about your content right away. 4. Promotions and sales. Again, similar to an autoresponder RSS lets you broadcast your promotions to your subscribers. This way, you can earn money through your RSS feeds as well. 5. No filter problems. Every RSS feed passes through e-mail filters. You won?t have to worry about your message being filtered anymore while syndicating an article. All your messages are delivered 100% to your subscribers. 6. No spam complaints. People who want to subscribe for your RSS feeds will need to do it with their RSS reader. They will need to abide by the Privacy Policy that you are allowed to send them your syndication anytime without being called spamming. Another great feature! 7. Many ways to read feeds. RSS is very versatile because it lets you read feeds in many different media platforms. Some of the examples are browser readers while others use software to read their feeds. Other than that, people can view feeds on different operating systems like Microsoft Windows or Mac. 8. Free traffic and promotion. RSS is one of the greatest ways to get free traffic to your website without needing to spend a single penny on advertising. This alone can save you hundreds of thousands of dollars in advertising a year to advertise your online business. If you don?t have time to set-up your own webpage with RSS feeds it is recommended that you set-up an account with Blogger.com and head over to FeedBurner.com to set-up an account. FeedBurner.com will generate you a RSS subscription page automatically with any RSS feed URL you favor and inserted. As your knowledge about using RSS continues to grow, you will begin to see how RSS fits into your overall marketing efforts.

Fast execution of tasks is what all computer users prefer. Microsoft has, over the years, kept up to the demands of consumers, satisfying their varied requirements beyond expectations. Whether it is upgraded versions or newer versions, all operating systems, application software, etc. by Microsoft are worth appreciable. Many a home, student, and business tasks have been simplified to the greatest level. Microsoft Windows 7 is the latest operating system after the Vista, facilitating fast consummation of computer tasks. Released on October 22, 2009, Windows 7, in a short span of time, became very popular across the world. Buy Windows 7 online to get some discounts. This version of Microsoft Windows is available in a number of editions. One is the Windows 7 Home Basic. With online shopping facility accessible for almost all products available on earth, you can buy Windows 7 from the comfort of your space too. The Windows 7 Home Basic is not available everywhere, especially first world countries including Western and Central Europe, North America, Australia and Saudi Arabia. You will find it in emerging markets such as Mexico, the Philippines, Russia, Thailand, Brazil, the People's Republic of China, Colombia, India, Pakistan, and Turkey. So, even if you want to buy Windows 7 Home Basic at an online store where Microsoft products are available, you may not get it. Only a few online platforms facilitate users to buy Windows 7 Home Basic. So, search and get your product now; there are some good discounts offered which you will certainly not avail at an offline computer store. Several new features have been added in this version expect a few Aero options - the glasslike user interface that was introduced with the previous version of Microsoft Windows, i.e. the Windows Vista. Full Aero support is available in the Home Premium. Windows 7 Home Basic is subjected to geographical activation restriction; the user in such a situation will have to activate Windows within a certain region. Though there are a number of features found in the Windows 7 Home Basic there are limitations in terms of functionality as well. You won?t find the Windows Media Center pre-installed in it. There are several advantages of the media center such as centralizing the media needs of the user, TV functionalities, DVR convenience for recording TV shows via a hardware TV tuner, watching movies or videos, browsing through photo albums, etc. All these can be accessible in the Windows 7 Home Basic through individual applications. With the Windows 7 Home Basic, you get Windows Internet Explorer 8, Desktop Window Manager, Home Group Join, unlimited concurrent applications, Windows Mobility Center, and Windows Media Player 12, besides 32-bit and 64-bit mode support and partial Aero facilities as aforementioned. All these features are enough to let you get your desired computing tasks fulfilled. As aforementioned, if you want good discounts, buy Windows 7 Home Basic online from a reliable online store, that has maintained a rapport for selling Microsoft products.

While using MS Word 2007, you may need to deal with corruption issues. For example, you just started the computer for working on an existing Word file on which you have been working for last few days. When you have selected to open the file, you get an error message indicating corruption in the Word file. Occurrence of the error message means you have to repair Word document. Here in this article, we let you know about Recover Text Converter ? a tool from Microsoft that helps recovering text from the corrupt Word document. Whereas the Recover Text Converter helps recovering the text from the corrupt document, it does not retain formatting, structure, and properties of the document. However, you will get the text that you can rearrange as per your requirement. Doing this will save you from complete data loss; however, you have to spend some time rearranging, restructuring, and reformatting the recovered text. Let us execute the following steps to use the Recover Text Converter tool to repair Word document: 1.If you have any of the MS Office application or document open, then close it. 2.Insert Microsoft Installation Disc in the CD ROM. 3.Select Add or Remove Features option in the Maintenance Mode Options screen. 4.Click the Next button. The Custom Setup screen appears. 5.Select Choose advanced customization of applications option and click the Next button. The Advanced Customization screen opens up. 6.Expand the Office Shared Features node. 7.Expand the Converters and Filters node. 8.Expand the Text Converters node. 9.Select the Recover Text Converter option and then select the Run from My Computer option. Once the above given steps are executed successfully, you are setup with the Recover Text Converter option. Execute it to recover text from the corrupt Word document. As mentioned, the software will only recover the textual information; you shall not use it to recover all data from the corrupt Word document. If the document that you want to repair has lots of images, tables, OLE objects, hyperlinks, comments, etc. then you shall not use the above-specified process because images, OLE objects, hyperlinks, and comments will not be recovered. The software will only recover the text that you have to rearrange once again, which will only be a wastage of time. In that situation, you need an exclusive Word Repair tool like Kernel for Word that has been especially designed to repair Word documents damaged due to various known and unknown reasons. The reasons that may lead into performing Word repair include ? loss of network connection while sharing the document over network, CRC error while moving documents to another storage media, virus attack, abrupt system shut down while using the document, etc. Kernel for Word Repair software has been designed to repair Word documents in almost all formats, such as .doc, .docx, .dot, .dotx, .docm, and .dotm. This means the software supports all versions of MS Word, such as 2010, 2007, 2003, 2002, 2000, and 97. One can install the software on Windows 7, Vista, XP, 2003, and 2000 operating systems for repairing the corrupt documents.

Windows 7 becomes very popular for all the users around the world. Windows 7 is best in terms of speed, features, usability and graphics. After installing Windows 7 you get several themes, desktop gadgets and wallpapers. But after sudden time you are not satisfied to all of them. So, you have to find new themes, Desktop gadgets and wallpapers for Windows 7. This page tells you the ways to get lots of free themes, Desktop gadgets and wallpapers form Microsoft official website.How to download free themes, Desktop gadgets and wallpapers for Windows 7


You can download free Windows 7 themes, Desktop gadgets and wallpapers for your Windows 7 desktop computer or laptop several ways. Remember, Microsoft official website offers several fee themes, Desktop gadgets and wallpapers for Windows 7 which all of are free and really nice to use. There are two ways to download fee Windows 7 themes, Desktop gadgets and wallpapers from Microsoft official website.



Method 1: Download free themes, Desktop gadgets and wallpapers from Windows 7 Personalize



Right-click on the empty space of your desktop.



You will see a menu list and select Personalize from those.



Now click on Get more themes online link.Method 2: Download free themes, Desktop gadgets and wallpapers from Microsoft official website



Open any browser (Firefox, Google Chrome, Opera or Internet Explorer etc.)



Write down the official address of Microsoft's Windows 7 themes, Desktop gadgets and wallpapers download link. The link is like the following:



Personalize your Windows 7 computer with themes, gadgets and wallpapersDownload and Install your favourite themes, Desktop gadgets and wallpapers from Microsoft official website.



From the above link, you can easily choose any themes or desktop gadgets or wallpapers etc. freely. Just download that and install that.



To celebrate Windows 7 public launch, Microsoft has released 14 new themes for Windows 7 at the time of Windows 7 release. But there are other 20 extra regional themes . All 14 new themes and 20 extra regional themes can be downloaded using following link:



Windows 7 Personalization GalleryRemember, the link of free Windows 7 themes or desktop gadgets or wallpapers etc. are currently providing only 14 new themes and 28 regional themes. Just click on any theme which you want to download. The them will start downloading and after finished downloading you will find .themepack file. Just double-click on the file and Windows will automatically install and apply your desired theme. One thing, the site is new and there will be lots of updates in coming days. So keep visiting the site when you get some leisure time.



@Written by rancidTasteMore articles on Windows 7



Great Index of Windows 7!



Windows 7 HD Wallpapers: HD Wallpapers for Your Windows 7 Desktop and Laptop



Windows 7 Installation: How to install Windows 7 Operating System on Your Computer or PC?



Genuine Windows 7 Ultimate: The GENUINE Windows 7 activator for x32 and x64



Move and back-up My Documents in Windows 7: Move and save all of your documents in Windows 7



Hidden folder in Windows 7: How to create a hidden folder in Windows 7?



System tray icon missing: How to fix system tray icons missing in Windows 7, Vista and XP?



Windows 7 Disk Defragmenter: How to Use Windows 7 Disk Defragmenter to defragment your Hard Disk



How to Change the Windows 7 Desktop Background: A Complete Guide to Change Windows 7 Desktop Background



How to Enable or Disable Autorun for Removable Media or USB Flash Disk in Windows 7?


The Dell Latitude D520 laptop PC is powered by 1.83 GHz Intel Core 2 Duo Processor T5600 with 2-MB L2 Cache, 667 MHz FSB featuring Mobile Intel 965GM Express Chipset, 1024-MB (1-GB) DDR2 667 MHz SDRAM (upto 4 GB max in 2 slots), 120-GB 5400 rpm SATA hard drive and a 8X DVD Super Multi Double layer (8.5 GB) DVD Writer. dell latitude d520 laptopWeighing 2.38 Kgs the Dell Latitude D520 Laptop PC features a 15.4-inch (39.1 cm) WXGA Widescren Active Matrix LCD TFT display powered by Integrated Intel Graphics Media Accelerator GMA 950 Graphics Chipset with 224-MB shared memory built-in into Intel 965GM mainboard offering upto 1280 x 800 pixels screen resolution with 16.7 million colors. The Intel GMA 950 Graphics Chipset offers support for Direct x 9.0 acceleration, Dual independent display option, Dynamic Display Detect, and Open GL 1.4 graphical environment. Microsoft Windows Vista Home Basic edition preinstalled Dell Latitude D520 Laptop PC offers wireless 1390 ? WiFi 802.11a/b/g Dell Mini Card for wireless networking and it also features integrated 10/100 Gigabit Ethernet LAN controller, built-in 56kbps V.92 Fax/Modem, 4x USB 2.0 ports, IEEE 1394, VGA video output & S-Video and integrated stereo speakers. An optional Dell Wireless 350 Bluetooth module for Dell Latitude D520 laptop allows attaching wireless mice, keyboards, PDAs and other Bluetooth-enabled devices without the hassle of cords and cables. Like its popular Latitude series Dell 830 laptop, the new Dell Latitude D520 laptop comes with Genuine Windows Vista Business preinstalled and it offers a wide range of component upgrades ? including integrated WWAN, 9-cell 85WHr Li-Ion Battery, a Blu-ray DVD burner optical drive, Intel Next-Gen Wireless-N Mini Card, Long Range Wireless Options such as Dell Wireless 5520 HSDPA, Dell Wireless 5720 EVDO, USB External TV Tuner Card ? and offers wide color choices for typical home users to suit budget and applications. The Dell Latitude D520 laptop PC also offers Dell MediaDirect, which allows fast, easy one-button access to movies, music, photos, & Microsoft Office content without starting Microsoft Windows. The Dell Latitude D520 Laptop PC also features integrated 2.0 MP webcam, internal stereo microphone and an integrated 8-in-1 card-reader supporting SD, MMC, MS, MS Pro, XD, Mini SD, MS Duo and MS Pro Duo media cards. Dell Latitude D520 laptop PC also offers Dell MediaDirect, which allows fast, easy one-button access to movies, music, photos, & Microsoft Office content without starting Microsoft Windows. Weighing about 2.38 Kgs with DVD burner drive and battery pack, the new Dell Latitude D520 Laptop PC comes with 6-cell 56 Whr Lithium Ion Battery which can provide upto 2.5 hrs of backup (without Wi-Fi).

Windows Safe Mode?


Since the first versions of Microsoft Windows 3.x which was released 22 years ago on May 22, 1990, there has been a safe mode that the users can access when their computers are malfunctioning. A safe mode is a diagnostics mode that is supported on almost all modern operating systems such as, Microsoft Windows, Apple Mac OS X, Linux, *BSD and *nix. The safe mode is meant to allow the user to access the operating system by loading minimal amounts of drivers and background services when the operating system otherwise cannot boot normally. The safe mode of Microsoft Windows can help the users in fixing a erroneous driver or a program that they may have installed on accident, or fixing a malfunctioning hardware that is preventing the operating system from booting up normally.



Throughout the years, Microsoft has more or less used the same method to access the Microsoft Windows Safe Mode which is to press the F8 button upon starting/booting the computer. This approach has worked for Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows 98SE, Microsoft Windows Millennium, Microsoft Windows XP, Microsoft Windows Vista and Microsoft Windows 7 (excluding the server versions which all also supported the F8 approach).



However, with the launch of the Microsoft Windows 8, for some reason, Microsoft has hidden away the function to allow a user to boot up in Safe Mode to fix potential problems in the operating system. This article aims to describe 5 easy ways for users of Microsoft Windows 8 to access the safe mode that Microsoft obviously do not want the average users to find.How to boot into Windows 8 Safe Mode - Method I:



This method is probably the most useful one for users with a malfunctioning Windows 8 installation that does not boot normally. Even though Microsoft has disabled the simple F8 approach, the trick now is to actually hold down the Shift button while hitting the F8 key repeatably during boot up. Notice though that this approach may require several tries as Microsoft Windows 8 boots up very quickly and will spend very little time waiting for the user to give the Shift + F8 command. When the user succeeds, the user should enter the Recovery Mode menu. The procedure is outlines below:



1. Start up your computer and already from the beginning hold down the Shift key on your keyboard.



2. Repeatably and quickly smash the F8 key during the whole booting process. If you are "lucky" this will take you into the Recovery Mode menu before the operating system begins to load.



3. In the Recovery Mode menu, select See advanced repair options.



4. Choose the Troubleshoot option.



5. Select the Advanced options button.



6. Select the Windows Startup Settings button.



7. Click the Restart button.



After the the computer restarts, you should be greeted by the old and familiar Advanced Boot Options menu that enables you to boot your Windows 8 in Safe Mode, Safe Mode with Networking and Safe Mode with Command Prompt.How to boot into Windows 8 Safe Mode - Method II:



This approach assumes that you can enter and boot up Microsoft Windows 8 normally as it will use the new Charm Bar in Microsoft Windows 8.



1. Bring up the Charm Bar by either pressing the Win + I keys or swiping your mouse across the right side of the screen.



2. When the Charm Bar pops up, click on the Change PC Settings button at the bottom right.



3. Select General and click the Restart now button under the Advanced startup title.



When the computer restarts now you should enter the Safe Mode of Microsoft Windows 8.How to boot into Windows 8 Safe Mode - Method III:



Similar to the previous method to enter the Safe Mode, this method also requires the user to be able to boot into Microsoft Windows 8 normally. For this method we will once again utilize the Charm Bar in Microsoft Windows 8.



1. Bring up the Charm Bar by either pressing the Win + I keys or swiping your mouse across the right side of the screen.



2. Click the Power button once.



3. Hold down your Shift key and click the Restart icon.



That is all you have to do for this method. When the computer restarts you should be greeted by the Advanced Boot Options menu that will allow you to access the Safe Mode of Microsoft Windows 8.How to boot into Windows 8 Safe Mode - Method IV:



In this method, we will use the command line to tell Microsoft Windows 8 to reboot into Safe Mode. Obviously, this method also requires the user to be able to enter Windows 8 through a normal boot.



1. Press the Win + R key to enter the Run dialogue.



2. Type in the command: shutdown /o /r



3. Press Enter.



After pressing Enter the computer should start the reboot process. Once it boots up again, the user will be able to access the Microsoft Windows 8 Safe Mode environment through the Advanced Boot Options menu.How to boot into Windows 8 Safe Mode - Method V:



This final method will use the msconfig configuration tool that has been around Microsoft Windows versions for many years. In order to access the msconfig configuration tool, the user will once again have to be able to boot into Microsoft Windows 8.



1. Press Win + R to bring up the Windows Run dialogue.



2. Type msconfig into the input bar and hit Enter.



3. In the msconfig System Configuration Window go to the Boot tab found at the top.



4. Check Safe boot under the Boot options title.



5. There will be some additional options available to check with Minimal being the regular Microsoft Windows 8 Safe Mode, Alternate shell being Safe Mode with command prompt, and Network being Safe Mode with networking.



6. Click OK which will bring up a dialogue asking the user if a restart should be performed.



7. Click Restart.



This will restart Microsoft Windows 8. Once the system boots up again it will enter Microsoft Windows 8 using the Safe Mode environment that the user chose in the above steps.Summary of the Safe Mode in Microsoft Windows 8



To be honest, it is very unclear what the intentions from Microsoft were to make it so tedious to boot up Microsoft Windows 8 in Safe Mode. While some of the methods outlined above are simple if you know how to execute them, the fact remains that many people who needs to access the Safe Mode cannot boot up Microsoft Windows 8 normally in the first place, therefore, most of the above methods described are simply not applicable.



The reasons to remove the traditional F8 approach to enter Safe Mode will probably never be completely clear. Microsoft Windows 8 does come with a function that will force it to show the Advanced Boot Options menu if the system fails to boot up normally after several attempts. But it would have been much better to not treat its users like idiots and still keep the regular F8 approach, that we are all so familiar with, instead of the new Shift + F8 approach that makes little sense.


The HTC has launched HTC HD7 mobile phone powered by6 the Microsoft Windows Phone 7 and is the first smart phone with WP7. The HTC HD7 is Microsoft Windows Mobile 7 powered smart phone with many smart features. People have wait for a long time for the launch of the HTC HD7. With the launch, HTC HD7 becomes as the first ever Microsoft Windows Phone 7 powered Camera smart phone. The HD 7 is equipped with many high end technology features. Now, these high end feature are available for everyone with exciting HTC HD7 deals, and deals are available with all the networks. The HTC HD7 measures 122 x 68 x 11.2 mm in dimensions and weighs only 162 gm. With a candy bar look. The HD 7 has Qualcomm QSD 8250, 1 GHz processor for good performance. The device has 512 MB ROM with 8 GB non removable microSD memory, and 576 MB RAM. The HTC HD7 comes with a 4.3 inches color TFT capacitive touch screen display, allows you to view high quality graphics with a resolution of 480 x 800 pixels. The mobile is equipped with Motion G-v sensor, Ambient Light sensor and proximity sensor for auto turn off. The mobile handset supports both 2G GSM and 3G HSPDA network. The HTC HD7 orange comes with 5 MP camera with CMOS and auto focus features. The 2 x LED flash light allows you to capture good quality photographs even in low light condition with good clarity. You can also record high definition 720p video with 1280 x 720 pixels resolution. The device also supports FM radio streaming. The HTC HD7 comes with Wi-Fi connectivity, allows you to access fast speed internet. This feature attracts the net savvy generation towards it. The HD 7 have many good connectivity features like Bluetooth, USB interface, EDGE, GPRS and many others. The HTC HD7 is available with many attractive mobile phone deals on the various web portals with many attractive freebies and gifts some of which are laptop, vacuum cleaner, Nitendo Wii, Ipods and much more. You can get the HTC HD7 Orange deals with free incentives like free texts, free minutes, free data usage and many more. You get cheap HTC HD7 Orange deals from various web portals.

Definition: A driver is a small piece of software that tells the operating system and other software how to communicate with a piece of hardware. For example, all printers come accompanied with drivers to install that tell the operating system exactly how to print information on the page. Sound card drivers tell your software exactly how to translate data into audio signals that the card can output to a set of speakers. The same applies to video cards, keyboards, monitors, etc. The drivers for each piece of hardware in your Windows computer are centrally managed from Device Manager, available in all versions of Microsoft Windows. Here's How In Vista: 1. Download the latest drivers from the hardware manufacturer's website. Drivers from the manufacturer will be the most current but there are several other driver download options. As part of this driver update process, you can choose to update drivers from a hardware installation disc or from Windows Update but updating drivers manually (as described below) is usually more effective. Note: Many drivers come integrated with software that automatically installs the driver. The manufacturer's website will tell you if the driver download is packaged this way and if so, the steps below aren't usually necessary. 2. Open Device Manager from the Windows Vista Computer Management utility. Note: There are also several other ways of opening Device Manager. 3. With Device Manager open, locate the hardware device that you want to update the drivers for. Note: Navigate through the categories of hardware devices by clicking the [+] icon. Specific hardware devices are listed under the major hardware categories. 4. After finding the hardware you're updating drivers for, right click on the hardware's name or icon and choose Properties. In this Properties window, click the Driver tab. 5. Click the Update Driver... button. Note: The Update Driver Software wizard will begin. 6. On the How do you want to search for driver software? window, click on Browse my computer for driver software. 7. In the next window labeled Browse for driver software on your computer, click on Let me pick from a list of device drivers on my computer, located at the bottom of the window. 8. Click the Have Disk... button located under the text box. 9. Click the Browse... button on the Install From Disk dialog box that appeared. In the Locate File dialog box that appears next, navigate to the folder that you extracted as part of the driver download in Step 1 above. There may be multiple folders within the extracted folder so be sure to work your way to the one for Windows Vista if it exists. Don't worry if you don't find one labeled for Vista. 10. Click the INF file that displays in the file list and click the Open button. Note: INF files are the only files that Device Manager accepts for driver setup information. See the tips at the bottom of the page for some INF file troubleshooting.

Microsoft Windows 7 is an upgraded version of the previous Windows variant for better performance of tasks. What you execute everyday in your system is further simplified, helping you work the way you prefer. There are electrifying newer application tools and user interface in the Windows 7. The more you experiment, the more you can explore and you will fall in love with the complete upgraded application and working process. Easy management of open Windows is an added feature. A click will let you view the desired file or folder the moment you want it. The user friendliness, better performance, and speed in handling have led users across the world to upgrade to the Windows 7. New and improved features in this application include the following: Work in two windows from a single platform; to view them, the user can arrange the same instantly side by side It is easy to scrutinize through open files in order to find exactly what the user is searching With a few clicks of the mouse, sharing of files and folders becomes an easy affair. Whether it is music or photographs or even printers, the user can share the same within the home network or the Internet Handiness and speediness in locating or keeping of files and folders; the desired folders and files can be pinned to the task bar and jump lists The search option with Windows 7 is equivalent to Internet search options. There are several editions of the Windows 7 designed to suit varied requirements. Right from Windows 7 Home Basic to Professional, Ultimate, Small Business, Student, and more, you can opt to buy one as per your specific use. With online shopping gaining grounds, you can buy Windows 7 online too. Piracy has equally stamped its foothold in the world market and many users get duped with pirated software. If you buy Windows 7 at an online store, especially one which is dedicated to selling Microsoft products only, you can get a genuine one with all authenticity details besides getting discounts. So, if your PC or laptop is not yet upgraded to the newer version of Windows, buy one online and enjoy working! The Windows 7 Home Basic is available in few selected countries; the demand for this software application is increasing by the day as confirmed by reviews posted by users on web. What is unique in the Windows 7 Home Basic is that it supports the latest software and hardware besides facilitating a safe browsing with Internet Explorer 8. You can get your PC tasks simplified to your satisfaction using Windows Search, Pin, Jump Lists, Snap, and other tools that respond very fast. As aforementioned, you can buy Windows 7 Home Basic at an online store that sells only Microsoft products. Using Windows 7, you will feel as if there is no better platform elsewhere to work. Routine tasks are made simple using the handy tools and you can make your computer work the way you want. Before you buy Windows 7, do consider your system requirements.

Choosing RAM (Random Access Memory) has become much simpler these days. Intel has adopted AMD's standard DDR memory for PC motherboards. DDR (Double Data Rate) RAM technology was originally developed by graphics engineers as video card memory. DDR is more efficient and affordable than the RDRAM (RAMBUS Dynamic Random Access Memory) that Intel was using. Recently, engineers have pushed the DDR technology to DDR3 increasing motherboard bus speed even more. A very important thing to remember when purchasing and installing RAM: If you use more than 1 module, make sure they are compatible. It is a good idea to buy modules from the same manufacturer insuring you get the same module type and bus speed. Quite often memory modules made by different manufacturers do not work and play well together. Finding the correct RAM modules for your PC: If you know the manufacturer name and the model of your PC motherboard, finding the proper RAM is a simple matter. Visit any online RAM distributor and search for your motherboard model. Or check your motherboard manual for the type of RAM to use. Also, visiting the motherboard manufacturer's website will give you a list of RAM modules that have been tested to work with your motherboard. Don't know what motherboard your PC has? No problem. Search the online RAM distributors for your PC's model number that is usually found on the back of the case. If you are the curious type, visit your PC manufacturer's website support files and you can find detailed specifications for your PC. How Much Is Enough? To set the record straight, there is no such thing as “too much” RAM. Buying too little RAM is the mistake most often made by PC buyers trying to save a few bucks. The amount of RAM installed has a direct affect on the speed, performance and stability of your computer. In some cases, increasing the amount of RAM in your PC will reduce the chances of a Windows crash. Some applications will cause Windows to suddenly shut down for seemingly no reason when they run out of RAM. Personal Recommendations: These recommendations are from personal experience as a PC technician. They are not recommendations of Microsoft or any PC manufacturer. For Windows 2000, XP, 512MB is the minimum and 1GB or more is recommended. For Windows 98 any flavor, 256MB is the minimum and 1GB is recommended. If you are an avid PC gamer or video editor, 1GB is the minimum recommendation. Other operating systems such as Linux or Mac are similar. Simply put: more is better. Skimping on RAM is one way builders hold down prices. The average pre-built PC comes with 128MB or 265MB of RAM installed. If you want to do anything more than surf the net and send email, that is not enough. If you buy more RAM than you "think" you need, you will be a much happier computer user a year later. By rule of thumb, if you buy a pre-built computer, double the amount of RAM offered by the builder. The cheapest way to buy a new PC: Upgrade your old PC. Install a minimum of 1GB of RAM and add a high performance video card with as much additional video RAM as you can afford. The increased performance and system stability of the additional RAM will amaze you. If you are buying new and want to save a few bucks, buy a less expensive monitor and don't buy a floppy drive, you won't need it. Also get a CD-DVD+RW combo drive instead of 2 separate CD-ROM drives and ransom the family pet. But don't skimp on RAM.

Live Security Platinum via Delta Air Lines


You probably know that all types of malware can get in the system through a download of an application. Instead of a player or a video codec you can download a Trojan which will install another piece of malware that will turn everything up side down. An email attachment might be also a source of the infection. This time, I want to talk about Live Security Platinum, bogus antivirus software, which is known to have used the name of Delta Airlines to get on to a targeted computer.




A user gets an email whose subject is “Ticket is ready”. The attachment which is actually a Trojan that installs Live Security Platinum goes by the name of Ticket_Delta_Air_Lines_IN2139.zip. The text of the letter goes like this:



Hello, E-TICKET / EH065894335



SEAT / 77E/ZONE 2



DATE / TIME 20 JUNE, 2012, 09:55 AM



ARRIVING / Virginia Beach



FORM OF PAYMENT / CC



TOTAL PRICE / 276.42 USD



REF / EF.5709 ST / OK



BAG / 4PC



Your bought ticket is attached to the letter as a scan document. You can print your ticket. Thank you for using our airline company services. Delta Air Lines.



Once the file is extracted, the computer is infected and Live Security Platinum is downloaded on to the computer.




The malware bombards users with imaginary notifications and viruses to scare them into believing that the system is jammed with imaginary infections. The rogue claims that detected infection will be removed as the user activates the rogue, which means that a purchase has to be done. If the user does not know that Live Security Platinum is fake AV, he or she pays the charge and loses his or her sensitive banking data, because every piece of information entered in the purchase form is recorded and sent to the creators of the infection. Scary, isn’t it?




If you do not want to be victimize in this way, be aware of the danger of downloading suspicious attachments that eventually turn out to be malicious applications, which of course should be immediately removed.




The malware presents such false messages:



Warning!



Application cannot be executed. The file rdpclip.exe is infected. Please active your antivirus software.




Warning: Your computer is infected



Detected spyware infection!



Click this message to install the last update of security software



Antivirus protection is disabled. Your PC is unguarded against most known viruses and can be infected. Click “Enable Antivirus Protection” to protect your PC and secure your Internet activity.



Live Security Platinum attempts to trick the user by initiating some system changes that create an illusion that the computer is really infected. More about the characteristics of the rogue you will find here.



According to researches, it is highly advisable to remove Live Security Platinum, because the infected computer cannot be used normally. The best solution to the problem is to use an automatic removal tool that will kill the infection immediately.


The sweet spot of the IT consulting business requires more skills than needed for micro business IT consulting. Sweet spot companies have anywhere from 10-50 computers. This level of business is where you should be focusing most of your IT consulting efforts. These sweet spot businesses generally use Microsoft Windows based systems. They have anywhere from 10-100 employees. In terms of annual revenue, in U.S. Dollars, usually equates to annual earnings of 1 million up to 10 million. The big thing that puts them into the sweet spot is that they have graduated from peer to peer and they need one or two real dedicated servers. Hardware Skills You Need for the Sweet Spot You need to know all the IT consulting skills a micro small business would hire you for plus about 8 or 10 other things. You should be familiar with server hardware, such as working with multi processor servers, should be familiar with how RAID works, Zero One Five, you should be familiar with how multiport communications applications adapters work for setting up remote access servers and serial port sharing. You should have familiarity with attached storage systems, network attached storage, more sophisticated back up solutions like digital audio tape digital linear tape, and the hybrids, etc. Other Skills for Sweet Spot IT Consulting You should be really comfortable with sophisticated battery back up solutions, routers, the CSU/DSUs to connect you up to the telecommunications lines. And you should start to get some familiarity with some of the more advanced Y-5 hardware, the stuff that is not quite commodity level, where you start being able to get into Roam successfully between your access points and being able to do some management and SMP tasks. Networking Skills for IT Consulting In terms of networking software, you need to know all the basic desktop software and have the ability to do all the networking skills that are required for micro small business. For the sweet spot, you should also be comfortable with some of the popular server operating systems out there. These include Microsoft Windows Server, Microsoft Small Business Server, Novell NetWare, Novell Small Business Suite, and Linux which is starting to pick up some traction among small businesses. Copyright MMI-MMVI, Computer Consulting 101. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Microsoft Outlook is a most popular and widely used personal information manager and email client from Microsoft Corporation. It is the part of Microsoft Office suit of products. You can also use Outlook in combination of Microsoft Exchange Server to create a messaging and collaborative environment. MS Outlook stores all of your critical emails, contacts, notes, schedules, journal and other data in PST (Personal Folder) file. In other words, you can say that PST is the repository of all Outlook data. This file has an limitation in Microsoft Outlook 2002 and earlier versions that it can not grow more than 2 GB. When it reaches 2 GB size, the performance gets decreased and you might encounter PST file corruption. At this point, you need to Split PST File using appropriate tools. In a practical scenario, when you attempt to start Microsoft Outlook and attempt to open the PST file, you might come across below given error message: "Errors have been detected in the file . Quit all mail-enabled applications, and then use the Inbox Repair Tool." This issue takes place when PST file exceeds the size limit of 2 GB. Whenever the PST file grows more than 2 GB, you would not be able to start Outlook and open PST file. You might not add new data to it. This issue is called oversized PST problem. However, it is suggested to use Inbox Repair tool or Scanpst.exe to correct this problem, but it does not work in such circumstances. When this problem occurs, you might face any of the following situations: 1-Slow performance of Microsoft Outlook, while creating, searching and moving items due to large number or large size of times in PST files. 2-Outlook crashes while working on it or you come across a number of error messages and PST file corruption scenarios. Microsoft Outlook does not contain any inbuilt tool to recover from oversized PST problem and make the file accessible. However, Microsoft offers an external utility as a makeshift. This utility is known as pst2gb.exe. It can restore the PST file to a usable state. To use this tool for truncating PST file, go through below steps: 3-Download this tool from Microsoft Download Center. 4-Extract 2gb 152.exe file in an empty folder. See the following 5 files -Msstdfmt.dll -Msvbvm60.dll -Pst2gb.exe -Readme.rtf -Readme.txt 5-Run pst2gb.exe tool, click Browse for choosing oversized PST file and click Open. 6-Click Create, choose name and the location of truncated PST file, which you like to create and click on Save button. 7-Type the amount of data, which you like to truncate in Personal Folder file. There isn't a correct amount, which you use. You could get best result if you truncate 20 to 25 MB, but you might have to cut less or more. 8-Run Inbox Repair Tool on truncated file. 9-Open the resulted file in Microsoft Outlook. 10-If the truncated file does not open successfully in Microsoft Outlook, you need to go through the same process again from beginning. Although, this tool might help you sort out your problem, but it is not safe in any case. When you use this utility, it creates a truncated copy of PST file. This copy does not contain all of your original data as the program cuts user defined amount of the data from selected PST file. It means some messages are missing or unavailable in recovered copy. At this point, you need a tool, which can Split PST into different smaller files, without playing with the integrity of your data. This is best possible with the help of third party applications, which are known particularly designed to divide an oversized and unusable PST file into several files and make your precious data accessible again. These applications are known as Split PST software. They split large sized PST file into several individual PST files, which could be used as individual file by simply importing them into Microsoft Outlook and creating a new Outlook profile or using it with same profile. These software Split PST File on a defined criteria either date or email address. Stellar Phoenix PST File Splitter is the most influential and comprehensive tool to easily split oversized PST file and make it accessible through MS Outlook. It supports Microsoft Outlook 2007, 2003, 2002 and 2000. This software is compatible with Microsoft Windows Vista, 2003, XP, 2000 and NT4 (SP6).

osCommerce, which is available for free download on its corporate website is an open source ecommerce solution and is admired by a large chunk of population. It is equally flexible and popular shopping cart system with extensive list of features and customization choice. On-line store front managers, basically owners have ample choices to make their online store robust, with all features and yet flexible to use, according to their need. If you are planning to open up an online shop, then you can put osCommerce in your consideration. As it is an open source and has been released under GNU general public licensee, it is free to use and easy to download. The setup of osCommerce is simple and quick. osCommerce provides you functionality freedom from administrator end, customer end or front-end, product end, functionality end and payment end. Its comprehensive product catalogue front end and administrative end makes it comfortable for both shop owner and customers to carry out there business swiftly. What does an osCommerce installation requires? If your requirements are pretty ordinary and are not with some special requirements than your osCommerce will be able to run on PHP 4.1+ enabled web server running on Linux, Solaris, BSD, Mac OS X, and Microsoft Windows environments. osCommerce Advantages: You can find many add on modules for your e-shop. Large community of osCommerce developers are continuously working on developing more and more features oriented modules, plugins and widgets. A broad line of credit card processors and shipping services are supported by osCommerce . You can insert as many products as a real megastore can have, or even more. Its data base is well indexed and is able to keep millions of products, with their information. Some weak points about osCommerce: The only weak point of this ecommerce solution is that it needs technical knowledge to install and manage. You can have list of features installed but if you are not comfortable with modifying files than at least you must hire someone. People who are new to osCommerce may experience some trouble due to lack of technical knowledge. Hosting: Normally every web hosting company provide assistance for osCommerce installation. But if you like to confirm beforehand then you can check it yourself. If a web hosting company includes MySql it should satisfy the requirements for osCommerce installation as well.

Must-know Information about Microsoft Windows


If you have recently purchased a computer, then you know that Windows is the popular software from Microsoft, is often an integral part of your new purchase. The programs that are included in this package can be very helpful in organizing your business, creating new files, and preparing your budget. Here are some of the features that Windows has to offer.




Microsoft Word is a program commonly used by office professionals to prepare documents. You can create a fax sheet for sending documents, find a template for sending a memo, and even prepare your resume using this program. Additional features of Microsoft Word include a spell checker, so that you can correct any grammatical errors in your document before sending it to other faculty members or submitting it for review. A thesaurus is also available on the program, so that you can make your essays more interesting to read by selecting descriptive words that will enhance your writing. If you are trying to compose a formal letter or resume, the templates provided on Microsoft Word will help you to create a document you can be proud of.




Microsoft Windows also has a program that will help you to keep track of your company or personal budget, as well as create charts and graphs that you may have to use for professional presentations. Excel is a program complete with columns and rows that will allow you to organize your information for mailing lists, marketing programs, and business contacts, and you can create your own charts with the correct amounts of rows and columns for easy-to-read information. The spreadsheet format of the program will also allow you to separate certain items in the company budget, so that you can figure out your expenses, and keep track of your spending.




If you will be giving a presentation to a group of colleagues at work, or presenting a lecture to a class, then Windows has a program called PowerPoint that will work well for you. The program helps you create slides, which you will present throughout your lecture. You can fill the slides with information on the subject you're presenting, including, facts and stats, and can even add animated pictures to enhance your presentation. Charts and graphs can also be included in this Windows program, and PowerPoint has become the industry standard for many professors and corporate professionals.




What is missing is a registry cleaner that optimizes the Microsoft operating system and eliminates computer errors.


Koobface is the latest virus that has attacked the social networking phenomenon. Top social networking websites like facebook and myspace are the places where this thing has done nothing but mischief.


The virus originated in early December and is reported to have infected several computers using the facbook platform. Although such a virus has been reported earlier in myspace but this new thing is using different methods to seek into the users PC and spread malware into the computer.



What Is Koobface?



Although famous as virus, the Koobface is actually a worm. A worm is a malware that sneaks into your computer and replicates itself throughout the PC. The difference between a virus and a worm is that, virus attaches it self to the file where as a worm actually replaces it. A worm can even send automated emails to other PC's trying to infect them using yours.



So Koobface is a worm and attacks a computer by downloading some .exe files into your computer. The main thing is to identify the threat at this point before it is too late.How Koobface Infects a Computer?



Basically if you are using facebook you should watch for automated email messages that display either an insulting message or some thing very tempting about you. Messages like, "you look funny in this video" or "you look so stupid in this pic" can be used to persuade somone to click on the link attached, this called 'Social Engineering'. Once the user clicks on them it takes you to a video which doesn't play and they ask you to download certain codecs which can be a 'flash_player.exe' file.



If this file is downloaded, your computer becomes open to Koobface malware. It downloads a file 'tinyproxy.exe' which hijacks your PC. It can even alter search results from Google, Yahoo etc and redirect you to websites selling malicious softwares.How To Remove Koobface Automatically?



Here I will discuss two method of removing Koobface. First lets discuss the automatic method. The facebook security page has posted about this but there is no genuine way of removing this malware. They have only asked people to change their password in order to protect user security.



The best automatic method to remove this thing is of course to get a good malware remover which can automatically detect and remove it. If you have already bought a good spyware you can find the removal instructions from the support page. But it can be removed automatically if your software is updated.



The major problem is that the Koobface worm is constantly changing itself, so make sure you have the latest version of the mlaware installed.



If you don't have a anti-malware software, you can download one here. It has been so far the best free spyware remover that I have found.How To Remove Koobface Manually?



Although it is highly recommended that Koobface or any other parasite should be removed using a automated software but still if you want to do it manually here is the procedure but before attempting anything, make sure you backup your computer:



Using The Add\Remove Program Tool:



This is not a 100% removal method because most of the malware don't really appear in the list but if they are you can do this:



Go to Add\Remove utility.



Look up for the Koobface malware to remove and uninstall it.



But it is noted that Koobface restores it self on rebooting. So here is a better method:



By Removing Registry Files



Here are the steps:



Search for "koobface" in Mycomputer using find utility.



Note down Koobface file path some where.



Press Ctrl+Alt+Del to open 'Task Manager'



End the "Koobface" processes.



The following processes must be ended:



1. %SYSTEMROOT%\bolivar28.exe



2. che07.exe



3. bolivar28.exe



4. %WinDir%\system32\nScan\ekrn.exe



5. %WinDir%\system32\nScan\ecls.exe



6. %WinDir%\system32\splm\ncsjapi32.exe



7. %WinDir%\bolivar28.exe



8. C:\Windows\fbtre6.exe



Now you need to change 'Registry Files', here is what to do:



Type 'regedit' in Run and press Enter.



The Registry Editor will appear, locate the above mentioned process files and delete them.



Locate "Koobface" registry entries and delete them, they are as the follows:



1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Intelli Mouse Pro Version 2.0B\StubPath: "%WinDir% \System32\splm\ncsjapi32.exe"



2. HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\RunOnce\*Intelli Mouse Pro Version 2.0B*: "%WinDir% \System32\splm\ncsjapi32.exe"



3. HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Intelli Mouse Pro Version 2.0B: "%WinDir% \System32\splm\ncsjapi32.exe"



4. HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden: "2"



5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*Intelli Mouse Pro Version 2.0B*: "%WinDir% \System32\splm\ncsjapi32.exe"



6. HKEY_USERS\Software\Microsoft\Windows\nScan32\ExecuteDate: "14\8\2008"



7. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run\"systray" = "c:\windows\mstre6.exe"



8. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run\"systray" = "C:\Windows\fbtre6.exe"



9. HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\NavigatingNow you have to unregister dll file as follows:



Go to start and type in 'cmd' to open comman prompt.



First locate the following dll files using 'dir' command.



1. %WinDir%\system32\nScan\ekrnEmon.dll



2. %WinDir%\system32\nScan\ekrnScan.dll



3. %WinDir%\system32\nScan\ekrnEpfw.dll



4. %WinDir%\system32\nScan\ekrnAmon.dll



5. %WinDir%\system32\splm\lmfunit32.dll



6. %WinDir%\system32\splm\mcaserv32.dll



7. %WinDir%\system32\splm\kbdsapi.dll



Now change the current directory using 'cd' command leave a space after 'cd' and then the path of dll file, which you have located above. Press enter after this.



Now unregister dll file by typing "directory path+'regsvr32/u'+dll file name". Press enter, the file will be unregistered.



I would once again recommend that you do it automatically since there is risk of damaging the computer as important files may be deleted or changed.


If you're looking for the dedicated web hosting hosting server, the vps is the best substitute for take. The reason being this dedicated host offer an effective server when it comes to expenses. It may also have a more personalized support. These types of host has the capacity to handle virtually any hosting than a consumer might need. A real host because virtual devoted is able to separated into numerous machines that perform the duties of any dedicated host. It is because it has the chance to help make each split-up machine to function on the device that is definitely committed to it. In addition, this kind of server is within 2 types, the windows 7 Virtual private server web hosting along with the Linux Virtual private server web hosting service. With windows xp virtual private server it involves the ability of getting extremely dedicated servers split into more . Windows VPS is economical as it might help you run customized server applications in an environment that is isolated. As a result, you may run multiple microsoft windows hosting in isolation of assets. Furthermore, it can allow you instance of remote use of your own computer's desktop. The advantages of this can be you can run the appliance with great ease. Another advantage is microsoft windows Virtual private server web hosting enables you ensure you are employing your machine to the maximum. Additionally, it should make it friendlier towards the conditions because doing so doesn't use very much electricity. Moreover, it can also awesome itself efficiently than the majority of bodily servers. There are other reasons why it's great to use a microsoft windows Vps. One of many advantages of this sort of internet hosting machine is that it's affordable. It is possible to therefore relax knowing of top quality with a less expensive price. It is also feasible for getting root access to every client considering the such a program. This has been only possible with committed machine. However, these days it is possible to utilize windows vps every single child entry individual customers' better. There are lots of other possibilities that your type of virtual private server allows you to do. With a good basic having access to the host you could be competent to install programs. You'll be able to use any type of application that you want on your server with not a large amount of problems. While using invention of an microsoft windows vps is able to upgrade his/her machine without notice. This is due to each hosting server grows while using the usage placed on it, so it is a less expensive technique to improve your web site based on the demands which are place on it or that you have as well as traffic you think your blog can pull for it. Which means that you'll be able to improve the microsoft windows web hosting within a few minutes and never having to install everthing else.

If there?s one thing that actually helps innovation and all kinds of gadget sales it?s hype. How many times have customers been influenced to buy something new just because everybody's talking about it? Indeed, in the marketing plan of those new products, there's usually a lot of ?teasers? which build up the ?buzz?. Let's take examples from a few popular products: Microsoft Windows: Months (or years) before the launch of Windows 8, one can already find a lot of rumors, articles as well as blog posts about it. The first magazine publishing sneak-peaks and teasers of Windows 8 will get a lot of attention and will nurture the need for customers to be ?ready to buy? Microsoft Windows 8 once it's available for sale;The same technique applies for the upcoming iPhone5: There is already a lot of buzz spreading around the internet about its specifications as well as the date that it will be available to the market;A similar online buzz has also helped to make Twitter very popular today ? especially in the journalism field. Twitter has become so hyped that almost all big TV shows have some twitter account or hashtag ?trend? to encourage people to discuss their program long after it has aired. Indeed, the strategy has proven to work well. It has been used for decades in the IT industry and customers have now been ?trained? to expect the new product way before it's available to the market. The IT advertising industry has made it so that we are alert to every new product that will be available: how many times have you spoken to someone who is, without doubt, on-top of every new product out there? Well, you probably would no longer be surprised if you found out that the same person has a plethora of advice on every known subject that?s going viral - in fact, they read all the rumors and sneak-previews that are published. As a ?regular? user, we might assume that this person is really in the know when it comes to IT (which may be the case), but chances are that they aren?t really an expert on all these topics. So when asking advice on a specific product, 90% of the time, they will decline, simply because there's a big difference between ?reading the latest news? and fully mastering one product. Unfortunately, that same scheme also applies to cloud computing. Average users will wrongly perceive some people as Cloud computing experts - simply because they can talk the talk. This causes issues regarding customer's perception and expectations. Indeed, since there's a lot of hype nowadays around cloud computing, as customers, we tend to approach whoever has pitched cloud-computing to us with the expectation that they will help us out in our own implementation. This is where we should be careful; knowing the difference between those who contribute to the hype against the experts who actually use one or multiple cloud-computing solutions. Indeed, as a customer, once you've adopted a Cloud based solution, it will always be beneficial if you can contact an actual implementation expert to help you achieve your goals.

Get your business up and running online using a free open source shopping cart. Open source software has taken the marketplace by storm. Small business owners and multinational companies alike are using open source software to run their daily business operations. Today, open source software can meets the needs of various industries and market segments including those requiring an application server, web server, productivity suite, CRM tool, project management, integrated development environment (IDE), point-of-sale software, enterprise resource planning (ERP) software and ecommerce shopping cart software just to name a few. Open source software provides a low cost alternative to traditional proprietary software. Merchants have the ability to customize open source products to meet their specific business requirement. When trying to select a shopping cart system, to run your online store, business owners must evaluate and assign value to the technical and operational specifications before deploying to production. Since one size does not fit all; merchants must choose the best product based on their unique requirements. So how do you choose the best open source shopping cart software? First we?ll start by listing the major players in the small business market. In order to make my list the open source shopping cart must meet the 10 minimum requirements listed below. Required Features: 1. Centrally controlled source code 2. An active developer community 3. Mature third party extensions (including PCI Compliant payment gateway extensions) 4. Support Linux and Microsoft Windows hosting environments 5. Software download must include all features listed on website (e.g. not crippleware or demoware) 6. Well written installation guide and user guide. Documentation may be available as a PDF document or as an HTML file. 7. Installs on a standard SSL certificate 8. Provides a custom notification email to the merchant and customer 9. Provides timely bug fixes and safe upgrade path 10. Installs in a dedicated and shared hosting environment Now that we have our minimum requirements list we can begin to look at the top open source shopping cart programs. In my opinion, the top open source shopping carts for the small business market are: ? Magento Commerce ? VirtueMart ? osCommerce ? ZenCart ? CubeCart ? UberCart ? AbleCommerce Each of the open source shopping carts listed above can be downloaded, installed and configured at no cost to the merchant. However, since most open source product installations come with a standard (non commercial quality) user interface most merchants will want to upgrade the GUI (graphical user interface). In order to upgrade the GUI and improve the end user experience merchants can choose to hire a web developer or simply purchase a custom template from sites like templatemonster.com. Template Monster (and others) provides thousands of affordable custom templates so merchants can easily deploy great looking online stores. In order to ensure you?re selecting the best open source shopping cart for your business merchants should consider the following: Capacity ? The merchant must know and understand the product capacity limitation. For example, if you have a product catalog of 1000 products but the shopping cart has a 900 product limitation then that solution is not for you. Note: All of the open source products listed above have an unlimited product catalog. Performance ? If your ecommerce web store is slow customers will simply shop someplace else. Therefore, you must check performance with high user loads and with increased data loads. Both scenarios can bring a web store to its knees. Community Support ? Verify a strong development community exist. Review the online forums to see if the product has an active community of developers. Look for online questions then see how long it took for the user to get a response. Technical Support ? Ensure technical support is available via an active developer community or as a fee paid contract. There is nothing worse than having a production issue and waiting 5 days or more to get an answer. Payment Gateway Support ? In order to accept and process credit card payments the open source shopping cart must provide third party payment gateway extensions. Free Payment Modules from Planetauthorize.Net Payment Gateway (and others) are available for the leading open source shopping carts. Search Engine Friendly URL ? Once you deploy your ecommerce web store you must submit your web store to the top search engines. In order to be indexed by the search engines your online store must have search engine friendly URLs. For more information visit us online at planetauthorize.com.

Some Internet Street Smarts


What I find, among my friends and those I talk with is some basic Internet smarts. From this is how the thieves and crooks of the Internet ply on. These people should be treated exactly the same as the armed robber. Stealing is stealing, breaking in another person's computer should be treated the same as breaking into someone's living quarters (whether you are armed or not the penalty should be the same).



Enough, the first part of this lesson is recognize one of the tricks spy/mal ware scammers get their goods on your computer and with your permission (albeit but forced). For the most part, this will deal with Antivirus 2009, which can go under a variety names:



XP Antivirus;



Vitae Antivirus;



Windows Antivirus;



Win Antivirus;



Antivirus Pro;



Antivirus Pro 2009;



Antivirus 2007, 2008, 2009, 2010, and 360;



System Antivirus;



Vista Antivirus;



AntiSpywareMaster;



XP AntiSpyware 2009,



You are happily cruising the net, maybe doing a research on a subject matter, or looking up something maybe just what is ailing your children. Google, Yahoo, Cuil and any other search engines aren't immune, and unless they catch it, you may be one of the first victims. It evens gets by WOT (web of Trust which I recommend having ). What they do is construct innocent looking websites which the search engines find, but when you arrive are redirected to their site.



So Step by step here is what happens.



1. Hit the first search term (Google they came up 2nd or 3rd, and Cuil 1st). Where most people go first.



2. They reduced my Flock browser and covered it up with their notice (here I uncovered it slightly)



3. Close their window with X (circled). Always do this.



4. At next popup. Close that with the X



5. and quickly close your browser (or tab if you prefer to save your session) on the X too (start a new session).If the following types of screens showing the scan results occur closing out your explorer/browser is going to be difficult. It can be done through the Task manager for Windows operations, and Monitor in Linux.



So let's walk through the steps



6. Copy of phony results. Enough to make one panic if they didn't know better. They are clubbing by fear. Another popup box with a Windows Security look-a-like logo (another part of the ploy). Whatever you do don't click anwhere's except the X. Even inside the popup and not on the buttons will automatically prompt from your browser for the download.



7.Download that popped up. DON'T DOWNLOAD!!!, HIT YOUR BROWSER CANCEL, DON'T RUN, HIT CANCEL OR X.



8.Now the nag popup occurs. It is now a futile operation to cancel the nag window via the X (except in one case), for it quickly reopens again. Don't hit any of the other buttons, or you can expect the download prompt again. (see 7 above ). Your Final Solutions



Once we reach the screen window at 8), the fight is on. Closing via the X only results in it quickly reopening and too quickly for you to close the tab or browser.



But not all is lost some tricks can be done here.



9. Pull up the Task Manager - via Ctrl-Alt-Del(ete).



Click on the application tab



Click on explorer/browser affected



Click end task



If prompt select OK.



10. Another alternative, but requires a fast clicking of the mouse. Is drag their popup box such that Xs are aligned over the Tab X or Browser X. Double click and you'll beat the popup. One more popup may appear but it can now be Xed out too.



For extra peace of mind run your Antivirus. It will probably just clean up your Browser's cache. Defense Solutions



1. Have a good antivirus installed. It may not stop from getting to the site but will warn. Or have it integrated in your browser AVG has a toolbar. Figure 11) shows what my AVG did in Windows (yes I redid the hit in Windows). Note another thing is you must know what your warnings from your Antivirus program looks like and behaves, the imitators will try and duplicate these too. If uncertain you can always use the Task Manager to see what is running and close things down and run you Antivirus program.



2. If you don't have an antivirus I recommend getting one of these three: AVG Free, Comodo, or Avast ( I have used any one of these three, prefer the first two). Plus haveSpybot S&D and Lavasoft Ad-aware installed



3. If using FireFox or Mozilla like browsers (Flock) have "No Script" installed - here is what I got in 12) from a "No Script" FireFox. It put a quick stop to the whole affair.Alright - you've been infected. Now what.



HSymptoms of infection is constant popups declaring your infection, stating to removing infections you need antivirus protection. Directing you to the phony site. Unfortunately thousands if not millions have fallen for this ploy, and purchased the phony antivirus protection. (It merely becomes even more entrenched). Also the longer the phony warnings stays on the slower your machine becomes and the more entrenched it becomes.



Deleting it will not remove and depending on the variety uninstalling won't either. Instead it reinstalls itself. It may even disable your real Antivirus programs. The crooks here constantly update this antivirus rogue ware so it can avoid detection.



So how do you remove it? Well do you want to do this yourself or use antivirus software? As a DIY, I have no recommendations of which software to use. There are several dealers out there but a good starting pointing which software would be PC Mag's forum. PC mag will direct you to the Bleepingcomputer.com A very good starting point.



Now if you are up to the challenge here is the manual way of removing (It's not for the novice to do this). Please reboot your computer into safe mode. This disables a lot of drivers and functions. But will allow you access to remove this virus.



Find and stop these Antivirus 2009 processes:



av2009.exe



Antivirus2009.exe



AV2009Install.exe



av2009[1].exe



AV2009Install_880405[1].exe



AV2009Install_880405[2].exe



c:\Program Files\Antivirus 2009\av2009.exe



c:\WINDOWS\system32\ieupdates.exe



Power-Antivirus-2009.exe



AV2009Install[1].exe



ieexplorer32.exe



%PROGRAMFILES%\Antivirus 2009\av2009.exe



AntivirusPro2009.exe



%PROGRAMFILES%\AV9\av2009.exe



Find and Remove these Antivirus 2009 DLL files:



shlwapi.dll located usually in c:\WINDOWS\system32



wininet.dll located usually in %UserProfile%\Local Settings\Temporary Internet Files\Content.IE5\S96PZM7V



Remove these Antivirus 2009 Registry files:



HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\ CurrentVersion\Run\15358943642955870504508370025739



HKEY_LOCAL_MACHINE\SOFTWARE\Antivirus



HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\”Antivirus” = “%ProgramFiles%\Antivirus 2009\Antvrs.exe”



HKEY_CURRENT_USER\Software\Antivirus



Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start



Menu2\Programs\Antivirus 2009



HKEY_CURRENT_USER\Software\75319611769193918898704537500611



HKEY_CLASSES_ROOT\CLSID\{037C7B8A-151A-49E6-BAED-CC05FCB50328}



HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "ieupdate"



HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "75319611769193918898704537500611"



HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{037C7B8A-151A-49E6-BAED-CC05FCB50328}



Remove these Antivirus 2009 files:



av2009.exe



Antivirus2009.exe



AV2009Install.exe



av2009[1].exe



Antivirus 2009.lnk



Uninstall Antivirus 2009.lnk



AV2009Install_880405[1].exe



AV2009Install_880405[2].exe



c:\Program Files\Antivirus 2009



c:\Program Files\Antivirus 2009\av2009.exe



c:\WINDOWS\system32\ieupdates.exe



c:\WINDOWS\system32\winsrc.dll



c:\WINDOWS\system32\scui.cpl



%UserProfile%\Desktop\Antivirus 2009.lnk



%UserProfile%\Local Settings\Temporary Internet Files\Content.IE5\S96PZM7V\winsrc[1].dll



%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus 2009.lnk



%UserProfile%\Start Menu\Antivirus 2009



%UserProfile%\Start Menu\Antivirus 2009\Uninstall



Antivirus 2009.lnk



%UserProfile%\Start Menu\Antivirus 2009\Antivirus2009.lnk



Power-Antivirus-2009.exe



AV2009Install[1].exe



ieexplorer32.exe



ieexplorer32.exe-removed_skip



AntivirusPro2009.exe



Conclusion.



I have never been infected with this program, encounter through various search engines and other rogue like applications. My course of action has always been my friend the Task Manager. Get to know it. Plus I am a heavy FireFox user, and with that "No Script" is usually installed.



As can be seen from the steps it's better to nip these culprits before they even enter the gate - "No Script", or an good Antivirus with a toolbar (warns of bad sites in search engine results). WOT is good and should be installed.



Next is some smarts in how to act with these crooks. Stopping them at the door with the Task Manager or even if are uncertain having your system just plain out right shut down (good process for the novice). As always instruct your family or loved ones all these people. Awareness is a good defense.



Stopping them, is far better then trying to remove them. But remember the protection is only as good as the person is using it. The best locks don't work if they aren't used right. Firewalls and Antivirus protections are good, but we must still exercise some defense and be educated what the crooks do out there and their techniques. Because you the operator can let the crooks through your defenses.



It should be noted according to the FTC and it's a good read.



"At the request of the Federal Trade Commission, a U.S. district court has issued a temporary halt to a massive “scareware” scheme, which falsely claimed that scans had detected viruses, spyware, and illegal pornography on consumers’ computers. According to the FTC, the scheme has tricked more than one million consumers into buying computer security products such as WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus. The court also froze the assets of those responsible for the scheme, to preserve the possibility of providing consumers with monetary redress."



But this isn't going to stop similar events from happening or from other countries. As an internet traveller be on your toes.


WMV which stands for Windows Media Video is a compressed video file format for several proprietary codecs developed by Microsoft. The original codec, known as WMV, was originally designed for Internet streaming applications. Since it is developed by Microsoft, Windows platforms come pre-equipped with the ability to play this multimedia format, however other operating systems do not. WMV is primarily based in ASF (Advanced Systems Format) that wraps a video bit stream. Some WMV files may also employ Windows Media Video 7 and 8 codecs. Microsoft claims that WMV 9 provides a compression ratio that is two times better than MPEG-4, and three times better than MPEG-2. Microsoft's proprietary ASF wrapper format is fully documented thus making it available for open-source communities to develop and employ their own customized codecs to other media players which do not natively support this type of format. Although WMV is generally packed into the ASF container format, it can also be wrapped in the AVI or Matroska container format. As the name implies the AVI video format has a .AVI file extension, whilst the Matroska files have a .MKV file extension. While none of the WMV codecs themselves contain any digital rights management [DRM] facilities, the ASF container format can. Since the WMV file format can be encapsulated in ASF, this enables WMV to support DRM. Windows Media DRM, which can be used in conjunction with WMV, supports time-limited subscription video services. A list of multimedia players which support WMV files include: Windows Media Player (which comes parceled with every Windows installation package), VideoLAN (VLC), and Media Player Classic (MPC). These all support the WMV format without having to install additional codecs, so you basically can download these players freely from their respective websites. VLC and MPC are available on all operating systems including MacOS and Linux etc.

SMS Transfer allows you to transfer and backup your SMS messages between mobile phone and desktop computer easily, freely, unlimitedly. Guangzhou, China (April 8, 2010)---- Godsw Mobile today announces the release of SMS Transfer, which is an application designed for cell phones running Microsoft Windows Mobile 5 or Windows Mobile 6 system. It allows you to transfer and backup your SMS messages between mobile phone and desktop computer. Transfer SMS can transfer and backup all mobile messages to PC as TXT format file, which makes it easy for you to read, edit and print them whenever you want. At the same time, you can restore all mobile messages on your computer to your mobile phone. To put it simply, you can shift your SMS messages between PC and mobile phone as easy as pie with it. Transfer SMS supports unlimited SMS backup and restore, and this is especially useful when you have tremendous amount of messages to deal with. Moreover, it is always fast and snappy no matter how small or large the quantity of messages is, so it will only make your work more efficient but not otherwise. Besides, SMS Transfer fully supports the latest mobiles phones of VGA and WVGA Screen (such as HTC Touch HD/2 and Diamond/2) in addition to general mobile screens. About Godsw Mobile Godsw Mobile, founded in 2005 and located in Guangdong Software Science Park in Guangzhou, is dedicated to the R&D, agency and marketing of personal use software. Thanks to the preferential governmental policy and abundant talent resources, ever since its establishment, Godsw Mobile has maintained the momentum of stable and fast development. Now Godsw Mobile enjoys good reputation both in the industry and among consumers all over the world. Godsw Mobile is experienced in Windows Mobile development and specialized in data synchronization. Godsw Mobile?s products and technologies have been licensed by leading mobile device manufacturers. With its experience in business, productivity and synchronization applications, Godsw Mobile is advancing towards a major player in the global mobile software landscape.

In Microsoft Windows XP, there may be some conditions which shows the operating system is missing. Here , the system does not boot up and this makes the data stored on hard drive inaccessible. This behavior leads to serious data loss situations and thus you need to opt for windows data recoveryusing appropriate tools.


When we try to boot our system, you might come across any of the below error messages:



Missing Operating System



Operating system not found.



If you go to Recovery Console by booting the system using Windows XP installation disk to recovery its functionality, you may get below error message:



“Setup did not find any hard drives installed on your computer.”



This behavior of Microsoft Windows XP renders all your valuable data inaccessible and lead to data loss. In order to gain access of your business-critical data, you need to find out the cause of this problem and then carry out windows recovery by sorting it out.



Root of the issue



Here are the reasons of this type of behaviour



Damaged or missing command.com or other Windows boot files.



Damaged MBR (Master Boot Record)



Virus infection



File system corruption



Inactive boot partition or incompatible partition is set as active



BIOS doesn't detect hard drive



Logical damage to hard drive or operating system malfunction



Resolution



Try these methods to solve it :



Check BIOS settings: Make sure that your system BIOS recognizes your hard drive. If the system detects your hard drive, then the problem could be with logical part.



Use Windows Recovery Console: Repair the MBR using Fixmbr command in Windows Recovery Console.



First backup all your data and apply Fixmbr command. This command may cause data loss if the drive is virus infected or there is a physical damage. In such cases, windows data recovery software come for your help to get your data recovered.



The applications have interactive user interface and thus let you carry out windows data recovery on your own. They perform absolute recovery using advanced and powerful scanning algorithms.


With growing number of computing device variants storming through the market, it has almost a challenging task for users to choose between bulky desktops and sleek laptops. To buy or not buy is the buyer?s dilemma. Heightened arguments have always been held on this topic as supporters of both gadgets judiciously put forth their feedbacks, but are they enough to convince a buyer and do influence a buyer?s decision in this respect? Let?s find out some interesting facts on this particular issue. Laptops are for young generation. Features like lesser space to acquire, wireless, mobility, battery and stylish look have made a laptop most convincing and a viable option for young buyers. Laptops offer facilities like operating from part of the world, whether you are in a garden or in college or at home. With so many cool features of laptops available to the consumers, there are still some spaces offered to desktop PCs where the latter outperforms the former. If you are choosing in between a laptop or a desktop and have prioritised multi-tasking functionality with high performance and want everything with an extra boost and low cost, the desktop PCs are good choice for you. Customisation is another feature that puts desktop PCs ahead of laptops. So far as manufacturers are concerned, they put emphasis on both segments and every then and now a new product is launched to lure buyers. Let discover one of such high performance desktop PC that really a good computing device to own though have least mobility and same wiring confusions - HP Compaq DC7900 PC. Here follows the product specification of HP Compaq DC7900 PC: Part Number FU042ET Fast facts Processor type Intel Core 2 Duo processor E8400 3.00 GHz, 6 MB L2 cache, 1333 MHz front side bus Cache external 6 MB L2 cache Processor front side bus 1333 MHz front side bus Chipset Intel Q45 Express Memory type PC2-6400 DDR2 800 SDRAM Standard memory 2 x 1 GB Maximum memory 16 GB DDR2-Synch DRAM Memory slots 4 DIMM Memory upgrade Expandable to 16 GB through four industry-standard DIMM slots Internal drives Internal drives 160 GB Hard disk drive speed 7200 rpm External drive bays 1 external 5.25 inch, 1 external 3.5 inch Optical drives SATA 16X/48X DVD-ROM Flexible disk drive Optional 1.44 MB Diskette Drive Hard disk controller SATA 3.0Gb/s System features Chassis type Small Form Factor Graphic subsystem name Intel Graphics Media Accelerator 4500 integrated graphics Video adapter, bus PCI Express x 16 Video adapter driver Microsoft Windows XP Home and Microsoft Windows Vista Enterprise Graphic subsystem video card memory Graphics memory is shared with system memory. Graphics memory usage can vary from 8 to 512 MB depending on the amount of system memory installed and system load Graphic subsystem video card resolution Maximum Vertical Refresh Rate: 85 Hz at up to 1920x1440, 75 Hz at 2048x1536 Expansion slots 1 low-profile PCI, 2 low-profile PCI Express x16, 1 low-profile PCI Express x1 Audio Integrated HD audio with ADI1884 codec, internal PC speaker Network interface Integrated Intel 82567LM Gigabit Network Connection Network cards Optional Intel Pro 1000 PT PCIe Gigabit NIC Available LAN drivers Microsoft Windows Vista, Microsoft Windows XP External I/O ports Rear: 6 USB 2.0, 1 serial port, 2 PS/2, 1 RJ-45, 1 VGA, 1 DisplayPort, audio in/out; Front: 2 USB 2.0, audio ports; Optional: 2nd serial port, 1 parallel port Keyboard HP PS/2 Standard Keyboard Pointing device HP PS/2 2-Button Optical Scroll Mouse Software : Operating system installed Genuine Windows Vista Business Pre-installed software Optional preloaded software, only for certain configurations: Microsoft Office 2007 Basic, Microsoft Office 2007 Professional, Microsoft Office 2007 Small Business, Microsoft Internet Explorer with Google Toolbar Software included On some models only (not included with FreeDOS): HP ProtectTools Security Software Suite Version 4.0, HP Power Manager, HP Firefox Virtual Browser, HP Backup and Recovery Manager, HP Insight Diagnostics Software (available via HP Backup and Recovery Manager), Computer Setup Utility, McAfee AntiVirus trial version, Roxio Creator Business 10 or DVD 10 or Easy Media Creator 9.0, Intervideo WinDVD 8 LE, PDF Complete Security management Integrated 1.2 TPM Embedded Security Chip (except for Russia), HP Business PC Security Lock, HP USB Smartcard Keyboard Physical security Kensington Lock, Solenoid Hood Lock / Sensor, HP 2008 (SFF) Wall Mount/Security Sleeve Product dimensions (W x D x H) 33.7 x 37.8 x 10.0 cm Product weight 8.5 kg Power features Operating Voltage Range: 90 ? 264 VAC; Rated Voltage Range: 100 ? 240 VAC; Rated Line Frequency: 50/60 Hz; Operating Line Frequency Range: 47 ? 63 Hz; Power consumption 240 watts maximum Power requirements Input voltage 90 ? 264 / 100 ? 240 VAC, 50/60 Hz, 47 ? 63 Hz, active PFC (85% High Efficiency) Energy efficiency compliance 85PLUS Power Supply Storage temperature range (Celsius) -30 to 60° C Operating humidity range 10 to 90% RH Non-operating humidity 5 to 95% RH Non-operating altitude 9,144 m Operating temperature range 10° to 35° C Operating altitude 3,048 m (Courtesy: systemactive.com) For more information about this product, you can visit @ www.systemactive.com

Microsoft Windows Office Tutorial


Microsoft Office is an office suite software productivity package that is used in businesses and home in the United States and all across the globe. Users of microsoft office can create written documents, spreadsheets, graphs, slideshows, and more. The microsoft office suite allows a user to create professional looking documents with little design or computer engineering background which allows a user to focus on the substance of what is being created and they do not have to worry about the technical computer aspects of what the microsoft office software is doing.



Office productivity has relied on the Microsoft tools. While most packages come with extensive instructions and help for troubleshooting, there are many advanced user topics and features that can only be learned through trial and error or through Office tutorials and Office guides. Fortunately there are many Microsoft Windows Office Tutorials.The Office productivity suite is composed of multiple software programs that each provide a specific format to create a multitude of documents and other templates. The individual software programs include:



Microsoft Word



Microsoft Excel



Microsoft Access



Microsoft Power Point



Microsoft Front Page



Microsoft Groove



Microsoft InfoPath



Microsoft Outlook



Microsoft OneNoteMicrosoft Office Tutorials



Each Office Tutorial will be specific to a specific version of the Microsoft Office release. There have been many updates to Microsoft Office and each version will have at least one, if not more, tutorials and guides to learn about the Microsoft Office Tools. For example, some of the most popular and well known versions of Microsoft Office include:


An MCP is a private firm that provides clients MS related goods and solutions. These companies perform globally to provide a range of MS Solutions under the MS offset umbrella, yet remain separate. These items could include anything from education to tech assistance team to original equipment producer application to specialist application. The advantages for associates are earlier access to details from MS, quantity of tech assistance team and cheaper access to MS application permits. The primary advantage for MS is a devoted band of experienced, able and modern companies, always ready to help them serve their client?s needs. Microsoft?s Certified Partners certification system is meant for companies that are effective in applying Microsoft?s technological innovation and systems. Types of MCP MS provides two different types of MCPs. They are the MS Certified Partner and the MS Gold Certified Partner. The MS Gold Qualified Partner must complete a much more difficult analyze to be granted the "gold" certification. Once they obtain that popular documentation they, in turn, have many more solutions available to them than those that don't have the gold documentation. The Gold Qualification system contains number of services: ? Business intelligence ? Collaborative solutions ? Hosting ? Application services ? Learning solutions ? Security solutions Membership Fee & its Advantages MS Certified Partners pay a yearly regular member's program rights fee. MS Qualified Partners also get entry to up to 10 duplicates of Office XP Developer Version, 20 duplicates of the Microsoft Windows XP Professional OS and between 10 & 20 client accessibility certificate chairs for server access. MS Qualified Lovers must update their qualifications whenever MS produces new systems or application. This keeps these partner?s' qualifications up-to-date and guarantees that they are familiar with all MS systems and application. They also have 24 hour entry to Microsoft windows assistance solutions. This enables MCPs to provide the best in customer interaction and assistance to their clients every day. MS provides two different types of MCPs. They are the MS Certified Partner and the MS Gold Certified Partner. The MS Gold Qualified Partner must complete a much more difficult analyze to be granted the "gold" certification. Once they obtain that popular documentation they, in turn, have many more solutions available to them than those that don't have the gold documentation. The Gold Qualification system contains number of services: Microsoft Partner Competency certification is from MS for efficiently finishing it?s on the internet examinations listed under this classification. MS Partner Experience certification has evaluation in almost all MS Technology like Microsoft Windows OS, Efficiency Software and Servers. Thus, MS Partner Experience certification helps to obtain employment in any of MS Technology. Microsoft Partner Competency Examinations There are 11 Microsoft Partner Competency Examination papers, each focusing on one technological innovation. Successful realization of every examination will bring a Microsoft Partner Competency qualification. There are no boundaries on the number of examinations or documentation that can be obtained. The examinations are as follows: 1. Customizing Portal Solutions with Microsoft SharePoint Products and Technologies 2. Developing E-Business Solutions Using MS BizTalk Server2004 3. Pre-Installing MS Products using the OEM Pre-Install Kit 4. Designing a MS Office Enterprise Proj.Mgmt.EPM 5. Designing Portal Solutions with MS SharePoint Products 6. Developing MS Off Using XML Prof Enterp Ed 2003 7. Plan & Build a Msg & Collab Envir Usin MS Off Sys & Win Serv 8. Deploying Business Desktops with MS Wind Serv & Off 2003 9. Delivering Business Value Planning Services 10. Microsoft@ Response Point, Configuring 11. MS Office Communication Server 2007-U.C Voice Specialization

Error 27000, Error 1304, Error 1606


Cause:



This problem occurs because members of the Administrators group do not have the required permissions for the "Documents and Settings\All Users\Shared Documents" folder on an NTFS drive. Members of the Administrators group must have both the Read permission and the Write permission for this folder to install Windows Media Player 11.



Solution:



SYMPTOMS





When you try to install Microsoft Windows Media Player 11, you may receive one of the following error messages:



Error message 1



Error 27000. Windows Media Player cannot complete this installation. No changes were made to your computer. To install Windows Media Player at a later time, run the wizard again.



Error message 2



Error 1304. Error writing to file C:\documents and settings\all users\documents\my music\.wpl. Verify that you have access to that directory.



Error message 3



Error 1606.Could not access network location INSTALLDIR





To resolve this problem, give the Administrators group the Write permission for the 'Documents and Settings\All Users\Shared Documents' folder. To do this, follow these steps:



1.



Start the computer by using an administrator account.



2.



Click Start, click Run, type cmd , and then click OK to open a Command Prompt window.



3.



At the command prompt, type the following commands in this order. Press ENTER after each command. When you are prompted to confirm each change, press Y.



cacls.exe '%ALLUSERSPROFILE%\Documents' /G BUILTIN\Administrators:F



1.



Clear : Is the purpose, scope, and intended audience(s) clear and unambiguous? Are all important details clear and as precise as necessary? You cannot verify the technical accuracy of content that is unclear or that is lacking required precision. Ask the Content Business Manager (CBM), the writer, or the author to elaborate or to provide concrete, specific examples if needed. Yes



2.



Accurate : Can the content be used by the intended audience to achieve the stated goal? Are all the details correct? Test the product(s) in different scenarios by using your issue-specific checklist. Check all technical details for accuracy. Yes



3.



Sound : Is the method or the recommendation technically sound? If the content exposes the customer to avoidable security issues, ignores Microsoft or industry best practices, or puts the customer in an untested, unsupported, or suboptimal configuration, work with the author and the CBM to develop a more appropriate method or recommendation. Yes



4.



Valid : Does the content address a real issue? Is it undocumented? Yes



5.



Complete : Are all the important details included to cover the subject? Are all the affected products and technologies identified? Are any prerequisites or requirements to successfully use the content specified? Are examples provided if needed? Is the verbatim error message (or important parts, if long) included? Is the correct bug information noted? Are needed references cited? Yes



6.



Concise : Is the content free of extraneous information that does not support the purpose, scope, or intended audience? If not, ask the author or the writer to remove unnecessary words, phrases, clauses, sentences, or paragraphs. Do not remove any appropriate details or information that would adversely affect the clarity of the content. Yes



7.



Organized : Is the content structured in a logical way? Are the steps or methods performed in the correct sequence? Are appropriate headings used to segment the content into logical sections? Are tables and unordered (bulleted) lists used if appropriate? Are all steps in numbered lists? Yes



8.



Relevant : Do all parts of the content support the purpose, scope, and intended audience(s)? Yes



cacls.exe '%ALLUSERSPROFILE%\Documents' /G System:F cacls.exe '%ALLUSERSPROFILE%\Documents' /G BUILTIN\Users:R



4.



Close the Command Prompt window, and then try to install Windows Media Player 11 again.



Details:



The information in this article applies to:





Microsoft Windows Media Player 11



Keywords: Error 27000 Error 1304 Error 1606 Applies To: Windows Media Player 10.x


What is LDAP server? Directory service (LDAP server) is a software system that stores, organizes and provides access to information in a directory; a shared information infrastructure for locating, managing, administering, and organizing common items and network resources, which can include volumes, folders, files, printers, users, groups, devices, telephone numbers and other objects. To access directories servers and clients interact in the model of client/server communication. The process of directory access happens in the following way: a directory client calls API (application programming interface) to access a directory for reading or writing the information. The client call accesses the information in the directory on behalf of the requesting client via TCP/IP (the default LDAP TCP/IP ports ? 636 for secure communications, 389 for unencrypted communications). The results of the action are returned to the client then. Servers provide a specific service to LDAP clients. Sometimes directory servers may become the clients of other servers to collect the necessary information for request processing. LDAP server performs the following basic operations: Search entries; Compare entries; Add entries; Delete entries; Modify entries; Move entries; Rename entries; Extended operation; Authentication. According to X.500 standard, servers can be connected into a hierarchical structure. That is why users can proceed from one server to another while searching the necessary information. Web interface is widely used for server administration including remote administration. Directory services can be used for: Locating and providing information about people (address books, yellow pages, white pages) and distributed resources like printers; User authentication and authorization for Web servers or other LDAP-enabled applications; Policies that are shared by multiple applications or application instances. Directory server main components are: A front-end (handles LDAP client operations coming into the server over TCP/IP connection); A database back-end (handles stores and retrieves directory objects from relational database). Some researchers and professionals highlight the best LDAP servers from the number of open source and commercial ones: Open source LDAP servers include: Red Hat Directory Server/Fedora Directory Server. Red Hat Directory Server was initially bought from Netscape Security Solutions as a commercial product for Red Hat Enterprise Linux. Nowadays it is produced by Red Hat with name Red Hat Directory Server. Following its policy Red Hat produced version for Fedora Core also. It is called Fedora Directory Server that is perfect for distributives on the basis of RedHat. Codes of these servers coincide greatly because of the common root. Unlike OpenLDAP Fedora/Red Hat directory servers have good documentation. OpenLDAP. OpenLDAP is the further development of the original slapd. It is widely distributed and used on many platforms like Linux, FreeBSD, Windows and MacOS X. Documentation containing on the website is quite obsolete, but there are many useful step-by-step instructions. OpenLDAP is time-tested. Its functionality is practically identical to RedHat directory server. Commercial LDAP Servers are: Novell eDirectory. All products are free for higher educational establishments. It works with the help of the following operational systems: Novell Netware, Windows (NT), Linux (SUSE Enterprise, or RedHat), Solaris, AIX, HP-UX. You have everything in one product ? all the necessary programs are given at once. Installation and customization are easy. Advantages - exclusive documentation and affordable price, technical support for registered users and cross-platform function. Disadvantage ? closed source files. Microsoft Active Directory. It is a part of Windows Server family. It?s a perfect solution for MS networks. Advantages ? perfect integration into the system, highly qualified documentation. Sun Java System Directory Server. Sun merged with IPlanet Company and created its new product ? Sun ONE, renamed afterwards to Sun Java System Directory Server. It is not a standalone product, but just a part of Java Enterprise System. System requirements: Solaris 10, Solaris 9, Solaris 8 (only for SPARC), Red Hat Enterprise Linux 2.1 and 3.1, HP-UX 11i, Microsoft Windows 2000, XP, 2003. You can not buy it apart from Java Enterprise System. But if you decide to use complex solution from Sun, you won?t have any problems. Sun engineers will help you to install and configure it according to your requirements. IBM Tivoli Directory Server. LDAP-solution from IBM. It is supported by the following operational systems: AIX, Solaris, Microsoft Windows 2000, HP-UX, and also Linux for Intel and IBM eServer iSeries, pSeries and zSeries. Advantage ? qualified, open and free for all documentation. LDAP servers cannot access directories without LDAP clients. Some of them are presented below: Microsoft Windows: Softerra LDAP Administrator/LDAP Browser; LDAPSoft LDAP Browser/LDAP Admin Tool; LDAPAdmin; MaXware Directory Explorer; Active Directory Explorer Linux/UNIX Evolution; KAddressBook; LDAPSoft LDAP Browser/Administrator. Mac OS X Address Book; Directory Access; Workgroup Manager. Cross-platform: Apache Directory Studio; Ekiga (formerly GnomeMeeting); Mozilla Thunderbird; Novell Evolution; phpLDAPadmin. Storing data in a directory and sharing it amongst applications saves you time and money by keeping administration effort and system resources down.

After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams.... * Reinforces what you learnt - fill in the gaps of what you missed * Gets you used to answering questions to build confidence and familiarity Here are 10 Multiple choice exams questions for you to practice on: ______________________________ Question 1# - You are the network administrator for ABC.com. You have recently transferred 200 employees from one office to another. You need to move the user accounts for these users from one Organizational Unit to another in the most efficient manner within your Windows Server 2003 Active Directory network. In order to perform this task from the command line, what is the correct command that you will need to use? A. dsmod B. dsmove C. dsget D. dsput _____________________ Question 2# - You are the network administrator for ABC.com. The network consists of a single Active Directory domain abc.com. All network servers run Windows Server 2003. Your network includes a shared folder named projectDocs. This folder must not be visible in a browse list. However, users report that they can see projectDocs when they browse for shared folders. How should you solve this problem? A. Modify the share permissions to remove the All - Read permission on projectDocs from the Users group. B. Modify the NTFS permissions to remove the Allow - Read permissions on projectDocs from the Users group. C. Change the share name to Sales Resources#. D. Change the share name to Sales Resources$. _____________________ Question 3# - You are the systems administrator for a small company that has only 1 printer. The HR department only uses the printer on Monday to print paychecks that are due on Tuesday, however, while the checks are printing the printer is tied up and nobody else can print. Which of the following is the easiest and most efficient solution to this problem? A. Create another printer and assign a priority of 99 to it and instruct the HR department to send the paychecks to this newly created printer B. Configure each of the drivers to print directly to the printer C. Add another printer in the Add Printer Wizard that points to the same print device. Make this printer available between the hours of 5pm and 5am. Instruct the HR Department to use this printer for printing checks _____________________ Question 4# - Out of the following, identify a feature of basic disk. A. Enables you to set aside space to arrange data B. Allows you to configure unlimited number of volumes per disk C. Enables you to combine noncontiguous unallocated space into one partition D. Enables you to create fault-tolerant disks _____________________ Question 5# - You want to perform multiple backups of only those files that are modified since the last normal backup. You also want to ensure that the backed up files use minimum amount of media. In this case, you will take a: A. Normal backup B. Differential backup C. Incremental backup D. Copy backup _____________________ Question 6# - Special permissions can be reached by using the Advanced Tab on the Permissions Property sheets. What does the special permission ?Delete Subfolders and Files? include? Choose all that apply A. Full Control B. Modify C. Read and Execute D. List Folder Contents E. Read F. Write _____________________ Question 7# - The System Monitor interface provides the ability to monitor system performance using which of the following methods? Choose all that apply A. Graphs B. Logs C. Alerts _____________________ Question 8# - A volume spans multiple disks on a Windows Server 2003 computer named Server1. A hardware failure has occurred and you need to allow access to the volume while Server1 is being repaired. In this situation, it is most appropriate to: A. use the Disk Management utility to recover the volume on Server1 B. move all the dynamic disks containing parts of the volume to another Windows Server 2003 computer and import the disks in the disk group on the target computer C. import some of the dynamic disks of the volume into another disk group on Server1. D. move some of the disks containing parts of the volume to another computer and delete the volume on Server1 _____________________ Question 9# - you assign a user a quota of 50mb on the company server. Th user attemps to copy a compressed folder containing 40mb of compressed data to the partition on the server. The operation will not complete and the user receives an error message that he has run out of disk space. How do you correct this problem while maintaining a limit for the user? A. Disk quotas and compression are incompatible. The user must uncompress his files before copying them to the server B. Disable the Deny Disk Space to users exceeding quota limit option C. Find out the size of his data when it is uncompressed and increase his quota to that amount _____________________ Question 10# - the Disk Management MMC snap-in interface allows? A. Disk initialization B. Formatting of volumes (NTFS and FAT) C. The creation of fault-tolerant disk systems D. All the above _____________________ ANSWERS MCSA Question 1# - Correct Answers: A MCSA Question 2# - Correct Answers: D MCSA Question 3# - Correct Answers: C MCSA Question 4# - Correct Answers: A MCSA Question 5# - Correct Answers: C MCSA Question 6# - Correct Answers: A MCSA Question 7# - Correct Answers: A,B,C MCSA Question 8# - Correct Answers: B MCSA Question 9# - Correct Answers: C MCSA Question 10# - Correct Answers: D

Vundo trojan: Definition


Vundo is a trojan that showing annoying popup ads on your PC and covertly download malicious files from the web. Because Vundo runs lots of popup ads, it really makes your PC work much less effective. Trojan Vundo can be spread through spam emails containing links to sites that use your browser’s security holes or directly on websites especcially with so called "adult" content. When you click on a link in a Vundo Trojan-packed email, your web browser, like Internet Explorer, opens a site that secretly installs Vundo into your computer. Vundo trojan may silently run on every Windows bootup. After each boot your PC will start working worse.Symptoms of Vundo Trojan Infection



When you’re infected with trojan Vundo there are a few key symptoms.




- If you noticed slow PC work: It just the beginning of infection with like Vundo Trojan - it can slow your PC in such way - you can't work with it. Better check your PC until its too late.




- If your PC takes much longer than usually to boot, or if your Internet connection is slow: you may be infected with Trojan Vundo also. Vundo loads its modules with the system. Vundo uses connection to download and install fake antiviruses - that will then give you alert to make you buy them.




- Hijacked homepage and search results: Trojan Vundo can modify Internet settings to redirect your homepage and searchresults to another site.




- You have ne New desktop shortcuts or your old ones look weird: Vundo can even add desktop shortcuts to your PC. You can see your old shortcuts change their usual view.




- Annoying popups: Vundo can bombard your computer with popup ads, even when you’re not online. Through these popups, you may be tricked into downloading more spyware.Measures to remove Vundo




Download Vundo Removal Tool




Here is one of the most effective tool against Vundo on the web. You can fix vundo in several click without calling a specialist and in case you will have any problems - 24/7 support is ready to help you as fast as possible. Remove Vundo without headache.Manual Vundo trojan removal



Remove following files on your PC using Unlocker tool (if you have them):




vzbb.dll



vturr.dll



dszigqd.dll



wvuuspo.dll



xc23[1].exe



xc29[1].exe



xc36[1].exe



xc37[1].exe



xc42[1].exe



xc60[1].exe



xhwayqd.dll



xi6[1].exe



ydownwl.dll



yibkcqh.dll



zdeihue.dll



zfzlnv.dll



zsxxqhb.dll



ztlupkn.dll




Remove following registry keys on your PC using Regedit (if you have them):




• Key: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winexz32



Value: Impersonate



• Key: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winexz32



Value: Startup



• Key: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winexz32



Value: Shutdown



• Key: Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljjg



Value: Asynchronous



• Key: Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljjg



Value: DllName



• Key: Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljjg



Value: Impersonate



• Key: Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljjg



Value: Startup



• Key: Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljjg



Value: Logoff



• Key: Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winexz32



Value: Asynchronous



• Key:Software\Microsoft\Internet Explorer\Main\Active State



• Key: SoftwareMicrosoftWindows CurrentVersionRunOnce*WinLogon



• Key: SoftwareMicrosoftWindows CurrentVersionRunOnce*[filename]Protection From Vundo Trojan



- Email: Never download any attachment from unknown sender




- Websites: Use latest version of safe browsers - I recommend Opera and Firefox




- Open ports: Download every windows update and antivirus update as fast as you can


 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text